RMA logo

 
  
www.rmasecurity.com    |    
(919) 834-8584

Contents
News

10/27/2011

Rusty Gilmore and Mike Epperly Speak at American Society of Women Accountants

 

10/25/2011

RMA Presents PI 230 and PI 240 Training

 

10/24/2011

RMA Attends 2011 NCLM Annual Conference

 

10/24/2011

Mike Longmire Presents at North Carolina State University

 

10/7/2011

RMA Supports and Attends USO Gala

 

9/30/2011

RMA Awarded Technical Editor Position

 

9/15/2011

RMA Completes Blast Assessment for SSA

 

9/14/2011

Rusty Gilmore Presents at Chamber U

 

9/13/2011

RMA Presents PI 230 and PI 240 Training

 

9/6/2011

Rowan-Cabarrus Community College Security Project Begins

 

9/1/2011

USO Raffle - NCMS Community Project

 

8/31/2011

RMA Licensed in Virginia

 

8/30/2011

Bill Booth Presents at Premise Liability Seminar

 

8/23/2011

Mike Epperly and Rusty Gilmore Present at Lunch and Learn

Join Our Mailing List

 

 

Find us on Facebook

 

View our profile on LinkedIn

Volume 3, Issue 4: Fourth Quarter 2011
Knowledge is power. Protect what is yours.
Espionage? Here?

 
As an industrial contractor and security consulting firm, we know too well the cost and ease with which companies give away their competitive intelligence every day and often times do not have any idea until it is too late.


 

Read More...
 
Question MarkWhat Would You Do?

The security manager receives a call from the front desk receptionist. She tells him that during lunch, the fill-in receptionist received a call from an individual who identified himself as a volunteer for Good Charity. The volunteer wanted to send an invitation for their annual fundraiser to the vice president, but he didn't have the home address. He also asked for the correct spelling of the name of the vice president's spouse. The fill-in receptionist knew that the vice president supported Good Charity, so she gave the volunteer the information.

What would you do?
 
Bill Booth
Meet the Experts 
 
William F. "Bill" Booth, CPP

Chairman of the Board
Security professional since 1968

 
What do you enjoy most about your role in security?
We often have the rare privilege of working in direct partnership with our clients because true security is more than gadgets; true security must be people-centered.
 
More about Bill Booth
 
Travis Hall
Meet the Experts 
 
Travis A. Hall

Associate Consultant
Security professional since 2005
 
What are some notable or memorable projects?
My most memorable security project is my first one. I was a subcontractor working for a local security integrator installing hydraulic wedge barriers and bollard systems for a federal government agency.
 

More about Travis Hall

 
Newsletter Review 
 
As 2011 winds down, we at Risk Management Associates, Inc. would like to thank all our newsletter followers for your attention, suggestions, and input. Hopefully you were able to use some of the information, tips and scenarios to better protect your business' assets and strengthen your security program. Over the last two years we have looked at:
  • Cell Phone Vulnerabilities
  • Traveling Technology
  • Pre-employment Background Investigations
  • Fraud and Small Business
  • Corporate Compliance and Ethics
  • Background Investigations
  • Premises Liability
  • Access Control - People, Processes, Technology
  • Executive Protection and Threat Assessments
  • Key Control
  • Surveillance
  • Emergencies and Visitors
  • Global Risk Management
  • Sharing Protected Information
  • Protecting Competitive Intelligence
  • Sensitive Information
If you have suggestions for topics that you would like to see, please let us know. If you are interested in topic covered in previous newsletters, you can find more information on our website.

Unfortunately everyone has some exposure to security risk; it's how we handle that risk that sets us apart.
Copyright 2011 Risk Management Associates, Inc. - All Rights Reserved