|
Espionage? Here?
 As an industrial contractor and security consulting firm, we know too well the cost and ease with which companies give away their competitive intelligence every day and often times do not have any idea until it is too late. Read More... |
What Would You Do? The security manager receives a call from the front desk receptionist. She tells him that during lunch, the fill-in receptionist received a call from an individual who identified himself as a volunteer for Good Charity. The volunteer wanted to send an invitation for their annual fundraiser to the vice president, but he didn't have the home address. He also asked for the correct spelling of the name of the vice president's spouse. The fill-in receptionist knew that the vice president supported Good Charity, so she gave the volunteer the information.
What would you do? |
Meet the Experts William F. "Bill" Booth, CPP Chairman of the Board Security professional since 1968 What do you enjoy most about your role in security? We often have the rare privilege of working in direct partnership with our clients because true security is more than gadgets; true security must be people-centered. More about Bill Booth |
Meet the Experts Travis A. Hall Associate Consultant Security professional since 2005 What are some notable or memorable projects? My most memorable security project is my first one. I was a subcontractor working for a local security integrator installing hydraulic wedge barriers and bollard systems for a federal government agency. More about Travis Hall |
|
Newsletter Review As 2011 winds down, we at Risk Management Associates, Inc. would like to thank all our newsletter followers for your attention, suggestions, and input. Hopefully you were able to use some of the information, tips and scenarios to better protect your business' assets and strengthen your security program. Over the last two years we have looked at:
- Cell Phone Vulnerabilities
- Traveling Technology
- Pre-employment Background Investigations
- Fraud and Small Business
- Corporate Compliance and Ethics
- Background Investigations
- Premises Liability
- Access Control - People, Processes, Technology
- Executive Protection and Threat Assessments
- Key Control
- Surveillance
- Emergencies and Visitors
- Global Risk Management
- Sharing Protected Information
- Protecting Competitive Intelligence
- Sensitive Information
If you have suggestions for topics that you would like to see, please let us know. If you are interested in topic covered in previous newsletters, you can find more information on our website.
Unfortunately everyone has some exposure to security risk; it's how we handle that risk that sets us apart. |