RMA logo

 
 
  
www.rmasecurity.com    |    
(919) 834-8584

Volume 4, Issue 1: January 2012
Information from RMA
securing smartphonesFive Keys to Mobile Phone Security

 
Cell phones - specifically smartphones - have become ever present in our daily lives. If your smartphone is lost or stolen, the data inside may be more valuable than the phone. Just as we take precautions to protect our phone from damage, we should also protect the data inside.

 

Read More...
NCMS donation to USO-NCSupport the USO of North Carolina

 
Did you know that the USO of North Carolina gets no federal funding? All the money that is donated to the USO of North Carolina stays in North Carolina. They need us. We need them. It's that simple.

 

Read More...
News You Can Use
Don't click that link!Don't Click that Link!

 
Sometimes, harmful e-mail is obvious. Sometimes it's not. The human element is always the weakest link in the protection of assets both personal and professional. We each have a part to play in our own security and the protection of our company's assets.

 

Read More...
State of the State: North Carolina Intelligence Community

 
It is imperative we protect our technological edge and recognize threats to our business and employees. Please engage your IT staff and understand your vulnerabilities and have a crisis management response plan in place in the event you are a victim.

 

Read More...
You Just Can't Make This Up
Minnesota Wi-Fi hacker gets 18 years in prison for terrorizing neighbors

Remember the good old days when the neighbor would just egg the house? Not anymore.

 

Child Identity Theft Takes Advantage of Kids' Unused Social Security Numbers

Reading, writing, and ruined credit.

 

Police didn't have to look far when company reported theft

The employee who reported the inventory loss turned out to be the thief.

Security in the News
FBI says hackers hit key services in three US cities

 
Everybody is preoccupied with CBRNE and VBIED's while the hackers are practicing to really take us down hard. In our opinion, this is the new "front line" in security and counterterrorism.

 

Read More...
Daniel Benjamin, Office of the Coordinator for CounterterrorismState Department launches counter-terror bureau for threats abroad

 
If the definition of terrorism is the use of violence and threats to intimidate or coerce for political or other reasons, then awareness is critical to counterterrorism.

 

Read More...
Ask an Expert

 
Submit your questions on protecting competitive intelligence, background investigations, security systems and technology, training, or anything else related to security and the protection of assets. Questions will be answered by our professionals and posted on our website. Names and identifying information will be kept confidential. Selected questions and answers will also be published in our newsletter.

 

Submit your questions here
Like us on Facebook View our profile on LinkedIn Follow us on Twitter
Copyright 2011 Risk Management Associates, Inc. - All Rights Reserved