|
Volume 4, Issue 1: January 2012 |
Five Keys to Mobile Phone Security
Cell phones - specifically smartphones - have become ever present in our daily lives. If your smartphone is lost or stolen, the data inside may be more valuable than the phone. Just as we take precautions to protect our phone from damage, we should also protect the data inside. Read More... |
Support the USO of North Carolina
Did you know that the USO of North Carolina gets no federal funding? All the money that is donated to the USO of North Carolina stays in North Carolina. They need us. We need them. It's that simple. Read More... |
Don't Click that Link!
Sometimes, harmful e-mail is obvious. Sometimes it's not. The human element is always the weakest link in the protection of assets both personal and professional. We each have a part to play in our own security and the protection of our company's assets. Read More... |
State of the State: North Carolina Intelligence Community
It is imperative we protect our technological edge and recognize threats to our business and employees. Please engage your IT staff and understand your vulnerabilities and have a crisis management response plan in place in the event you are a victim. Read More... |
| You Just Can't Make This Up |
FBI says hackers hit key services in three US cities
Everybody is preoccupied with CBRNE and VBIED's while the hackers are practicing to really take us down hard. In our opinion, this is the new "front line" in security and counterterrorism. Read More... |
State Department launches counter-terror bureau for threats abroad
If the definition of terrorism is the use of violence and threats to intimidate or coerce for political or other reasons, then awareness is critical to counterterrorism. Read More... |
Ask an Expert
Submit your questions on protecting competitive intelligence, background investigations, security systems and technology, training, or anything else related to security and the protection of assets. Questions will be answered by our professionals and posted on our website. Names and identifying information will be kept confidential. Selected questions and answers will also be published in our newsletter. Submit your questions here |