RMA logo

 
 
  
www.rmasecurity.com    |    
(919) 834-8584

Volume 4, Issue 2: February 2012
Information from RMA
potential criminal historyApplicant Address Histories

 
Relying solely on the information provided by the applicant can miss vital information about their suitability for employment. Part of the background investigation should include a Social Security number verification and address history search.

 

Read More...
Keep Data SecuredWhen Employees Leave, Data Should Stay

 
How much time and money could be saved if an image of the computer hard drive had been created before the employee was terminated? We see opportunities for companies to preserve data and protect themselves prior to or as part of the termination procedure itself.

 

Read More...
News You Can Use
Fine Tune Your Criminal Background Checks

 
The greater the fiduciary responsibility, the more in depth the scope of the screening should be. A professional position should usually require a deeper level of verification and investigation than an entry level position.

 

Read More...
Clear Your Google Web History

 
On March 1, 2012, Google will implement a new privacy policy. Under the new policy, your Google Web History can be combined with other data Google has gathered about you from other services like Gmail, Google+, and other services.

 

Read More...
You Just Can't Make This Up
7 Best TSA 'Aha Moments': Strange Things at Airport Security

Or a list of things that shouldn't be in anyone's carry-on.

 

Woman describes 'sheer horror' after online impostor takes photos

If I am me, then who is that?

 

Facebook removes sick baby hoaxes, urges users to report more

A scam, a hoax, and potential image theft.

Security in the News
China and businessChinese hackers breached Nortel for years

 
In this economic climate most of the business resources are focused on delivering the products and services, not on protecting the elements that provide the economic advantage and ultimate return on investment.

 

Read More...
border security measuresEye scanners at England airports turned off

 
Technology is only as good as the people who will apply it, the compliance of the people it will serve, and the processes in place to help guide its use as a part of a holistic security program.

 

Read More...
Ask an Expert

 
Submit your questions on protecting competitive intelligence, background investigations, security systems and technology, training, or anything else related to security and the protection of assets. Questions will be answered by our professionals and posted on our website. Names and identifying information will be kept confidential. Selected questions and answers will also be published in our newsletter.

 

Submit your questions here
Like us on Facebook View our profile on LinkedIn Follow us on Twitter
Copyright 2011 Risk Management Associates, Inc. - All Rights Reserved