RMA logo

 
 
  
www.rmasecurity.com    |    
(919) 834-8584

Volume 4, Issue 4: May 2012
Information from RMA
mobile devicesKeep Pace with Legal Requirements as Mobile Devices Inundate Offices

 
With 87% of employees confirming they use personal electronic devices for work, designing a workable "bring-your-own-device" program is probably overdue. The wave of mobile devices has already flooded your offices. It's time to figure out what to do about it.

 

Read More...
eight unknown subjectsDigital Message Resonance and Its Impact on Economic Advantage

 
We know that businesses are leaking economic advantage every day through elicitation and social engineering, the exploitation of cyber vulnerabilities, and internal and external theft and sabotage. The new paradigm of leakage uses social media to communicate a message to an exponentially larger audience at the touch of a button.

 

Read More...
News You Can Use
cargo planeFBI warns travelers to beware attacks via hotel Wi-Fi

 
Hackers are targeting foreigners' laptops using hotel Wi-Fi, the Internet Crime Complaint Center and FBI have warned. What is your business doing to protect the technology that contains the intellectual property that is your economic advantage?

 

Read More...
caller IDUS Cargo Theft - A Five-Year Review

 
Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions.

 

Read More...
You Just Can't Make This Up
Canada police find second body part in post

Screening packages isn't just for bombs.

 

iPhone Stolen On Disney Cruise Continues Uploading Photos

Makes a more interesting vacation slideshow.

 

Phony "dying bride" ordered to repay victims

Here comes the bride. There goes the groom.

Security in the News
caller IDGovernment Files First Criminal Charges In BP Oil Spill

 
As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. Have you ever stopped to consider how your company would respond to a preservation letter or discovery request covering every communication device in the company?

 

Read More...
Yahoo chief executive Scott Thompson steps down

 
Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. This is simply not true.

 

Read More...
Ask an Expert

 
Submit your questions on protecting competitive intelligence, background investigations, security systems and technology, training, or anything else related to security and the protection of assets. Questions will be answered by our professionals and posted on our website. Names and identifying information will be kept confidential. Selected questions and answers will also be published in our newsletter.

 

Submit your questions here
Like us on Facebook View our profile on LinkedIn Follow us on Twitter
Copyright 2011 Risk Management Associates, Inc. - All Rights Reserved