RMA logo

 
 
  
www.rmasecurity.com    |    
(919) 834-8584

  

News

 

12/09/2013

RMA Presents Continuing Education Training

 

12/05/2013

Gingerbread Benefit

 

12/03/2013

Jerry Blanchard Presents at ProNet's "Security on the Move"

 

11/14/2013

Assessment Completed at University of Maryland Eastern Shore

 

11/13/2013

Stan Carroll Presents at 21st Annual Employment Law Update

 

10/25/2013

RMA Presents at CSI Week at Meredith College

 

09/25/2013

RMA Personnel Attend ASIS

Like us on Facebook View our profile on LinkedIn Follow 

us on Twitter
Ask an Expert

 
Submit your questions on protecting competitive intelligence, background investigations, security systems and technology, training, or anything else related to security and the protection of assets. Questions will be answered by our professionals and posted on our website. Names and identifying information will be kept confidential. Selected questions and answers will also be published in our newsletter.

 

Submit your questions here
Volume 5, Issue 5: December 2013
Information from RMA
devicesBring Your Own Device

Christine Peterson
 

Every device connected to a network - including smartphones, tablets, and laptops - is a potential point of attack or vulnerability for a network. So why would companies allow employees to connect personal devices to the company network? What are the costs associated with personal devices connected to the business network?

 

Read More...
officerFull-time versus Part-time Officers

Billy Green
 

The human component of an integrated security plan can be in one or more of several forms. These forms become choices that need to be addressed depending on the mission, environment, culture, population, and security philosophy of the organization and specifically the site to be protected. Full-time and part-time are two choices that must be made regarding the staffing of the posts and roles.

 

Read More...
barrierPerimeter Security

Bill Booth
 

Every security program must be an integrated whole and each element must grow out of the specific needs dictated by the circumstances affecting the facility to be protected. Nevertheless, the first and basic defense is still the outer perimeter of the facility. Planning this defense is neither difficult nor complicated, but it is the product of common sense.

 

Read More...
Copyright 2013 Risk Management Associates, Inc. - All Rights Reserved