Hello Sweetheart: Internal Theft Sours Retail Relationships
Internal theft—whether in the form of taking cash or goods—is only one aspect of shrink, the industry term for missing merchandise, measured as a percentage of sales.
Read Full Article..
Risk is Dynamic, So Physical Risk Assessment Should Be Continuous
Most companies assess their physical security on an annual basis, but that’s not enough. What if you performed risk assessments at all your sites every day?
If you’re shaking your head and saying it’s not possible, think again. In fact, daily assessments should be best practice for all organizations.
Read Full Article..
Court Dismisses Lawsuit Due to Forged Texts
Manipulating or falsifying evidence can result in severe penalties for an employee, including dismissal of claims and sanctions.
Read Full Article..
How to Look Out for Potential Attacker Red Flags
People don’t just become active shooters or attackers in a snap. Instead, it’s a decision. Know the warning signs, it helps to have others in your organization recognize them, too..
Read Full Article..
Using ESRM to Gain a Seat at the Table
For more than half of a decade, ESRM has increased in popularity among security practitioners; however, figuring how to introduce this methodology into an organization unfamiliar with it is not always the easiest task to accomplish.
Read Full Article..
Protecting Corporate Data on Employee-Owned Mobile Devices
Imagine an employee is working from a local coffee shop. Without a secure device, a malicious actor can gain unauthorized access to private or proprietary information, with potential damage to the employee or even the entire organization.
Read Full Article..
How to Build a Trauma-Informed Workplace
Given the ubiquity of trauma in the world, some experts are calling on employers to develop “trauma-informed” workplaces. As a result, a number of training programs have popped up to help organizations through the storms.
Read Full Article..
Operational Strategies for Today’s Insider Threat Environment
Insider threats—such as stealing trade secrets, unintentionally exposing login credentials, or purposely sabotaging workplace equipment continue to be top of mind.
No one is immune to insider threats; they are some of the most difficult attacks to detect, defend against, and manage.
Read Full Article..
Layoffs, Remember to Give Fair WARNing
When conducting large-scale layoffs, U.S. employers must follow the federal Worker Adjustment and Retraining Notification (WARN) Act, which protects workers from the impacts of suddenly and unexpectedly losing their jobs without notice.
Read Full Article..
In the Wake of Mass Layoffs, Insider Threats Multiply
The numbers have been staggering—18,000 roles at Amazon, 10,000 people from Microsoft, 26,000 people from Meta, 6,650 people from Dell, more than 70 percent of the headcount at Twitter. The past six months have brought massive layoffs across the technology sector worldwide. But when such seismic personnel shifts occur, they inevitably spur ill will.
Read Full Article..
Extremism Against Places of Worship
Hostage situations. Graffiti and vandalism. Gravestones toppled. Active shooters. Bombings. Extremists are becoming more brazen in their tactics
Read Full Article..
Test Your Crisis Preparedness Plan
Crises will inevitably take people, organizations, and security professionals by surprise, but they don’t need to catch you unprepared.
Sometimes corporate leaders will spend too much time in the boardroom debating what to do about a crisis, delaying critical responses. Having a plan in place enables strategic decisions to be made in the moment,
Read Full Article..
Staying Ahead of a Crisis with a Strong Emergency Evacuation Policy
Since the onset of the Russian invasion of Ukraine, thousands of individuals and their families in the region have been evacuated to safety. Now, companies are learning from the lessons of Ukraine and, importantly, that threats to their employees can happen anywhere and anytime.
Read Full Article..
How to Navigate Conflict with a Coworker
Interpersonal conflicts are common in the workplace, and it’s easy to get caught up in them. But that can lead to reduced creativity, slower and worse decision-making, and even fatal mistakes. So how can we return to our best selves?
Read Full Article..
Mass Shooting Liability: Uvalde, Chesapeake Survivors and Victims File Lawsuits
Following major instances of gun violence in the United States in 2022, survivors and families of victims have consistently filed lawsuits against alleged shooters’ employers, gun manufacturers, and first responders.
Read Full Article..
Threat Management Team Was Investigating Alleged UVA Shooter
The suspect arrested and charged with murdering three of his University of Virginia (UVA) classmates and wounding two others, had been under investigation from the university’s threat management team.
Read Full Article..
Mass Shooter Followed Footsteps of Previous Attackers Online
After a racially motivated gunman shot and killed 10 people and wounded three at a Buffalo, New York, supermarket, officials launched an investigation into the attacker’s motivations and background. They released their findings in a report finding “this attack is part of an epidemic of mass shootings often perpetrated by young men radicalized online by an ideology of hate.”
Read Full Article..
The Need for a Multidimensional Active Shooter Response
While a wealth of research supports the success of one-dimensional strategies for responding to active shooter incidents, this approach isn’t entirely effective for preventing these events and minimizing loss. The complexity and high-risk scale of active shooter situations warrant a multidimensional response.
Read Full Article..
On the Internet: Be Cautious When Connected
Everyday tasks—opening an email attachment, following a link in a text message, making an online purchase—can open you up to online criminals who want to harm your systems or steal from you. Preventing internet-enabled crimes and cyber intrusions requires each of us to be aware and on guard.
Read Full Article..
How to Motivate Your Team When People Keep Quitting
When teammates leave, it can have a ripple effect. How can you help mitigate further attrition and keep everyone motivated and engaged when someone else quits?
Read Full Article..
Security Expert and Parent Learned from Parkland
When someone asks another person, “Have you heard about the school shooting,” and that person hasn’t, you can sense instant concern as they respond with “No! Where?”
They’re hoping “not my kid’s school,” or “not my niece’s or nephew’s school,” or “not the school so-and-so teaches at.
Read Full Article..
AL-Generated faces are now more trustworthy then real ones
CA new study finds that humans can no longer spot the difference between real and fake faces. An experiment showed that even giving participants some tips on spotting AI-generated faces and providing feedback as they made their decisions didn’t drastically improve their deciphering ability. Participants identified which face was real and which was fake with 59% accuracy, but saw no improvement over time.
Read Full Article..
Your Cyber Response Plan Needs These 6 Components
Cybersecurity incidents are no longer a matter of if, but when. Every organization must have a plan for what they will do in both their enterprise (IT) and operational technology (OT) environments in case an incident occurs.
Read Full Article..
NYC Invests in Subway Car Surveillance to Soothe Rider Concerns
Subway riders are returning to pre-pandemic levels in New York City, but their satisfaction around safety and security remains low, resulting in an overall subway satisfaction rate of just 48 percent.
Read Full Article..
Former Uber CSO Joe Sullivan Convicted of Hiding Cyberattack
While Sullivan was serving as the company’s CSO, malicious actors informed him that they had accessed and downloaded a company database. Instead of informing the U.S. FTC, Sullivan paid off the attackers to keep quiet about the hack.
Read Full Article..
Keep Ahead of Crises by Planning for Complex Scenarios
During a crisis or major event it can be easy to focus on the matter at hand. But malicious actors often seek such distractions to use them to their advantage, so security professionals need to think critically about their vulnerabilities to limit opportunities for harm.
Read Full Article..
The Physical Ramifications of Cyber Response
When people don’t get enough sleep, there are ramifications. Yet, when a security incident occurs, many incident responders feel the need to work extreme hours to help their organization mitigate the damage and move forward in the recovery process.
Read Full Article..

American Companies Missing Half of All Threats, but Downplaying Risks
Threats to private sector organizations abound—exacerbated by persistent political, social, and economic issues—but U.S. companies aren’t keeping up. By the end of 2022, 26 percent of executives at American companies anticipate they will miss at least 51 percent of threats, and another 31 percent guessed that they will miss between 26 and 50 percent of threats before they cause harm or damage,
Read Full Article..

Gun violence in the United States took center stage yet again yesterday. In one incident on 17 July, a man began shooting at a mall in Greenwood, Indiana, killing three people and wounding two others before a bystander ended the incident by shooting and killing the assailant.
Read Full Article..
FBI director warns of digital assaults targeting midterm elections
Officials are preparing for a wave of multilayered cyberattacks and influence operations from China, Russia and Iran in the run up to November’s midterm elections.
Read Full Article..
Criminals Posting as FBI Agents Scam and Extort Doctors – with Surprising Success
Most doctors won’t fall for a run-of-the-mill scam. But criminals ARE targeting doctors, and the FBI is acting. The FBI New York Office recently published a special notice detailing several scams targeting doctors. And these scams share a theme.
Read Full Article.. (PDF)

Crypsis 2020 Incident Response and Data Breach Report
In this report, we analyze data and leverage insights from over 1,000 investigations The Crypsis Group conducted in 2019 ranging from ransomware, business email compromise (BEC), payment card breaches, and nation state attacks, to inadvertent data disclosure incidents and insider threat investigations. Our intention is not to criticize those charged with protecting information technology assets, but rather to offer rich, deep insights into real-world cybersecurity risks and, importantly, provide practical advice on how organizations can protect themselves. We present this data within commonly encountered incident types and discuss the interconnected nature of attacks within each
Read Full Article.. (PDF)

FBI says it tested Israeli company NSO Group’s Spyware
WASHINGTON, Feb 2 (Reuters)
The Federal Bureau of Investigation on Wednesday acknowledged that it acquired and tested a hacking tool made by Israeli surveillance company NSO Group, but the U.S. law enforcement agency said it did not use it for any investigation.
The surveillance firm, which makes the Pegasus software, has been embroiled in controversy after revelations that its tools were misused by governments and other agencies to hack iPhones.
Read Full Article..
Women Female Road Warriors: How to Protect Yourself When Traveling for Work
Follow these tips to stay safe while on the road.
Kim Albrecht
GUEST WRITER for Women Entrepreneur
Chief Marketing Officer at SAP Concur
December 7, 2018
This year, the Upside Travel Company reported that nearly 50 percent of all business travel bookings are for women, and this statistic is rising. With this comes the growing awareness that women face more travel safety risks compared to their male counterparts.
Read Full Article..

Sexual Harassment: Insights into Driving Better Compliance, Training, and Governance
BY RANE – SEPTEMBER 24, 2018
RANE recently spoke with Kathy Leodler, Owner and CEO, Rampart Group, and other subject matter experts, who offered their insights on approaches companies can take to not only cope with the issue, but take their business culture to a whole new level. Read Full Article… (pdf)

Distracted Driving: It Can Happen to You
BY SAFELITE – NOVEMBER, 14TH 2016
Have you ever been distracted while driving? Chances are you have..
Distracted driving is any activity that diverts attention away from the primary task of driving, which can include texting, using a cell phone, eating, drinking, adjusting the radio, using navigation, talking to passengers, tending to your children in the backseat and much more. Distracted driving can have tragic repercussions and anyone can be the victim, or the perpetrator. Read Full Article..

Forbes – IRS is Requesting the Identities of United States Coinbase Customers
November 21, 2016
IRS Wants Court Authority To Identify Bitcoin Users & Transactions At Coinbase.
The Department of Justice (DOJ) filed paperwork in federal court (California Northern District Court, Case No. 3:16-cv-06658-JSC) requesting the identities of United States Coinbase customers who transferred convertible virtual currency at any time between December 31, 2013, and December 31, 2015. Read Full Article..

Federal Trade Commission – Consumer Information
The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive and unfair business practices in the marketplace.
Money-making scheme targets older people and veterans
Federal Trade Commission – Consumer Information
October 13, 2016
by Amy Hebert
Consumer Education Specialist, FTC
If you’re just getting by, and someone offers you the chance to earn more money through a business opportunity, you might be willing to listen, right?
Read Full Article…
Buying a Used Car
Federal Trade Commission – Consumer Information
October 13, 2016
by Alvaro Puig
Consumer Education Specialist, FTC
Whether you’re 16 or 60, buying a used car can be an exciting experience. But it can also be a big financial commitment.
Read Full Article…
Phony computer techs shut down
Federal Trade Commission – Consumer Information
October 12, 2016
by Bridget Small
Consumer Education Specialist, FTC
A federal court temporarily shut down and froze the assets of an operation that allegedly used phony online warnings about computer security.
Read Full Article…

FBI Hazardous Devices School
September 22, 2016
FBI Takes Lead Role in Training Nation’s Public Safety Bomb Technicians.
After a 45-year partnership with the U.S. Army, the FBI formally accepted primary responsibility for the Hazardous Devices School at Redstone Arsenal in Huntsville, Alabama.
“The bombing events in New York and New Jersey are a testament to the challenges faced by bomb technicians daily—and an unfortunate reminder of a threat that is both evolving and enduring,” noted FBI Deputy Director Andrew McCabe, who was on hand at Redstone Arsenal for the transition ceremony along with other Bureau and Army officials.

1991 Talladega Prison Riot
August 29, 2016
A Look Back at the FBI’s Early Crisis Response Capabilities
The federal prison in Talladega, Alabama was the site of a 1991 riot in which detainees held 10 federal employees hostage for more than a week. Twenty-five years ago this month, the FBI—working closely with our partners at the Federal Bureau of Prisons (BOP)—played a crucial role in the successful resolution of a prison riot that ended without loss of life or serious injury to any of the hostages, inmates, or responding federal officers.

FBI’s Cyber Surf Island Challenge
August 26, 2016
Take the FBI’s Safe Online Surfing Internet Challenge
The initiative promotes cyber citizenship by teaching students how to recognize and respond to online dangers through a series of interactive activities.
What do more than 870,000 students across the nation have in common? Since 2012, they have all completed the FBI’s Safe Online Surfing (SOS) Internet Challenge. Available through a free website at https://sos.fbi.gov, this initiative promotes cyber citizenship by teaching students in third through eighth grades how to recognize and respond to online dangers through a series of fun, interactive activities.

FBI Forensic Anthropology
July 5, 2016
Putting a Human Face on Unidentified Remains
Artists and anthropologists at the FBI Lab put a human face on unidentified remains.
Fifteen years ago, hikers in a suburban Minnesota park discovered the skeletal, unclothed remains of a woman, 35 to 45 years old, with brown or reddish hair and evidence of significant dental work. The woman was never identified, and the case remains open as a homicide investigation.