byLowers & Associates | March 29, 2017

Wikipedia defines social engineering, in the context of information security, as the “psychological manipulation of people into performing actions or divulging confidential information.” Our increasing reliance on vast networks of digital technology for information storage, research, controls, and transactions…

byLowers & Associates | March 01, 2017

The climax of the Academy Awards is imminent, with the announcement of the Best Picture unfolding on the stage. A PricewaterhouseCooper employee has just two red envelopes left in her briefcase. She inadvertently pulls the wrong one, and Faye…

byLowers & Associates | February 23, 2017

An effective and successful healthcare security program requires many different layers of support. Aside from program design, management, and daily staffing, there is also a strategic risk management layer to ensure your program’s direction addresses the most important security…

byLowers & Associates | February 16, 2017

A strong healthcare security program begins with a strong presence. This presence should be both seen and felt, cultivating a multi-dimensional experience of safety. Even in moments where security is subtle, like in the case of consistent uniforms, the…

byLowers & Associates | February 09, 2017

We’ve all heard the age-old expression: “perception is everything”, or maybe even more dramatically, “perception is reality”, the latter attributed to political consultant Lee Atwater. The way a program or organization is perceived by its customers, employees, and even…