Articles
Learn from the subject matter experts at Red5, our clients, and industry partners with the aid of our resource database.

Your Source for Security Expertise
Insights and Intelligence in managed security
.png)
Articles
Understanding Workplace Violence Prevention
California's new workplace violence prevention law, SB 553, effective July 1, 2025, sets a comprehensive standard that businesses nationwide may soon follow, requiring companies—regardless of size—to implement robust, well-communicated plans for reporting, investigating, and preventing workplace violence or risk significant penalties.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Articles
Smart Home Devices: Concerns, Vulnerabilities, and How to Address Them
\u201d a home filled with connected devices that conveniently streamline entertainment

Articles
A Threat No One Can Ignore: The Threat of Ransomware Expands to Include Small and Medium Size Businesses
You likely heard about, and may have been affected by, the Colonial Pipeline Company ransomware attack in May 2021, but you probably are unaware of the ransomware attack that targeted Lincoln College later that year, forcing the institution to close in May 2022.

Articles
5 Benefits of a Corporate Travel Risk Program
An effective travel risk program is a key tool in any company’s risk management effort. Travel risk programs provide end-to-end service for traveling employees, starting from when the employee’s trip is planned up until the employee’s safe return home.

Articles
What Are Data Aggregators and How Do They Pose a Risk to Your Privacy and Security?
Data aggregators, also known as people-finder sites, scour the internet looking for people’s personally identifiable information (PII) in order to compile easily accessible online profiles of the individual.

Articles
What’s The Big Deal About TikTok and What Can You Do to Protect Your Data
TikTok data privacy concerns and what you can do to protect your data.

Articles
Spotlight on Pegasus Spyware
Could you be at risk for this invasive and nearly undetectable spyware?

Articles
Evolution of Crypto & Geopolitical Risk
What are some of the geopolitical implications of the rise of crypto and blockchain technologies?

Articles
Artificial Intelligence Apps: Associated Privacy Risks and How to Address Them
Addressing privacy risks associated with Artificial Intelligence (AI) apps

Articles
Rising Physical Security Threats to Cryptocurrency Leaders
Physical security threats to cryptocurrency leaders are on the rise, learn the best practices to protect assets.

Articles
Books - Red Five Security
If you are looking a resiliency book, our books have you covered. Our Founder, Kris Coleman, is the foremost expert on resiliency.