Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementPhysical Security

Education & Training

Conducting Background Checks in the Corporate Security Environment

Security professionals must now operate within a tightening legal framework that limits both the scope and utility of background information.

By Alan Saquella
male and female programmers working on computers

Berezko / iStock / Getty Images Plus via Getty Images

June 6, 2025

In the current threat landscape, the background check has become a critical frontline defense in protecting corporate assets, brand integrity and personnel safety. But as any security leader will tell you, the traditional background check — focused on criminal history, employment verification and references — has limitations, especially in today’s regulatory environment.

Federal and state restrictions continue to erode the depth and scope of what can be legally reviewed, and meanwhile, insider threats and deceptive candidates are becoming more sophisticated. In this context, it's no longer about whether to conduct background checks — it's about how to conduct them effectively, legally and in alignment with operational risk management strategies.

This article outlines modern best practices in corporate background screening, with a focus on layered, risk-adjusted approaches and the growing role of behavioral screening tools in identifying concealed threats early.

The Traditional Model: Still Necessary, but No Longer Sufficient

At the core, background checks still serve key functions:

  • Verification of credentials (education, employment, licenses)
  • Criminal history checks in relevant jurisdictions
  • Reference validation to gauge previous behavior

For entry-level or low-risk roles, this may suffice. But for mid-level and senior hires, or those handling sensitive data, finances or strategic assets, this baseline isn’t enough. Many corporate investigations I led revealed the same sobering trend: employees engaged in internal fraud or misconduct had no criminal history at the time of hire. They cleared the background check — and went on to cause damage inside the organization.

We also saw those same employees’ surface later at other companies, repeating their behaviors. The lesson is simple: past criminality isn’t the only — or best — indicator of future misconduct.

Regulatory Constraints: Blind Spots in the Background Process

Security professionals must now operate within a tightening legal framework that limits both the scope and utility of background information:

  • The Fair Credit Reporting Act (FCRA) requires consent, disclosures and a formal adverse action process.
  • Equal Employment Opportunity Commission (EEOC) guidelines discourage blanket policies that disproportionately affect protected classes.
  • State laws now restrict how far back employers can check into a candidate’s criminal record (often seven years or less), and some limit the use of certain types of offenses in hiring decisions.

In one state, a candidate is presumed rehabilitated five years after a conviction — making it difficult to deny employment based on that history. For security professionals tasked with preventing insider threats, fraud, or reputational harm, this creates significant gaps.

Tiered Screening: Match the Background Check to the Role

The best practice here is risk-tiered background screening. One-size-fits-all approaches not only waste resources but fail to address the varying levels of risk different positions present.

  • Low-risk roles: Identity confirmation, local criminal records check, employment, and education verification.
  • Moderate-risk roles: Add civil litigation history, professional license validation, and reference interviews.
  • High-risk or sensitive roles (executive, financial, security-cleared): Deep-dive investigations including federal records, global watchlists, door-knock interviews, and in some cases, polygraph examinations.

Security teams should align with HR to classify each role by risk category and build a scalable, role-specific screening matrix.

 In the current threat landscape, the background check has become a critical frontline defense in protecting corporate assets, brand integrity, and personnel safety.

Closing the Gaps: Enter Behavioral Risk Screening

The next frontier in background screening is behavioral.

Criminal checks reveal past convictions. Behavioral assessments reveal potential. They answer questions that criminal databases can’t:

  • How does a candidate rationalize dishonesty?
  • Are they prone to manipulating systems or violating policy?
  • How do they respond to ethical dilemmas under pressure?

Behavioral assessment applies structured, automated interviews to identify patterns of behavior associated with misconduct — such as rationalization, entitlement, risk-taking, and lack of remorse. It helps security and human resource professionals detect high-risk candidates before a hire is made, even when their record appears clean.

How Behavior Assessments Work

  • Automated Behavioral Interviewing: Candidates answer questions in a structured digital environment, removing interviewer bias and inconsistency.
  • Psycholinguistic Analysis: Software evaluates how people think, not just what they say — identifying deceptive or evasive tendencies.
  • Risk Scoring: Candidates are assessed against established behavioral risk models tied to workplace misconduct.

This tool doesn’t replace the background check — it complements it, filling in the behavioral gaps and offering predictive insight. In environments with legal restrictions on what historical data can be used, behavioral screening offers a legally compliant, risk-relevant solution.

Implementing Best Practices in Security Operations

Security professionals looking to tighten their hiring process should take the following steps.

  • Integrate with HR and Legal Early: Collaborate to develop role-based screening policies aligned with risk exposure and compliant with legal standards.
  • Layer Screening Tools: Combine traditional checks (criminal, civil, verification) with tools for behavioral profiling.
  • Standardize Documentation: Ensure all background screening activities are documented, consistently applied, and audit ready.
  • Train Stakeholders: Train hiring managers, recruiters, and security staff on interpreting behavioral data and using it as part of a broader threat mitigation approach.
  • Develop Red Flag Protocols: Create response frameworks for addressing high-risk findings — whether behavioral, criminal, or reference-based.
  • Re-Screen as Needed: For high-trust roles, conduct periodic re-screenings or use behavioral assessments during promotions or transfers.

Avoiding Pitfalls: Ethics, Privacy, and Perception

Behavioral assessment tools must be used ethically and transparently:

  • Inform candidates upfront that a behavioral assessment is part of the hiring process.
  • Validate that tools used are non-discriminatory and comply with all relevant employment laws.
  • Avoid using a single data point to disqualify a candidate — behavioral indicators should be part of a larger risk picture.

Security professionals know that perception matters. The goal is to build a culture of integrity, not fear. Clear communication and fair practices ensure that your screening strategy reinforces trust, not suspicion.

Final Thoughts: Building a Future-Ready Screening Strategy

We are in the middle of a shift: from retrospective checks based on static data, to predictive screening based on behavioral analysis. Security professionals who recognize this change — and adapt — will be better equipped to protect their organizations from internal threats and reputational harm.

Traditional background checks still matter. But today, they must be augmented by tools that address the unseen, the unrecorded, and the unresolved risks that can walk in through the front door.

Behavioral screening platforms provide the modern security team with a strategic edge: identifying high-risk individuals before they become internal problems.

KEYWORDS: background check background screening data privacy employee screening security regulation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alan

Alan Saquella, CPP, is an influential security and investigations expert with more than 30 years of security and investigations experience in corporate and public organizations at the executive level. He served for many years as the Security Operations and Investigations Director at Cox Communications before assuming his current role as a faculty team member at Embry-Riddle Aeronautical University — College of Business, Security and Intelligence. Saquella is also the Director, Investigations and Research at Verensics and a Member of the Identity Theft Advisory Board. Image courtesy of Saquella

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Retail Security

    Navigating retail security challenges: A comprehensive approach

    See More
  • Spray painted security camera

    Unleashing the potential of investigative techniques

    See More
  • Small business store fronts

    Protect small businesses: Addressing security threats and insider risks

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing