Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementCareer IntelligenceSecurity Leadership and Management

Are Security Degrees What They Seem?

By Jerry J. Brennan
Jerry Brennan
Are Degrees What They Seem?, Security Magazine October 2017 Career Intelligence
Jerry Brennan
Are Degrees What They Seem?, Security Magazine October 2017 Career Intelligence
October 1, 2017

Last year, I wrote a column titled “To What Degree Does Your Degree Matter.” What was true then holds true today: many organizations still regularly refuse to consider candidates who do not have a degree for executive and managerial positions. This is consistent across both public and private sector organizations.

Acquiring a higher-level education is time consuming and expensive, and fraudsters have long been marketing fast-track ways to obtain what appears to be an impressive diploma, at least on the surface. These programs and methods have been around for many years; therefore, it is not always easy to identify what is real and what is a wasted investment of your money and time.

Legitimate online degrees became much more readily available via the internet, and that pathway to education was – not unexpectedly – similarly exploited by so-called “fake degree” programs. An internet search will return an astonishing number of results where you can buy official looking copies of degrees and transcripts.

There is a long history of investigation into these schemes. Between the early 1980s and 1990s, the FBI conducted an extensive investigation (Dipscam) and collected more than 12,000 records of fake degrees obtained by government employees. Then in 2001 the General Accounting Office (GAO) conducted a study on this same issue within the government, and in 2004 the U.S. congress held hearings on the extent of this problem. Both the Office of Personnel Management (OPM) and the U.S. military reported a disturbing level of individuals having received promotions based on fake diplomas.

Fraudulent online degree mills are clearly a problem, and some U.S. states have stepped up to the issue. Oregon, New Jersey and North Dakota have all adopted tough laws that include fines and jail time for using fake degrees to gain employment.

Given the extensive news coverage on the issue and related investigations, one might think that all state legislators as well as corporate HR departments would have raised awareness of the issue. Regrettably that has not been the case, and today these diploma mill operations are not just alive, but thriving. Their victims can be found worldwide. One example would be Saudi Arabia’s Council of Engineering that, in 2014, found that over 30,000 of their foreign engineers had fake degrees.

While working on various SMR recruitment projects, I have come across candidates who have degree-related issues. I recently interviewed a candidate who previously held a responsible position with a high-profile police agency. He applied for a Director of Security role, and when verifying his background, I learned he was using fraudulent education credentials. Unfortunately, this was not an isolated incident. I often see education claims from unrecognized colleges, and earlier this year SMR did some research into how people get taken in by these schemes.

One of the approaches the scammers use is to ask the student to write an extensive biography of their background including training and professional accomplishments. Copies of supporting documentation are submitted, and a degree is then awarded based on their life experience. In one instance, we found that the online university site had set up several fake accrediting organizations, which they also owned, to give the appearance of legitimacy. We delved further and were able to unwrap the registrations of the domains and companies associated with the university. We found what appeared to be direct connections to an organization in mainland China.

There are warning signs that signal the degree being offered is unlikely to be legitimate, and they include:

  • Offers for work or life experience degrees with no additional course work;
  • Degrees awarded for a flat fee;
  • No waiting, accelerated programs with no studies, exams or materials;
  • No interaction with professors either online or in a classroom setting;
  • Pushy high-pressure advertising tactics, telemarketers or offers for discounts or finder fees to bring in new students;
  • It is a virtual college with no actual business location; or
  • The name of the organization is either similar to a well-known institution or has a credible-sounding foreign name.

A degree from one of these entities will be problematic when you apply for a job. However, obtaining a degree from an unaccredited college or university can also cause issues. There are generally two types of these schools: One has actual brick and mortar facilities offering onsite classes, and the other uses online distance learning that additionally requires formal course work and exams. While some of these schools do obtain accreditation for perhaps one of their degree programs, that may not be the case for all of their offerings. Additionally, this does not retroactively confer accreditation to programs previously offered.

Employers often reimburse employees for higher learning classes, however some major corporations do not differentiate between accredited and unaccredited. This is at odds with other corporate employers that require your degree be from a government-recognized accredited school. Going forward, the challenge students from an unaccredited program face is that most accredited institutions will not accept credits for course work done or degrees achieved at unaccredited schools. Selecting a school with accreditation will always be the better choice regardless of whether you or your employer is funding it.

From the standpoint of prospective students, when it comes to educational credentials there are no shortcuts. Do your research. You want the time, effort and cost you expend to further your career in a positive fashion. Use online resources such as the Council for Higher Education Accreditation and the U.S. Department of Education to validate institutions.

From the employer perspective, the cost and potential liability of a bad hire coupled with the associated corporate reputational damage can be entirely avoidable. The facades of these education schemes are sure to become even more sophisticated, so it is critical that due diligence programs and policy controls be implemented. Hiring managers and HR professionals under pressure to fill roles need to be trained to recognize potential problems.

Being educated about education is smart business.

KEYWORDS: security career security degrees security education

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Women cleaning out her desk

    What's your backup security career plan?

    See More
  • security recruitment

    What can a security recruitment firm do for your career?

    See More
  • trophy

    Are awards valuable to your security career?

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!