Protection officers worldwide who have extensive unarmed combat training will unreservedly answer this question with; “Of course!! How can a protection officer not have any self-defense or unarmed combat training! How can a protection officer not know how to physically protect?”
Welcome to the second article in this series looking at cybersecurity and its interaction with the protective and wider security world.
This time we’ll be looking at a collection of tactics used by attackers to bypass security technology by targeting the weakest link – the human in the chain.
A man on a motorbike cruises into the hotel grounds and pulls up close behind the SUV when the bodyguard places himself between the woman and the attacker.
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
To be present means to be pre-sent, to already be there when it happens. Since the nature of the mind is to wander, it must somehow be coaxed into the current moment, tamed specifically for protective work.
The insider threat of crime to organisations is always present and can manifest itself in many ways. This has become more apparent because of the recent social-economic climate change within the UK.
As recently as January of this year a man was jailed for a string of threating abuses against Mark Prisk, the MP for Hertford and Stortford. Perhaps the most worrying aspect of the story around this attack is that Prisk was so fearful that he failed to attending a hustings. He is not the only MP who has had to change his course of action due to threats. In February last year Diane Abbott, who was suffering cyber-attacks claimed she was fearful of walking the streets of her own constituency.
When the Data Protection Act 1998 was implemented nearly two decades ago, fewer than 10% of UK households had internet access. The technological world has moved on at an exponential pace since then, and a new law was required to reflect and address the current and foreseeable trends in technology and the use and misuse of personal data by organisations. Massive data breaches seem to be in the news every day now – and it was clear that the security of personal data was not being given a high enough priority.
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: Three Explosions Reported in Mogadishu, Multiple Fatalities Reported as Measles Outbreak Continues to Spread Nationwide, Dozens Arrested in Suspected Terrorism Financing Ring, Fatalities Reported following Explosions in Jolo, Sulu Province
Cybersecurity is often seen as a niche area which requires a lot of specialist knowledge to apply. This is partly true – in order to configure a web application firewall someone needs to understand how to work with the technology at a very low level. What is often missed, as the technologists take over, is that cyber is still security and the same fundamental principles apply to designing and building effective protections.