We’ll be looking at a collection of tactics used by attackers to bypass security technology by targeting the weakest link – the human in the chain.
Social engineering is really just an overly technical term for knowing how to persuade people to do something against their best interests or against their better judgment.
Hero bodyguard throws himself in front of client after motorbike hitman opens fire
A man on a motorbike cruises into the hotel grounds and pulls up close behind the SUV when the bodyguard places himself between the woman and the attacker.
Global Risk RoundUp – November 2019
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
How To Stay Present On Task
To be present means to be pre-sent, to already be there when it happens. Since the nature of the mind is to wander, it must somehow be coaxed into the current moment, tamed specifically for protective work.
Insider Threat
The insider threat of crime to organisations is always present and can manifest itself in many ways. This has become more apparent because of the recent social-economic climate change within the UK.
Protecting Politicians
As recently as January of this year a man was jailed for a string of threating abuses against Mark Prisk, the MP for Hertford and Stortford. Perhaps the most worrying aspect of the story around this attack is that Prisk was so fearful that he failed to attending a hustings. He is not the only MP who has had to change his course of action due to threats. In February last year Diane Abbott, who was suffering cyber-attacks claimed she was fearful of walking the streets of her own constituency.
Preparing for the General Data Protection
When the Data Protection Act 1998 was implemented nearly two decades ago, fewer than 10% of UK households had internet access. The technological world has moved on at an exponential pace since then, and a new law was required to reflect and address the current and foreseeable trends in technology and the use and misuse of personal data by organisations. Massive data breaches seem to be in the news every day now – and it was clear that the security of personal data was not being given a high enough priority.
Global Risk RoundUp – July 2019
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: Three Explosions Reported in Mogadishu, Multiple Fatalities Reported as Measles Outbreak Continues to Spread Nationwide, Dozens Arrested in Suspected Terrorism Financing Ring, Fatalities Reported following Explosions in Jolo, Sulu Province
Introduction to Cybersecurity
Cybersecurity is often seen as a niche area which requires a lot of specialist knowledge to apply. This is partly true – in order to configure a web application firewall someone needs to understand how to work with the technology at a very low level. What is often missed, as the technologists take over, is that cyber is still security and the same fundamental principles apply to designing and building effective protections.
Airbourne IEDS
Shiite extremists remaining in Baghdad have added a relatively new weapon to their arsenal in the fight against U.S. forces, one with more destructive power than most of the usual improvised explosive devices planted along city thoroughfares – the improvised rocket-assisted mortar.
Global Incident Report – May 2019
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks, here is your summary of the last 30 days. Including: 40 dead in armed attack in Mali, 13 killed in Hostage situation in Mexico, Multiple Islamic State Militants killed in Iraq and explosion on a bus in Sweden.
Protective Surveillance
With each client, the situation and threat level will vary, as will their requirements and appetite. When it comes to security there are a myriad of options available, often (and hopefully) with multiple, complementary components working together in harmony. One weapon in the personal protection armory is Protective Surveillance. This article attempts to provide a comprehensive overview of a service that has multiple benefits, quite a few limitations and several misrepresentations.
Zero Days, How Do You Stop a Threat You Can’t See Coming?
This past March, WikiLeaks dumped 8,761 CIA documents collectively known as “Vault 7.” These documents contained information about what was essentially the government agency’s armory of cyber threats.
They included malware, viruses and Trojans used for espionage purposes. More importantly, they had information about zero day vulnerabilities the CIA had been using to hack computers, tablets, smartphones and other devices for intelligence gathering purposes.
The DEEP End
the Deep End, the (Dynamic Evolution Of Executive Protection) can you swim? Since the beginning of time, everything from man to nature has or is evolving; the protection theater is no different.
Ignore Terrorism… And we loose…
We are not immune to attack and we owe it to our clients to be well versed on terrorism, and international conflicts, which could have domestic consequences. Ignore what’s going on overseas, and ignore terrorism and we face losing at home.
Man, That Burns!
A brief look at MACE Pepper Gel for Protection Specialists. Pepper Gel is a great option for confrontations that may not warrant a lethal force response.
How Criminals Operate
You need to be aware of how criminals and terrorists operate and what they look for in their victims; if you know this, you can hopefully avoid becoming a victim yourself.
Cyber-Security Offshore
Over the past few years we have seen many incidents of cyber-attacks in the maritime and offshore oil and gas sectors including the tilting of oil rigs, malware riddled platforms and even port facilities industrial controls systems being hacked. Despite these incidents there seems to be a distinct lack of awareness throughout organisations.