But of course, the students who flood off to colleges and universities in their late teens and twenties are rarely bedevilled by such thoughts! So why, when it comes to learning later in life, to undertaking vocational-related training and – of course – distance-learning, do we find it so difficult to succeed?
Cyber Security Hiring
Whether you’re a seasoned cybersecurity professional or are looking to transition into the industry, it’s hard to know how to grab the attention of hiring managers and ultimately improve your chances of making it to the next stage.
Here are eight top tips from Renana Friedlich-Barsky, Director and Global Head of Cybersecurity Operations at PayPal, a proven leader in this space who’s reviewed more than her fair share of applications over the years.
Crisis Management and Social Media
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
The Key Elements of Counter Surveillance
Counter Surveillance is defined as the actions that a person (or team) carries out, in order to detect that a person (Principal) is under surveillance and to identify the composition and makeup of a hostile surveillance team.
In this article, Pete Jenkins talks through the key principles of a counter-surveillance operation.
Clients Should You Trust them?
There needs to be a healthy relationship with your clients, you don’t want to let them dominate you, and you don’t want to try to dominate and control them.
Boundaries must always be made clear as this works to protect you and your client’s interests. Clients are not your friends, they are clients paying you to provide them with a service, and if boundaries are ignored, it can undermine any respect in the business relationship.
Cyber Security
Especially while many people are still remote, technology has become more and more central to people’s lives, and we are talking about ways that things will or will not return to normal. As we hear about more and more cyber security incidents, each supposedly carried out by ‘sophisticated threat actors with unprecedented capabilities’, it’s time to talk about the mystique of cyber security and the problem it has with public perception.
Global Situation Report – September 2021
As the battle for control of Afghanistan unfolds following the withdrawal of foreign troops, Pakistan will aim to consolidate its influence in the country.
Pakistan has historically relied on its good relationship with the Afghan Taliban to keep TTP fighters in check. As it awaits the rise of the ultimate power bearer amid the turmoil in Afghanistan, Islamabad will focus on preventing violence in its western provinces that poses a serious threat to CPEC-related Chinese investments.
Industry News – August 2021
England’s Euro 2020 heroes hired security and bodyguards to protect them on holiday after Harry Maguire incident Players were aware of the problems Harry Maguire found himself in when arrested in Mykonos last year. So a large number went away with security, who spent their evenings sat at the back of restaurants and bars sipping […]
Ransomware, Insurance, and Backups
Most people are not aware of the real impact and threat of ransomware campaigns going on almost constantly. While I’m sure everyone knows of the ransomware attack on the Colonial pipeline and the more recent similar attack on JBS, these are only the latest and most visible in a continuous stream of attacks. These are just the tip of the iceberg. The true scale is hidden not only by the media but also by a reluctance to talk about the problem.
Industry News – At A Glance
We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue. Including, attack in Afghanistan, Boko Haram Leader dead, severed heads in Mexico and Kevin Durant’s Bodyguard charged.
Technology as a Standalone Security Solution – Are We Fooling Ourselves?
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Emotional intelligence
In today’s lifestyle and business dynamics, solving emotion-related problems is equally crucial in both personal and professional settings. In a professional context, we deal with complex problems and must work as a team to provide the most efficient solutions for our principals or clients.
COVID-19 Is it Just another threat?
Is it not just another type of threat that the modern bodyguard must adapt to, or should we be covering this type of threat already? If the client would be susceptible to the virus due to the nature of their work, then how can we protect them without putting them into isolation? What emotional worries and stress will this have on the family? What new roles should we undertake? Or should we not?
Jailed Abroad! Avoiding Crime and Corruption When Travelling
These days if you travel internationally or work in emerging markets, you are running the risk of being arrested for some reason. Criminals are not the only ones who can end up in handcuffs! It may come as a shock to some people, but many police forces are corrupt. And this is not just in the emerging markets.
TSCM in the Workplace – How to Provide an Accurate Quote For Services
Planning and considerations to take into account when putting together a quote for providing TSCM services. The ability to accurately quote for a TSCM inspection has many permutations, and each TSCM provider has its own formula for quoting. This article looks at the main criteria you need to take into consideration.
Introduction to Steganography
All the techniques of steganography share one core concept, trying to hide a message. When children draw stick figures as secret messages to each other, they are practicing steganography. Modern steganography is usually a lot more malicious. It is used in malware command and control and the exchange of illicit information and material. If you do not know where to look it is frighteningly hard to detect.
Ammunition – Why the JHP? Part 2
Bullets are bullets and ammunition is just ammunition, right? The reality is, that statement couldn’t be further from the truth. As outlined in my last article, bullets (or projectiles) come in many different forms and these forms have their intended purpose. In this installment, I want to dive deeper into the application of the Jacketed Hollow Point (JHP). The reason this projectile is going to get its own article is due to the importance of it and how it applies to self-defense and in the industry of close protection.
Securing Smart Home Devices
Smart home technology is a rapidly growing consumer and business product. Here are some figures that show projections for the growth of these devices, as well as current numbers
Foot Steps Episode 5: Mike Smith
Describe your professional journey?
I played on the Georgia State Patrols basketball league then joined the reserve sheriffs, I then did freelance security with 2 Georgia state troopers that started a company. I took a hiatus and actually became a barber while still doing security work on the side. While cutting hair I ran into someone who gave me a window of opportunity which led me to land a 6 figure contract. My company SS consulting specialized in threat assessments and advances but I didn’t just limit myself to that. I would land other contracts doing different types of security. The reality is, it’s who you know vs what you know.
Tactical Firearms – Methods of Carry!
If you are carrying a handgun for defensive purposes, you need to be able to get to it when you need it.
On the market today, there is a wide variety of holsters to choose from that vary in price from a few bucks to a few hundred; some are worth it, many are not. What most people forget when considering carry techniques for a handgun or any weapons for that matter is that they are going to have to be able to access the weapon in all environments with both strong and weak hands.