To clarify, the commercial close protection industry is challenging for most people to enter, mainly because it is a very small and ‘cliquey’ world where doors usually open for people if they know the right people. So, to start with, networking is a valuable key to opening the doors.
Success In EP, What does it mean to you?
How do you define success in the executive/celebrity protection industry? How do you know when you are a success or successful? Is your success helping move you forward or is it hurting you? Success has a different meaning to every individual.
Surviving Lockdown 3.0
No matter who you are, everyone has been affected by the pandemic, hopefully, all of us out there are surviving but no doubt there will be some that may be struggling more than most.
Executive Protection 2.1
William Shakespeare said, “Defer no time, Delays have dangerous ends”. What we do now in these trying times, we will either profit from or suffer from. Why is it that some survive these times in our industry, and some do not? What steps can be taken to avoid a crisis in your employment status?
HUMAN INTELLIGENCE
Intelligence is the information we obtain on a target or threat in order to locate them, gain information on their operations and to predict their future actions. Accurate intelligence is essential not only in security and counter-insurgency operations but also in the corporate world where companies need to know what their competitors are developing and planning.
Global Situation Report – November 2021
Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.
Online Health Check for Protectors
As security professionals you may be an attack vector to your client if you do not maintain basic online security controls. At the very least you should be in a position to provide basic advice to your clients in order to help them stay secure.
Lose the Fear, Love a Process!
But of course, the students who flood off to colleges and universities in their late teens and twenties are rarely bedevilled by such thoughts! So why, when it comes to learning later in life, to undertaking vocational-related training and – of course – distance-learning, do we find it so difficult to succeed?
Cyber Security Hiring
Whether you’re a seasoned cybersecurity professional or are looking to transition into the industry, it’s hard to know how to grab the attention of hiring managers and ultimately improve your chances of making it to the next stage.
Here are eight top tips from Renana Friedlich-Barsky, Director and Global Head of Cybersecurity Operations at PayPal, a proven leader in this space who’s reviewed more than her fair share of applications over the years.
Crisis Management and Social Media
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
Clients Should You Trust them?
There needs to be a healthy relationship with your clients, you don’t want to let them dominate you, and you don’t want to try to dominate and control them.
Boundaries must always be made clear as this works to protect you and your client’s interests. Clients are not your friends, they are clients paying you to provide them with a service, and if boundaries are ignored, it can undermine any respect in the business relationship.
Global Situation Report – September 2021
As the battle for control of Afghanistan unfolds following the withdrawal of foreign troops, Pakistan will aim to consolidate its influence in the country.
Pakistan has historically relied on its good relationship with the Afghan Taliban to keep TTP fighters in check. As it awaits the rise of the ultimate power bearer amid the turmoil in Afghanistan, Islamabad will focus on preventing violence in its western provinces that poses a serious threat to CPEC-related Chinese investments.
Ransomware, Insurance, and Backups
Most people are not aware of the real impact and threat of ransomware campaigns going on almost constantly. While I’m sure everyone knows of the ransomware attack on the Colonial pipeline and the more recent similar attack on JBS, these are only the latest and most visible in a continuous stream of attacks. These are just the tip of the iceberg. The true scale is hidden not only by the media but also by a reluctance to talk about the problem.
Technology as a Standalone Security Solution – Are We Fooling Ourselves?
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Emotional intelligence
In today’s lifestyle and business dynamics, solving emotion-related problems is equally crucial in both personal and professional settings. In a professional context, we deal with complex problems and must work as a team to provide the most efficient solutions for our principals or clients.
Introduction to Steganography
All the techniques of steganography share one core concept, trying to hide a message. When children draw stick figures as secret messages to each other, they are practicing steganography. Modern steganography is usually a lot more malicious. It is used in malware command and control and the exchange of illicit information and material. If you do not know where to look it is frighteningly hard to detect.
Ammunition – Why the JHP? Part 2
Bullets are bullets and ammunition is just ammunition, right? The reality is, that statement couldn’t be further from the truth. As outlined in my last article, bullets (or projectiles) come in many different forms and these forms have their intended purpose. In this installment, I want to dive deeper into the application of the Jacketed Hollow Point (JHP). The reason this projectile is going to get its own article is due to the importance of it and how it applies to self-defense and in the industry of close protection.
Securing Smart Home Devices
Smart home technology is a rapidly growing consumer and business product. Here are some figures that show projections for the growth of these devices, as well as current numbers
Foot Steps Episode 5: Mike Smith
Describe your professional journey?
I played on the Georgia State Patrols basketball league then joined the reserve sheriffs, I then did freelance security with 2 Georgia state troopers that started a company. I took a hiatus and actually became a barber while still doing security work on the side. While cutting hair I ran into someone who gave me a window of opportunity which led me to land a 6 figure contract. My company SS consulting specialized in threat assessments and advances but I didn’t just limit myself to that. I would land other contracts doing different types of security. The reality is, it’s who you know vs what you know.
Tactical Firearms – Methods of Carry!
If you are carrying a handgun for defensive purposes, you need to be able to get to it when you need it.
On the market today, there is a wide variety of holsters to choose from that vary in price from a few bucks to a few hundred; some are worth it, many are not. What most people forget when considering carry techniques for a handgun or any weapons for that matter is that they are going to have to be able to access the weapon in all environments with both strong and weak hands.