Social media can quickly become all things to all people meaning that one can find exactly what they’re looking for at any time, anywhere, and at the stroke of a key, or swipe of a computer screen. However, the technology can also work against you when someone is negligent in their use or management of it.
Deciding How To Start Your Career In Close Protection
Who, when initially looking for a close protection course, tried to find the cheapest course and quickest route possible to your badge? Who researched their training provider and checked out all the credentials and qualifications of their instructors?
Who doesn’t intend to do any other training until they find at least some work to pay back their initial training costs? Who, reading this, has attended an ‘accredited’ training course but has actually never yet done a day’s work as a designated protection officer? I could go on, but well… you get the picture!
How To: Secure Calls and SMS with Signal
Signal uses phone numbers to identify contacts, however encrypted messages and calls use a data connection with a secure tunnel between participants. Intervening servers or infrastructure do not have access to the encryption keys, and so cannot realistically eavesdrop on any communications even if compromised. On Android Signal can be set up to replace your default text message client, and will handle unencrypted SMS messages as well.
Keeping Your Edge – Measured Responses in Tour Security (Part I)
Spend any significant amount of time providing protection for entertainers involved with stage performances, and you will likely encounter one of this segment of the industry’s biggest headaches, the stage crasher.
The motivation for these individuals comes in various forms, some are “super fans” who see getting on the stage with the celebrity as the ultimate form of expression of their loyalty and support. They often refer to it as a once-in-a-lifetime opportunity, and despite common sense, the threat of ejection, arrest, or sometimes worse, they still needed to make the attempt.
K9 in Private Protective Services
Since I am often employed as the agent in charge (AIC), you generally are assigned to the principal and the duties don’t lend themselves to be the K9 handler. You have a choice, either work the principal of work the K9, but rarely can you do both. However, that doesn’t mean there is not considerable opportunities for K9s and handlers in protective services.
Typically, these dogs fall into one or two categories. There are dogs that are single-purpose dogs, meaning they have one task they perform. While others are dual-purpose, meaning they are trained to perform a variety of tasks. The three biggest categories that they fall into are Apprehension, Detection and Search & Rescue.
How to be Cyber Safe When on Public WiFi
Connecting your device to the World Wide Web isn’t an issue when you’re at your place. It’s relatively safe, simple to do, and free of crowded traffic. When you leave the safety of your home to a public area, the story changes. When you connect to public Wi-Fi in different places, making certain you can still connect with people, read online news, and work remotely, are you aware of the risks?
Keeping Your Edge – Flowers For the Living
regret that comes from knowing that you could have done more to support a person in life, even if just by offering a kind word or two. Some might think a topic like this has no place in an Alpha industry like Close Protection but consider that a large part of our ranks are pulled from both law enforcement and the military. We can all see how helpful positive reinforcement has been for those stressful careers.
Global Risk RoundUp – March 2020
About Drum Cussac, a GardaWorld company
Because we put your people first, we’ve built cutting-edge risk and security which keeps up with the pace of change. The only risk and security platform to feature monthly updates, GlobalRiskManager is purpose built to be future-proof and can seamlessly integrate with your own systems. This, combined with over 20 years’ of industry knowledge and a team of in-house security experts, provides you with a comprehensive end-to-end risk and security solution – done your way.
What to Do about School Shootings?
As security professionals, we must not allow ourselves to be caught up in either politics or hysteria. Our approach must reflect what we have been trained to do: dispassionately apply sound security principles to this security threat.
After every such event, the blame begins. Some blame the National Rifle Association (NRA), gun owners in general, and Donald Trump in particular, and call for banning firearms, or at least banning AR-15-type rifles. Others blame video games, violent movies, the culture, or the Kardashians. And the political games continue.
The Mentality of the Modern Protector
Over 30 years ago, when I left a failing white-Collar industry in a failing economy in Texas, I did what many in my predicament did. I entered the contract security industry at near minimum wage. What I did that many others did not, was survive in the industry long enough to out earn annually what I was earning in my previous profession.
Global Risk RoundUp – Feb 2020
Global Risk RoundUp – Feb 2020
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
The Man in the Middle – Intro to Cybersecurity
Welcome to a third article in the series looking at introductions to cyber security. We’ll be looking at a type of attack which most people will be familiar with in principle, if not in technical practice.
The basic idea is simple – an attacker sits between two trusting parties, intercepting their communication and impersonating each to the other. Obviously this is somewhat harder in practice where people are, for example, sitting in a room together, but even a phone call gives potential for an eavesdropper or impersonator.
Global Risk RoundUp – January 2020
Global Risk RoundUp – January 2020. Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Women In The Close Protection Industry
First, I prefer placing female CPO’s with female clients or their children for the client’s comfort or peace of mind. Some males are easily suited to this task but the client may simply think that a male does not belong in constant close proximity and occasionally in isolated private settings with the kids or a client’s wife. This can be equally true with female CPO’s and male clients but the concern of inappropriate behavior with the children dissolves when a female is placed with them. Remember, it’s always up to the client.
Residential Security
Residential security (RS) is something that is usually taken very lightly, most believe putting in an alarm system and maybe a camera or two is all that’s required.
It is common knowledge that one of the favored places for criminals and terrorists to target a victim is when they are in, entering or leaving their residence; RS must be taken very seriously. In times of civil unrest looters will be looking to target any location that has valuables, weapons or assets that they can use and that has minimal security, this means most residential properties.
Assignments Over. Now What?
So you got the tap for the assignment and a spot on the detail? You are good to go for the next several days, weeks, or possibly even months. It’s constant work.
Gap Training – What Most Practitioners Overlook
Many industry practitioners understand and embrace that continuing education is a necessity in a highly competitive, rapidly evolving industry such as protective services. Yet, there is a commonly overlooked issue which leaves gaps for most. When selecting training, do you find trendy topics, or do you train to fill your gaps?
Yet, there is a commonly overlooked issue which leaves gaps for most. When selecting training, do you find trendy topics, or do you train to fill your gaps?
Manners Maketh Man
The proverb ‘manners maketh man’ derives from a shared understanding that courtesy and good manners are essential to the preservation of human interaction and relationships.
Good manners can be applied to several aspects of human life, including how we speak, the words we use, the tone of our voice, our gestures and our actions.
Social Engineering and Cybersecurity
We’ll be looking at a collection of tactics used by attackers to bypass security technology by targeting the weakest link – the human in the chain.
Social engineering is really just an overly technical term for knowing how to persuade people to do something against their best interests or against their better judgment.
Industry News November 2019
Industry News November 2019, At A Glance. We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.