Over 30 years ago, when I left a failing white-Collar industry in a failing economy in Texas, I did what many in my predicament did. I entered the contract security industry at near minimum wage. What I did that many others did not, was survive in the industry long enough to out earn annually what I was earning in my previous profession.
Global Risk RoundUp – Feb 2020
Global Risk RoundUp – Feb 2020
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
The Man in the Middle – Intro to Cybersecurity
Welcome to a third article in the series looking at introductions to cyber security. We’ll be looking at a type of attack which most people will be familiar with in principle, if not in technical practice.
The basic idea is simple – an attacker sits between two trusting parties, intercepting their communication and impersonating each to the other. Obviously this is somewhat harder in practice where people are, for example, sitting in a room together, but even a phone call gives potential for an eavesdropper or impersonator.
Global Risk RoundUp – January 2020
Global Risk RoundUp – January 2020. Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Women In The Close Protection Industry
First, I prefer placing female CPO’s with female clients or their children for the client’s comfort or peace of mind. Some males are easily suited to this task but the client may simply think that a male does not belong in constant close proximity and occasionally in isolated private settings with the kids or a client’s wife. This can be equally true with female CPO’s and male clients but the concern of inappropriate behavior with the children dissolves when a female is placed with them. Remember, it’s always up to the client.
Residential Security
Residential security (RS) is something that is usually taken very lightly, most believe putting in an alarm system and maybe a camera or two is all that’s required.
It is common knowledge that one of the favored places for criminals and terrorists to target a victim is when they are in, entering or leaving their residence; RS must be taken very seriously. In times of civil unrest looters will be looking to target any location that has valuables, weapons or assets that they can use and that has minimal security, this means most residential properties.
Assignments Over. Now What?
So you got the tap for the assignment and a spot on the detail? You are good to go for the next several days, weeks, or possibly even months. It’s constant work.
Gap Training – What Most Practitioners Overlook
Many industry practitioners understand and embrace that continuing education is a necessity in a highly competitive, rapidly evolving industry such as protective services. Yet, there is a commonly overlooked issue which leaves gaps for most. When selecting training, do you find trendy topics, or do you train to fill your gaps?
Yet, there is a commonly overlooked issue which leaves gaps for most. When selecting training, do you find trendy topics, or do you train to fill your gaps?
Manners Maketh Man
The proverb ‘manners maketh man’ derives from a shared understanding that courtesy and good manners are essential to the preservation of human interaction and relationships.
Good manners can be applied to several aspects of human life, including how we speak, the words we use, the tone of our voice, our gestures and our actions.
Social Engineering and Cybersecurity
We’ll be looking at a collection of tactics used by attackers to bypass security technology by targeting the weakest link – the human in the chain.
Social engineering is really just an overly technical term for knowing how to persuade people to do something against their best interests or against their better judgment.
Industry News November 2019
Industry News November 2019, At A Glance. We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.
Global Risk RoundUp – November 2019
Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via in-house experts, cutting edge technology and through a comprehensive global source network. Here is your summary of the incidents you need to know about from the last 30 days.
Church Security the New Frontier Part 5
I want to start this article by saying that it is sad to have to write an article about the many concerns about the use of guns in church.
Whether it is from the standpoint of someone coming to cause a problem with a gun in a church or those called to protect the church from these types of situations, we are clearly talking about something new in the area of everyday church life. As I do church protection seminars in different parts of the country we cover a vast number of subjects dealing with church safety. Everything from aggressive friendliness to zero tolerance. There is always, however, one subject that people want to talk about to which I cautiously comply and that is this subject of guns and churches.
The Science Behind Protection On The Move
Any delay in the decision-making process increases the difficulty needed to survive an AOP (Attack On the Principal). In a vehicle, delays are measured in tenths of seconds. When you are driving 60 mph, literally in a blink of an eye, you are 17.6 feet closer to the problem and in a second 88 feet closer to the problem. Tony Scotti delivers the science behind protection on the move and how we can dramatically increase the chances of surviving the emergency.
Church Security the New Frontier Part 3
I have many happy memories as a child going to church regularly being with my friends and family. One day however sticks out in my mind above all others. On this day, a man keeled over in the pew in front of me and the havoc that ensued is still clear in my memory… Emergency.
Since there are no guarantees that you will never be involved in an emergency, this article will help you to understand some of the things necessary to properly handle, or ideally help prevent, a crisis situation in a house of worship.
Anti-Surveillance Measures When Mobile
Anti-surveillance is defined as the actions that a person would take or do, in order to detect if surveillance is present. The person is aiming to draw the surveillance in by generating two things; multiple sightings and unnatural behaviour. As with our foot anti-surveillance drills, when mobile in a vehicle, these drills can also be covert and subtle or overt where it obvious to the followers what you are doing.
Insider Threat
The insider threat of crime to organisations is always present and can manifest itself in many ways. This has become more apparent because of the recent social-economic climate change within the UK.
Keeping Your Edge – Don’t Get Comfortable
That is the brass ring in our business, AKA the sacred cow, however, on the road to eating Filet Mignon, there are bound to be several Big Mac’s along the route.
So, as we proceed on this journey to success, we have to make sure we navigate the potholes, namely, doing the job as required without becoming too comfortable in our role, leading to potentially disastrous results.
Protecting Politicians
As recently as January of this year a man was jailed for a string of threating abuses against Mark Prisk, the MP for Hertford and Stortford. Perhaps the most worrying aspect of the story around this attack is that Prisk was so fearful that he failed to attending a hustings. He is not the only MP who has had to change his course of action due to threats. In February last year Diane Abbott, who was suffering cyber-attacks claimed she was fearful of walking the streets of her own constituency.
Preparing for the General Data Protection
When the Data Protection Act 1998 was implemented nearly two decades ago, fewer than 10% of UK households had internet access. The technological world has moved on at an exponential pace since then, and a new law was required to reflect and address the current and foreseeable trends in technology and the use and misuse of personal data by organisations. Massive data breaches seem to be in the news every day now – and it was clear that the security of personal data was not being given a high enough priority.