With attacks taking place in areas where large volumes of the public are gathered – be it on a public transport network, going about their daily lives in a big city, or attending a high-profile event, we live in a society where security is continually being challenged.
Non-Lethal Hostage Rescue
A non-lethal method of entry device that is being used by some of the world’s elite forces to punch the first entry point into a building is the ‘Wall-Breaker’. Terrorists will not expect a response team’s point of entry to be straight through a solid wall, the floor or ceiling.
Taking A Domestic Client Abroad
8 Things to Remember As the designated protection you may have to create a plan for taking a domestic client abroad. If so, here are 8 things to consider before you set off. 1.The Advance: In some third world countries, the advance can be more challenging to effectively execute; that said, never go on […]
Surveillance Detection For Countering Terrorism
The ability to detect suspicious activity early in the planning phase is the primary means of defeating a terrorist attack. Thus, surveillance detection (SD) has become critical to successful intelligence collection, counter terrorism and security operations. By applying effective surveillance detection to security and counter terror operations we can effectively detect and prevent terrorist attacks in the planning phases, reduce the number of attacks and allow for safer operations in high risk environments.
Security Systems For Business
How To Choose The Best System For You.
As a business owner, your mind can only be put fully at ease when you are certain that your business assets are secure from potential thefts. Whatever the size of the business, whether it is small or large, retail or commercial, it is guaranteed to have a range of valuable assets like computer systems, data and other expensive items that are at risk of theft.
Cyber-Security Offshore
Over the past few years we have seen many incidents of cyber-attacks in the maritime and offshore oil and gas sectors including the tilting of oil rigs, malware riddled platforms and even port facilities industrial controls systems being hacked. Despite these incidents there seems to be a distinct lack of awareness throughout organisations.
The Problem with Selfies
We have all heard the old saying, “Pictures are worth a thousand words,” so who wants an autograph, when a photo with your favorite celebrity conveys much more perceived authenticity? This also has value in the arena of SOCIAL capital.
Residential Security Recommendations
For most people, the consideration for an in-home security system or at least some type of countermeasure derives from the concern for protecting their assets. Assets can be the valuable property within their home or apartment or perhaps the most valuable property of all – their family
How Much Do Security Companies Make?
People who have never been a business owner might wonder ‘how much do security companies make?’ Is it a profitable industry and where is the money made? As the owner of a security company I believe, as many do, that transparency is paramount to running a reputable business. This article specifically looks at the door and event security side of the market as well as factoring in low-level security guardin
Hostile Surveillance Detection
Hostile surveillance detection is one of the few security techniques that preempts danger. As the name suggests it is the art of identifying an individual or group that is attempting to obtain intelligence by placing your client under surveillance. Its main advantage as a security tool is that it is proactive rather than reactive.
Driving in Hostile Areas
Over a 24-year career, I have seen little need for evasive driver training, however, I have seen a great need for people to learn how to handle vehicles at high speed and in hazardous weather conditions. The main thing you need to practice is how to drive safely, identify any possible threats and avoid them.
Search Tactics for Out of Work Security Professionals
Searching for employment in the security industry is not to be taken lightly and it should all be planned like a military operation. You need to start as you mean to go. When searching you should act the same way as you would when you are on an operational assignment. These search tactics for out of work security professionals will offer guidance and help you find success in your search for employment.
Working with a VIP doesn’t make you one
Sometimes, close protection agents have a tendency to define themselves based on the status of their Principal. However, it’s worth remembering that working with a VIP doesn’t make you one!