Women and Online Dating: 6 Tips in Finding Mr. Right and Not Mr. Wrong

27 September in Personal Safety

For women, the days of finding Mr. Right at traditional places like work, at church, or even in a bar have gradually been replaced with online dating services that have exploded in membership within the last decade. The #1 rated dating service Zoosk now reports it has a cadre of 35 million singles in its database who send over 3 million messages daily to their prospective match. And that’s just one online dating service! Services such as Zoosk, Match, eHarmony and others are replete with...

Five Steps in Securing Special Events

27 September in Business Continuity Planning, Corporate Security, Legal Security, Personal Safety

Special events take many forms and are commonplace in today’s business environment. Awards ceremonies, trade shows, product launches, special sales and holiday events are examples of “special events” common to the business environment and security industry. These occasions are unique in many ways but share a common element in that they are irregularly scheduled and do not occur on a frequent basis. Examples may include special sales gatherings, company recognition picnics and parties, employee gatherings off site, company award trips, going out of business sales,...

Realtor’s Beware: 3 Security Tips for Real Estate Agents

27 September in Personal Safety, Workplace Violence

The year was 1986 and I was a first office FBI Special Agent in Atlanta, GA. It was the same year I bought my first house. I remember working with a great realtor and the excitement that amassed when she provided me with the house keys after all the documents were signed at closing. I’d have to say my realtor experience was a good one that totally assuaged my adulthood fears of home buying. But my association with realtors didn’t end there. That same year on...

The Cyber Threat – What the Experts are Saying

27 September in Business Continuity Planning, Corporate Security, Legal Security, Security Consulting

The cyber threat is growing and evolving at a rapid pace. This presents challenges for Federal agencies that share similar concerns and resolve in combating cyber-crime. The FBI appears to be ready for the fight on Cyber Crimes and is one of its top investigative priorities. Armed with a whole new set of technological and investigative capabilities and partnerships, the Bureau is now as comfortable chasing outlaws in cyberspace as tracking criminals down back alleys and across continents. The most significant cyber threats facing our nation Cyber...

Cyber Security: 10 Ways to Improve the Security of Your Computer

27 September in Business Continuity Planning, Corporate Security, Security Consulting

In recognition of National Cyber Security Awareness Month, we are bringing you a series of articles to provide you with critical cyber protection tips and information. These tips will help you keep your information safe, ensure you are current on FBI recommended protocols for your organization’s information safety, and how everyone can take steps to ensure that they and their loved ones are cyber safe. A sobering reminder about computer security Computers, laptops, iPads, and mobile devices offer windows to the world. At the same time, the...

Run, Hide and Fortify®: A Recommended Approach for Businesses

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Security Consulting, Travel Safety, Workplace Violence

John Farrar, our guest blogger this month, brings us the final article in the Run, Hide and Fortify® series. This article concentrates on businesses pre-planning for the worst-case scenarios - A recommended approach for Businesses. Businesses that take steps to prepare for the types of incidents discussed in Article I and II of this series, will find a carry over to improvements in their overall functioning to other types of events and increased business resiliency. People would be surprised to know how many...