Business Continuity Planning

Five Steps in Securing Special Events

27 September in Business Continuity Planning, Corporate Security, Legal Security, Personal Safety

Special events take many forms and are commonplace in today’s business environment. Awards ceremonies, trade shows, product launches, special sales and holiday events are examples of “special events” common to the business environment and security industry. These occasions are unique in many ways but share a common element in that they are irregularly scheduled and do not occur on a frequent basis. Examples may include special sales gatherings, company recognition picnics and parties, employee gatherings off site, company award trips, going out of business sales,...

The Cyber Threat – What the Experts are Saying

27 September in Business Continuity Planning, Corporate Security, Legal Security, Security Consulting

The cyber threat is growing and evolving at a rapid pace. This presents challenges for Federal agencies that share similar concerns and resolve in combating cyber-crime. The FBI appears to be ready for the fight on Cyber Crimes and is one of its top investigative priorities. Armed with a whole new set of technological and investigative capabilities and partnerships, the Bureau is now as comfortable chasing outlaws in cyberspace as tracking criminals down back alleys and across continents. The most significant cyber threats facing our nation Cyber...

Cyber Security: 10 Ways to Improve the Security of Your Computer

27 September in Business Continuity Planning, Corporate Security, Security Consulting

In recognition of National Cyber Security Awareness Month, we are bringing you a series of articles to provide you with critical cyber protection tips and information. These tips will help you keep your information safe, ensure you are current on FBI recommended protocols for your organization’s information safety, and how everyone can take steps to ensure that they and their loved ones are cyber safe. A sobering reminder about computer security Computers, laptops, iPads, and mobile devices offer windows to the world. At the same time, the...

Run, Hide and Fortify®: A Recommended Approach for Businesses

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Security Consulting, Travel Safety, Workplace Violence

John Farrar, our guest blogger this month, brings us the final article in the Run, Hide and Fortify® series. This article concentrates on businesses pre-planning for the worst-case scenarios - A recommended approach for Businesses. Businesses that take steps to prepare for the types of incidents discussed in Article I and II of this series, will find a carry over to improvements in their overall functioning to other types of events and increased business resiliency. People would be surprised to know how many...

Run, Hide and Fortify®: Individual Preparation

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Travel Safety

John Farrar, our guest blogger this month, brings us part two of the Run, Hide and Fortify® series – ‘Individual Preparation and Situational Awareness’ – become aware of your surroundings and what to do when crisis situations occur. Individual Preparation Everyone should strive for a general awareness of his or her immediate environment. It doesn’t take years of meditation or graduating from some High-Speed Low Drag training course. The idea is to just be present in the here and now. Try not to be so engrossed in...

Telephone Security – Why Less is More

27 September in Business Continuity Planning, Personal Safety

Imagine the criminal mind being as ingenious as the legitimate telemarketer attempting to sell you their product and/or services through telephone solicitation. If there is one thing I’ve learned during my 30 years as both an FBI Special Agent and security professional, it’s criminals are extremely creative in finding ways to steal and successfully commit other crimes through what appears to be legitimate means. Consider the telephone, whether hardline or Smartphone, it provides a convenient tool for others to easily obtain information about you and your...