Business Continuity Planning

Five Key Components of an Effective Corporate Travel Security Program

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Travel Safety

Policy:  Effective travel program development begins with a well-written policy that clearly establishes how your employees travel on business.  It should include what class of fares can be purchased and whether direct routing can be booked—in lieu of cheaper fares available with connecting flights.  Your policy should address the needs of international travelers allowing for improved class on long flights over a clearly defined length.  The class of hotels must be included, describing the level of service permitted that is booked on business travel. The...

The Vulnerability of Attack: Surveillance—the Common Denominator

27 September in Business Continuity Planning, Corporate Security, Personal Safety, Protective Services, Travel Safety

Ever wonder why criminals are often so successful at their trade? There are a number of reasons, but one stands out above all others—they watch and plan their attack at your most vulnerable moment.  They conduct surveillance on their targets. Here are a few things to consider to help you prevent a potential attack. Surveillance precedes attack. A kidnapper abducts a business traveler in a foreign country; an attacker sexually assaults a female runner on an isolated jogging trail, and a tractor-trailer load of electronics is...

For Executive Protection Professionals: Tips for Medical Facility Advance & Understanding Trauma Level Ratings

27 September in Business Continuity Planning, Crisis Response

Advance work is one of the most critical pieces to a protection operation, if not the most critical piece short of covering and evacuating a Protectee from a threat. With the notion of reducing risk and minimizing threat, Executive Protection professionals deploy to locations all over the world to make best-laid plans in preparation of the Protectee’s arrival. Identifying suitable medical facilities is one of the key responsibilities of the Advance. There are a number of ways to approach a medical facilities advance. However, a primary piece...

Cyber Series: 10 Ways to Improve the Security of a New Computer

07 November in Business Continuity Planning, Corporate Security, Security Consulting

A sobering reminder about computer security Computers, laptops, iPads, and mobile devices offer windows to the world. At the same time, the world is looking back at us. We trust our computers with personal information, banking, bill paying, connecting with family, shopping, and surfing the internet. We constantly communicate with family members, friends, business colleagues through emails, text messaging, and social networks. With this ease of use comes great responsibility. Most importantly, we need to keep our information and the information of others safe and secure...

Cyber Series: The Cyber Threat – What Are the Experts Saying?

06 November in Business Continuity Planning, Corporate Security, Protective Services, Security Consulting

In our last Rampart Group communication, we began by advising our readers that we are launching a regular blog series to provide you critical cyber protection tips and information.  Below is post #2.  In this blog series, Rampart Group will continue to outline for you and your business the breadth and depth of cyber threats on a national and global scale. The Cyber Threat – What Are the Experts Saying? The cyber threat is growing and evolving. Cyber crimes cost approximately $400 billion per year worldwide,...

Rampart Group Our company

Cyber Series Launch: Protecting Your Vital Assets in a Cyber Threatened World

29 October in Business Continuity Planning, Corporate Security, Security Consulting

Rampart Group is launching a regular blog series to provide you critical cyber protection tips and information.  These tips will help you keep your information safe, ensure you are current on FBI recommended protocols for your organization’s information safety, and relay federal cyber legislative updates we think you’ll want to know about.   Below is our first blog post in this series, outlining the breadth and depth of cyber threats on a global and local scale.     Humans are the weak link in cyber security It is a fact that...