Security Consulting

Price of Security Failure

27 September in Corporate Security, Crisis Response, Personal Safety, Protective Services, Security Consulting

Posted on June 15, 2016 Last week ended with the killing of young singer Christina Grimmie by a 27-year old man who showed up to her concert and shot her as she signed autographs for fans. And, this week began with the news that a man fatally shot in excess of 100 patrons in an Orlando nightclub, fatally wounding 49. These two tragic events are reported by authorities to be completely unrelated. But on closer inspection, we will likely find a common element between these events...

The Cyber Threat – What the Experts are Saying

27 September in Business Continuity Planning, Corporate Security, Legal Security, Security Consulting

The cyber threat is growing and evolving at a rapid pace. This presents challenges for Federal agencies that share similar concerns and resolve in combating cyber-crime. The FBI appears to be ready for the fight on Cyber Crimes and is one of its top investigative priorities. Armed with a whole new set of technological and investigative capabilities and partnerships, the Bureau is now as comfortable chasing outlaws in cyberspace as tracking criminals down back alleys and across continents. The most significant cyber threats facing our nation Cyber...

Cyber Security: 10 Ways to Improve the Security of Your Computer

27 September in Business Continuity Planning, Corporate Security, Security Consulting

In recognition of National Cyber Security Awareness Month, we are bringing you a series of articles to provide you with critical cyber protection tips and information. These tips will help you keep your information safe, ensure you are current on FBI recommended protocols for your organization’s information safety, and how everyone can take steps to ensure that they and their loved ones are cyber safe. A sobering reminder about computer security Computers, laptops, iPads, and mobile devices offer windows to the world. At the same time, the...

Run, Hide and Fortify®: A Recommended Approach for Businesses

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Security Consulting, Travel Safety, Workplace Violence

John Farrar, our guest blogger this month, brings us the final article in the Run, Hide and Fortify® series. This article concentrates on businesses pre-planning for the worst-case scenarios - A recommended approach for Businesses. Businesses that take steps to prepare for the types of incidents discussed in Article I and II of this series, will find a carry over to improvements in their overall functioning to other types of events and increased business resiliency. People would be surprised to know how many...

Steps to an Effective Workplace Violence Prevention Program

06 September in Corporate Security, Security Consulting, Workplace Violence

Workplace violence can occur in any environment—in any size company.  Effective prevention is achieved through a systematic approach to the problem. Defining Workplace Violence At the core of an effective program is a solid definition of what is considered workplace violence. Defining workplace violence gives the company a solid underpinning for actions taken against acts of workplace violence and an effective defense to legal challenges arising from workplace disciplinary actions. Rampart Group recommends defining workplace violence as “any acts of harassment, intimidation, threats or violence”. The Importance of...

Cyber Series: 10 Ways to Improve the Security of a New Computer

07 November in Business Continuity Planning, Corporate Security, Security Consulting

A sobering reminder about computer security Computers, laptops, iPads, and mobile devices offer windows to the world. At the same time, the world is looking back at us. We trust our computers with personal information, banking, bill paying, connecting with family, shopping, and surfing the internet. We constantly communicate with family members, friends, business colleagues through emails, text messaging, and social networks. With this ease of use comes great responsibility. Most importantly, we need to keep our information and the information of others safe and secure...