Business Tag

Run, Hide and Fortify®: A Recommended Approach for Businesses

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Security Consulting, Travel Safety, Workplace Violence

John Farrar, our guest blogger this month, brings us the final article in the Run, Hide and Fortify® series. This article concentrates on businesses pre-planning for the worst-case scenarios - A recommended approach for Businesses. Businesses that take steps to prepare for the types of incidents discussed in Article I and II of this series, will find a carry over to improvements in their overall functioning to other types of events and increased business resiliency. People would be surprised to know how many...

Run, Hide and Fortify®: Individual Preparation

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Travel Safety

John Farrar, our guest blogger this month, brings us part two of the Run, Hide and Fortify® series – ‘Individual Preparation and Situational Awareness’ – become aware of your surroundings and what to do when crisis situations occur. Individual Preparation Everyone should strive for a general awareness of his or her immediate environment. It doesn’t take years of meditation or graduating from some High-Speed Low Drag training course. The idea is to just be present in the here and now. Try not to be so engrossed in...

Run, Hide and Fortify®: The keys to survival in an Active Shooter Incident

27 September in Corporate Security, Crisis Response, Travel Safety, Workplace Violence

John Farrar is our guest blogger this month with a three-part series that will cover topics such as how to respond and what to do in an Active Shooter Incident (Part One), Individual Preparation and Situational Awareness when situations arise (Part Two) and finally A Recommended approach for Business continuity planning to deal with potential threats to a company be it manmade or a natural disaster (Part Three). Introduction The concept of “Active Shootings” is rapidly going the same route as the concept of Terrorism with multiple...

Telephone Security – Why Less is More

27 September in Business Continuity Planning, Personal Safety

Imagine the criminal mind being as ingenious as the legitimate telemarketer attempting to sell you their product and/or services through telephone solicitation. If there is one thing I’ve learned during my 30 years as both an FBI Special Agent and security professional, it’s criminals are extremely creative in finding ways to steal and successfully commit other crimes through what appears to be legitimate means. Consider the telephone, whether hardline or Smartphone, it provides a convenient tool for others to easily obtain information about you and your...

Who Owns Security in Your Restaurant?

27 September in Corporate Security, Personal Safety

A common definition of security is: “precautions taken to guard against crime, attack, sabotage, espionage, etc.” And for most of us, we often think of security in this way - as a thing or something we get, or even something we hire or buy.  But consider another correct definition of security: “freedom from danger or risk - safety.”  When viewed in this manner “security” is a state of being - a condition to be achieved and not something to be purchased or provided by another....

Using Metrics for Security Management

27 September in Business Continuity Planning, Corporate Security

The effective utilization of metrics to manage your security department and strategically report accomplishments is one of the fastest growing areas of interest among Chief Security Officers.  Security practitioners in the area of IT security are intimately familiar with the practice and have a broad array of statistical data from which to select to develop powerful reporting dashboards that clearly demonstrate the performance and value of the program. Those of us who exist in the world of physical security struggle to find meaningful measurements that...