corporate security Tag

Run, Hide and Fortify®: Individual Preparation

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Travel Safety

John Farrar, our guest blogger this month, brings us part two of the Run, Hide and Fortify® series – ‘Individual Preparation and Situational Awareness’ – become aware of your surroundings and what to do when crisis situations occur. Individual Preparation Everyone should strive for a general awareness of his or her immediate environment. It doesn’t take years of meditation or graduating from some High-Speed Low Drag training course. The idea is to just be present in the here and now. Try not to be so engrossed in...

Run, Hide and Fortify®: The keys to survival in an Active Shooter Incident

27 September in Corporate Security, Crisis Response, Travel Safety, Workplace Violence

John Farrar is our guest blogger this month with a three-part series that will cover topics such as how to respond and what to do in an Active Shooter Incident (Part One), Individual Preparation and Situational Awareness when situations arise (Part Two) and finally A Recommended approach for Business continuity planning to deal with potential threats to a company be it manmade or a natural disaster (Part Three). Introduction The concept of “Active Shootings” is rapidly going the same route as the concept of Terrorism with multiple...

Telephone Security – Why Less is More

27 September in Business Continuity Planning, Personal Safety

Imagine the criminal mind being as ingenious as the legitimate telemarketer attempting to sell you their product and/or services through telephone solicitation. If there is one thing I’ve learned during my 30 years as both an FBI Special Agent and security professional, it’s criminals are extremely creative in finding ways to steal and successfully commit other crimes through what appears to be legitimate means. Consider the telephone, whether hardline or Smartphone, it provides a convenient tool for others to easily obtain information about you and your...

Using Metrics for Security Management

27 September in Business Continuity Planning, Corporate Security

The effective utilization of metrics to manage your security department and strategically report accomplishments is one of the fastest growing areas of interest among Chief Security Officers.  Security practitioners in the area of IT security are intimately familiar with the practice and have a broad array of statistical data from which to select to develop powerful reporting dashboards that clearly demonstrate the performance and value of the program. Those of us who exist in the world of physical security struggle to find meaningful measurements that...

qode

Extending Business Continuity to Your Employees

27 September in Business Continuity Planning

To those of you who have lived in a coastal area as an advancing hurricane takes aim at your community, you know the store shelves are bare 48 hours before the storm is set to arrive, people are lined up at service stations for fuel and the hardware store is sold out of plywood and tape. It's inevitable, it always happens. Even people who live in hurricane-prone areas wait until they know the storm is coming to make preparations. We all know that bad things...

Keeping Your Workplace Safe with the Broken Window Theory

27 September in Workplace Violence

The Broken Window Theory, made famous by Rudy Giuliani in his book Leadership, theorizes that maintaining and monitoring urban environments in a well-ordered condition may stop further vandalism and escalation into more serious crime. It was developed by Social Scientists James Q. Wilson and George L. Kelling and was first employed in the New York Transit System when crime was rampant in the system with routine muggings, robberies and assaults. In order to gain control of the system, MTA officers aggressively pursued all criminal activities...