Information Tag

Improving Workplace Investigations

27 September in Corporate Security, Crisis Response, Investigations, Personal Safety

Workplace investigations become a necessity at some point in time in every company.  Whether you identify them as investigations or simply call them “just finding out what happened”, trusted employees who are not trained investigators likely are assigned the task. The result is often an incomplete understanding of the facts due to poorly conducted interviews, weak documentation of interviews, partial collection or improper handling of evidence, and poorly written reports. Following a few simple guidelines will dramatically improve your workplace investigations and potentially eliminate risk...

Kidnap Avoidance – Move off the X

27 September in Personal Safety, Travel Safety

Never underestimate the value of introducing an element of randomness to your behavior when traveling in high-risk environments.  Examples of high-risk environments include countries at war or neighboring the war, politically charged foreign cities or countries, cities or countries nationally and internationally known for active drug cartels, drug trafficking, human trafficking etc. Kidnapping is a crime that requires forethought, planning, and surveillance.  Kidnappers typically follow a set sequence, from considering the level of difficulty in identifying a potentially valuable target, to determining when that target is...

Five Key Components of an Effective Corporate Travel Security Program

27 September in Business Continuity Planning, Corporate Security, Crisis Response, Personal Safety, Travel Safety

Policy:  Effective travel program development begins with a well-written policy that clearly establishes how your employees travel on business.  It should include what class of fares can be purchased and whether direct routing can be booked—in lieu of cheaper fares available with connecting flights.  Your policy should address the needs of international travelers allowing for improved class on long flights over a clearly defined length.  The class of hotels must be included, describing the level of service permitted that is booked on business travel. The...

The Vulnerability of Attack: Surveillance—the Common Denominator

27 September in Business Continuity Planning, Corporate Security, Personal Safety, Protective Services, Travel Safety

Ever wonder why criminals are often so successful at their trade? There are a number of reasons, but one stands out above all others—they watch and plan their attack at your most vulnerable moment.  They conduct surveillance on their targets. Here are a few things to consider to help you prevent a potential attack. Surveillance precedes attack. A kidnapper abducts a business traveler in a foreign country; an attacker sexually assaults a female runner on an isolated jogging trail, and a tractor-trailer load of electronics is...