Improving staff security culture

Improving staff security culture1 Improving staff security culture

In today’s world, where cyber attacks and insider risk events are becoming more prevalent, having a strong staff security culture is crucial for businesses of all sizes. However, building one can be challenging, especially when staff members lack the necessary knowledge or training to identify security threats. In this blog, we will discuss what security […]

Case Study Series – Physical Penetration Testing

insider risk image1 Case Study Series - Physical Penetration Testing

Physical Penetration Testing – A London Law Firm The Client Our client was a CSO who had just commenced a new role at a global law firm with offices in London and four other UK cities. His requirement was to quickly establish the security posture of the buildings, the staff security culture, and to identify […]

Day 2 of our Case Study Series, looks at one example of how we have provided Counter Surveillance.

Day 2 of our Case Study Series featured image2 Day 2 of our Case Study Series, looks at one example of how we have provided Counter Surveillance.

The Client Our client was a journalist who was going to release a story which she realised could cause retribution from the entity that she was writing about. She had arranged a meeting with a source who was going to provide her with some information, but she was concerned that they could be related to […]

Day 3 of The Case Study Series – Insider Risk and Undercover Operations

Day 3 of The Case Study Series featured image3 Day 3 of The Case Study Series - Insider Risk and Undercover Operations

Our client was the CEO of a software development firm, he suspected a case of insider risk and asked for our assistance. Our initial consultation established that a competitor had released information which our client had strong grounds to believe had been stolen from his company. We recommended a multi-stage operation, aiming to detect the […]

The Case Study Series Day 4 – An Unconventional Close Protection Operation

The Case Study Series Day 4 featured image1 The Case Study Series Day 4 - An Unconventional Close Protection Operation

Day 4 of the Case Study Series describes an unusual close protection/ executive protection request.   Close Protection/Executive Protection  The perception of Close Protection or Executive Protection usually presents the image of celebrities, politicians, royalty, and high net worth individuals utilising bodyguards due to their status, wealth, or political bearing. However, one of our recent operations […]

Disinformation for Executive Protection Officers

Disinformation for Executive Protection Officers featured image1 Disinformation for Executive Protection Officers

Following on from our article ‘Digital Profiling for Close Protection Officers’ which addresses why EP/CP officers should exercise a disciplined approach in their use of social media, this blog explores how a disinformation campaign can prevent the protection officer from being targeted by an adversary attempting to trace their principal.  What is Disinformation? As covered […]

Using a PPT to start an ESRM program

Using a PPT to start an ESRM program featured image4 Using a PPT to start an ESRM program

Stakeholders, are you encouraging your asset owners and security professionals to work coherently together? Would you approve a physical penetration test as a risk analysis tool?  Why Security Professionals Should use a Physical Penetration Test as a Tool when Creating an ESRM Program Organisations often fail to appreciate and understand the value that a strategic […]

Avoiding Alienation: Implementing an Insider Risk Program Without Losing the Trust of Your Employees

Avoiding Alienation Implementing an Insider Risk Program Without Losing the Trust of Your Employees featured image Avoiding Alienation: Implementing an Insider Risk Program Without Losing the Trust of Your Employees

Avoiding Alienation: Implementing an Insider Risk Program Without Losing the Trust of Your Employees Insider risk is a major concern for organisations as it can have serious financial, regulatory and reputational consequences. Insider risk refers to the potential for employees, contractors, and other insiders to exploit their legitimate access to systems and assets for unauthorised […]

How an Ethical Burglar can Kickstart your Security Capacity Building Strategy

How an Ethical Burglar can Kickstart your Security Capacity Building Strategy feature image1 How an Ethical Burglar can Kickstart your Security Capacity Building Strategy

The term ethical hacker is quite well known, someone who infiltrates a computer network, to test or evaluate its security, allowing the organisation to rectify any weaknesses before an adversary can. But what about an ethical burglar? What is an Ethical Burglar? This is another way of describing a physical penetration tester. Physical pen testers […]

Digital Profiling for Close Protection Officers

Digital Profiling for Close Protection Officers featured image1 Digital Profiling for Close Protection Officers

Digital Profiling One of our most frequent client requests is to conduct a digital profiling service against both executives and their families. This uncovers exactly what information can be found about them online. Even the most privacy-conscious individuals can be surprised at what we find. The weak link is usually family members such as teenagers […]