
Combating Activists
How do you start to protect your organisation against Activists? This article looks at understanding the threat of Activism and combatting the issue.
“News, views and useful secuirty insight”
How do you start to protect your organisation against Activists? This article looks at understanding the threat of Activism and combatting the issue.
This blog article looks at the burglary of luxury homes in London's most affluent boroughs and puts forward smart homes security solutions.
Rural crime is a real concern for owners of country estates, farms and stately homes and this article looks at this issue in more detail.
Insider Threat actors can bring a firm to its knees with the leaking of sensitive corporate or personal information. What can firms really do to mitigate Insider Threats?
Continuity planning is vital for every business, but for business who might be at a higher risk from terrorism, how can they prepare their staff and maintain the duty of care?
There are a whole range of different roles that Dogs play in security, from Search Dogs and Patrol Dogs to Military and Police Attack Dogs. In this blog we look at those roles, what training Security Dogs receive and what accreditation is available in the UK.
In light of the recent story in relation to Facebook and Cambridge Analytica, Virginie Roux looks at how you can stay safe while still enjoying Social Media. Lock down your profile and be sure to be careful what personal information you post online.
Sat Rayit takes a good look at Situational Awareness and asks, "just how tuned in are we to our environment?" and, offers some great Personal Safety Advice and tips on staying safe while on the move in the urban environment.
Celebrity stalking cases are very often far more publicised than the most severe cases of stalking we sometimes see in the press. Here Alex Bomberg looks a five examples of celebrity stalking and what impact security or the lack of it might have played in the outcomes.
A major incident such as a terrorist could happen at any time and you may find yourself as a First Responder. In this blog article Adam Gent talks about triage for major incidents such as a terrorist attack.
Operational Psychology and Social Engineering are all around us, from influence operations carried out but Super Powers, through to your everyday interactions on Social Media.
This article looks at Social Engineering in espionage, giving examples of how targets are chosen based on MICE!
TSCM Sweeps are carried out to discover if an area is being monitored by covert listening devices.
An in depth guide on how to commission a TSCM Sweep, what questions to ask and a little bit of information on what equipment is used and how a TSCM Sweep is conducted.
In the wake of the Kim Kardashian robbery in Paris, France, Group CEO Alex Bomber discusses the need to control and monitor social media use.
A very useful article for both security professionals and managers alike, given that few companies operate a Social Media Policy.
Defensive Driving is an important skill for any security professional. Intelligent Training International Limited Defensive Driver Training Courses are available worldwide with the very best in Police and Special Forces instruction.