Searching for employment in the security industry is not to be taken lightly and it should all be planned like a military operation. You need to start as you mean to go. When searching you should act the same way as you would when you are on an operational assignment. These search tactics for out of work security professionals will offer guidance and help you find success in your search for employment.
Counter-Ambush Tactics for Security Professionals – Part 1
By far the best method to accomplish this goal is to adopt a predictive, preventative strategy for protecting clients based on the tenets of Detect, Deter, and Defend. To effectively employ these tenets, we need some very specific soft and hard skills. In the protective operations world, the “soft” skills are sometimes referred to as Protective Intelligence (PI) while in other security disciplines they are referred to as situational and tactical awareness skills. If we are unable to prevent or avoid an attack, we need to have some expertise in specific “hard” skills such as use of firearms and security driving so that we can survive an ambush.
2013 REVIEW
The 2013 Review Issue [add_to_cart item=”e2013 Review” showprice=”no” text=”Buy Now” ] [one_half] Contents: Surveillance Detection Gun Fighting Fundamentals Nuclear Threat Medical: Breathing Assessment What’s Your Plan Behavioral Analysis Search Tactics when Out of work Once Upon a Time in Mexico Kidnapping – A Grim Reality What is Your Purpose Time Management + Much more! […]
Issue 18
Issue 18 – January 2013 Issue 18 welcomes in the New Year with some inspirational words from our UK and US editors and we look ahead to 2013. This issues features a great cover story on using Mexico as a training ground for development; Discussing the phenomenon that is Internet Gangsters and we report on […]
Importance of Continued Combatives Training
Within the industry, it’s been long debated whether or not martial arts training is essential to an agent. And if so, what style? In my opinion, the short answer is, of course, it’s essential. In this industry, we voluntarily take on responsibility for someone else’s defense. This implies that we should have an adept ability to protect ourselves proficiently.
The One Percent
Cybersecurity provider NTT Security reports that five countries are the most common sources to 50 percent of global cyberattacks (Figure 2). Akamai states that two-thirds of Distributed Denial of Service (DDoS) cyberattacks originate in ten countries. Symantec, another provider, adds 13 more countries for a total of 23 countries, which are homes to the worst cyber offenders and who are responsible for two-thirds of all malicious internet activity.
Residential Security
Just because someone has a security or private investigators license it does not mean they are competent or not working with the criminals. What a lot of people forget when hiring security personnel is that you get what you pay for.
Vehicles Used As Weapons
Religious extremist whether Al Qaeda or ISIS have long called for the use of Vehicles as Weapons even going back to 2010, when we saw an article in Inspire Magazine titled, “The Ultimate Mowing Machine.”
Cyber Security Hiring
Whether you’re a seasoned cybersecurity professional or are looking to transition into the industry, it’s hard to know how to grab the attention of hiring managers and ultimately improve your chances of making it to the next stage.
Here are eight top tips from Renana Friedlich-Barsky, Director and Global Head of Cybersecurity Operations at PayPal, a proven leader in this space who’s reviewed more than her fair share of applications over the years.
Technology as a Standalone Security Solution – Are We Fooling Ourselves?
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Hiding from OSINT
It often comes as a surprise just how much is available and the nefarious uses it can be put to. OSINT can be applied towards defensive purposes, but this article will only be covering the malicious purposes (i.e. how a bad guy might get access to your client’s sensitive information and data).
One of the biggest challenges of OSINT is not merely recognising it as a threat, but encouraging the behavioural change needed to protect against it widely enough. It is not simply enough for a principal to stop posting Instagram pictures of their travels in order to hide them. Their colleagues, friends, family, and employees also need to be aware and cautious with information which could be misused.
Find Your Own Lane
Before you build your company’s or personal brand lets first take a moment to reconcile what branding is and how it differs from marketing. Branding is the process involved in creating a unique name and/or image for a product or service in the mind of the consumer. The goal of “Branding” is to establish a significant and differentiated presence in the market that attracts and retains loyal customers. What differentiated message have you created in the mind of your desired clientele?
The Impact of Street Crime on the Security Professional
Did you know: Historically, street crime increases, proportionately, with population growth? Crime in England is accelerating, and according to police figures, the London murder rate has now surpassed that of New York for the first time in modern history. Not only does this place the general public at risk but arguably, it exposes the front-line security operator to even greater danger.
Hiding from OSINT
It often comes as a surprise just how much is available, and the nefarious uses it can be put to. OSINT can be applied towards defensive purposes, but we will be looking only at malicious purposes. One of the biggest challenges of OSINT is not merely recognising it as a threat, but encouraging the behavioural change needed to protect against it widely enough. It is not enough simply for a principal to stop posting Instagram pictures of their travels in order to hide them – their colleagues, friends, family, and employees also need to be aware of the need to take care with information which could be misused.
Residential Security
Residential security (RS) is something that is usually taken very lightly, most believe putting in an alarm system and maybe a camera or two is all that’s required.
It is common knowledge that one of the favored places for criminals and terrorists to target a victim is when they are in, entering or leaving their residence; RS must be taken very seriously. In times of civil unrest looters will be looking to target any location that has valuables, weapons or assets that they can use and that has minimal security, this means most residential properties.
Social Engineering and Cybersecurity
We’ll be looking at a collection of tactics used by attackers to bypass security technology by targeting the weakest link – the human in the chain.
Social engineering is really just an overly technical term for knowing how to persuade people to do something against their best interests or against their better judgment.
OSINT: Do You Know How to Stay Protected?
The best protection against such SIM swapping methods is simple. Buy a dual SIM phone with a second pay-as-you-go number on a separate provider, which is used only for these authentication purposes. Since nothing is tying the number directly to you, it becomes much more challenging for an attacker to carry out a SIM swap.
Countering snipers Part 1
One thing I find amusing and annoying is that whenever there is a terrorist attack with an attacker using a long gun the media tends to immediately label the shooter as a sniper. There is a very big difference between a trained sniper and some idiot with a rifle and just because someone served in the military to some extent it does not make them a sniper. But, with modern weapons and a little knowledge the wannabe jihadist or anarchist are still a serious threat.
Guide to Contracting & Subcontracting Security Services
A Guide to Contracting & Subcontracting Security Services. Market yourself appropriately and professionally, create a large network, do a good job whenever you are given the opportunity and follow up.