Drones, an increasing threat in today’s world – the resources, links and webinars below are compiled to help us be more aware of what we can do to deter, detect and respond to drone threats, and even some resources on implementing them into your security program.
Once we put together everything we want to carry, space and weight come into play – space on our belts, in our pockets, and in our bags is limited and the total weight of all of our kit is a limitation on us. How can we solve the problem?
Enter the AFAK (Ankle First Aid Kit).
For most tasks, a simple Google search will produce an effective result. However, sometimes it will not, especially when conducting more specialized searches for protective intelligence, etc.
What many people don’t know is that Google has very specific search tools and term modifiers for just about everything you may want to search for or eliminate from your search. So if you’re not getting the results you want from Google, read the tips below to help you get relevant results.
Security staff can have a positive or negative impact on an event or business operation, but they will be the first and last contact that your patrons encounter. As such, security are a vital representation of your event and of your leadership. Combined with an appropriate “hospitality mindset” and appropriately managed, security staff will contribute positively to the safety, security and success of your event. So, with the defined importance of suitable and sufficient levels of trained staff members, how is the decision made to answer “how many security guards do I need?”
Two-Way Radios and Communicating in Protective Services have several key limitations: line of sight/interference, encryption and multi-device requirements. With Zello or Voxer, as long as you have GSM/CDMA signal (cell tower reception) or WiFi you can alleviate those issues and communicate like never before.
Many protective service providers and law enforcement agencies have protective intelligence units that conduct investigations, manage threat assessments and provide tactical, operational and strategic analysis of the information they uncover. However, they may fail to utilize the contemporary collection and analysis methods used by today’s intelligence professionals but rather lean on the standard criminal investigation processes they have always performed.