3 Reasons Why CEO’s Deserve Executive Protection

Seven years ago, former U.S. Congresswoman Gabrielle Giffords’ life changed forever. On January 8, 2011 a deranged gunman shot Mrs. Giffords in the head at an event at a grocery store in Tucson, Arizona. On June 14, 2017, less than a year ago, Congress man Steve Scalise and members of the Republican congressional baseball team were shot by a crazed gunman on the field during a baseball practice in Alexandria, Virginia. Their lives were never the same either.

High-profile individuals like politicians, celebrities, athletes, musicians, CEO’s, and executives are living their lives, doing their jobs, helping their communities, but sadly are at increased risk of injury and death at the hands of some unstable individuals who become fixated with them and may act irrationally and violently.

How can people ever feel safe whose jobs make them targets for violence or put them at risk of being taken hostage? There’s no easy answer to that question. In fact, no one can feel 100% safe every minute of the day and night. Many celebrities and VIPs hire executive protection to help reduce the risk of being harmed. Security guard service companies provide professional executive protection services to protect high-profile individuals and their families. Here are three reasons why your company’s CEO and top-level executives need personal protection:

Hiring Executive Protection is Cost Effective

Some executives need convincing that they need executive protection. With cyber crime being uppermost in some executives’ minds, they may neglect to think about their own personal safety. They may feel it’s too costly to their company to hire personal protection. Or they think security for special events that’s already in place will provide enough protection for them. But executives and CEO’s are valuable assets to their companies harboring a wealth of information acquired from years of experience in upper management. Executives aren’t going to do a great job if they’re worried about getting hurt or concerned members of their family are at risk of harm. Let’s face it. There’s no price tag on human life.

CEO’s and High-profile Executives are Vulnerable to Violent Attacks

People in the public eye are vulnerable. Celebrities and VIPs are often on stage at special events, walking through crowds, traveling, or conducting their everyday lives with the paparazzi in tow. The public knows who celebrities and high-profile individuals are and where they may be speaking, performing, or working. Unfortunately, it’s the nature of their business. Enlisting executive protection could help keep executives and their families safe.

Some Unstable Individuals are Like Ticking Time bombs

Many factors could upset an already unstable person. For example, labour disputes and strikes could cause some people financial hardship or be perceived as the fault of the CEO or other top-management executives. A disgruntled employee may be looking for revenge. A person who disagrees with a politician’s agenda may blame the politician for problems in the country. Whatever reason causes a person to behave erratically and violently is important, but the bigger issue is how to keep the VIP safe. Prevention is a good place to start. Hiring executive protection and adding extra security for special events from event security services could save an executive’s life.

Violence in American society has become an everyday occurrence. People like Mrs. Giffords and Congressman Scalise live with the aftermath of being brutally attacked. Hiring executive protection is no guarantee that someone won’t get hurt, but protection and peace of mind are priceless.

Guideline for Shredding Documents

You’ve probably heard about scandals involving companies as a result of sensitive information that was leaked and made public. People often wonder who the traitor was. The answer is often in the trash can.

Dumpster diving is not new. It’s a technique that people have used for decades to get information that they need. You can find out a lot about a company by sifting through their garbage. It’s one of the most effective methods used for corporate espionage and it’s completely legal. There is no privacy when it comes to trash. The law doesn’t protect organizations that fail to protect their own data.

Best practices for document shredding

One of the best ways to protect your business’ records is by hiring a document shredding company. You may want to apply some of the guidelines outlined below when determining how to go about this.

  1. Keep records only for as long as you need to

This is especially important if you are in a regulated industry. However, every organization should have a policy that provides for retention of documents. This should be in line with the regulations in your area.

  1. Seek out reliable document shredding services

There are various companies that offer this service. It’s important to ensure that the firm you hire is reliable. They should keep your information confidential. They should also have the right equipment to ensure that all data is completely destroyed. Talk to different service providers and go for the firm that is able to offer you the best value for money.

  1. Know what information should be protected

It’s good practice to shred all documents that are produced in your firm. However, it isn’t always possible to do so. Understanding what information should be protected makes it easier to manage your documents.

  1. Adopt a schedule

This will help to ensure that information is destroyed in a timely manner, keeping your organization’s private information safe from prying eyes. Your schedule ought to be determined by the volume of data you produce and your storage capabilities. It should also be based on the type of document shredding company you’ve hired, i.e. on-site or off-site.

  1. Train staff

This is vital for the success of the program. This ensures that any private information is not simply dumped in the garbage. This will help them understand how to handle sensitive data and how it should be disposed of.What to shred

Your document shredding company should help you dispose of the following categories of documents:

  1. Information that is past the retention period
  2. Physical information that has been converted into digital data
  3. Notes and scrap information
  4. Any documents that include addresses, names and private information of staff or the firm

Ensure that all data from your company is completely destroyed for the safety of your company as well as your staff, clients and stakeholders.

The Growing Private Investigations Market in Colorado

I love being a private investigator. It is a progressive career and always captures my attention. That is why I am still doing it and plan to make a long career out of investigating. I get bored very easy and this always has something new and interesting to teach me. I started doing insurance investigations. Mostly liability claims and workers compensation surveillance. I did the majority of my investigating in Colorado Springs. Once I learned the ropes of the trade I expanded my field and area of coverage. I now own my own firm in Colorado Springs and Denver. I conduct surveillance, cheating spouse cases, skip tracing, background checks, child custody cases, corporate investigations and more. I investigate in Denver and Investigate in Colorado Springs, Mostly. But I do cover the entire state of Colorado. I use all types of investigative tools in my trade. I have a 4k hand held camera, various hidden and covert cameras from, key fob cameras to pen cameras to blue tooth cameras. I also have a dash camera and stationary cameras.

I have my criminal justice degree from UCCS. I have been growing in investigating business slowly over the past 9 years and it progresses each year. I have seen my fair share of interesting cases. People claiming to be hurt with a broken ankle when I catch them skiing. My favorite types of investigating cases are child custody cases. I am blessed to help children get out of an abusive home or reunite children with their parents. Cheating spouse cases can be interesting but it does put our society in perspective on how hurtful we can be towards each other.

One of my most interesting cases was locating a homeless person in a large city. This was a large task as most homeless people are completely off the grid. Most people you can locate easily through social media or looking through our databases. Not the case trying to find a homeless person. It takes hours of leg work, talking with people doing private investigating the old school way. I thought it would take me 100 hours to locate this homeless person. However within 24 hrs I had him reunited with his mother. This business of people watching really opens your eyes to a different part of the world, one that is both cursed and blessed. I love helping people and hope to be investigating for years to come.

Investigators are used in a variety of situations. My company has a policy that we only take cases that have a legal stance. Are we going to provide a service that will determine which direction that case goes. Can we help bring new information to the case?Vetting clients is a part of the investigation process. There are people out there that want information for not all the right reasons. I have heard of past investigators taking on cases where they could have been held liable for giving out sensitive information. A great example would be a potential client wanted to know where his ex wife was to serve her papers for child custody reasons. After the investigations company did their due diligence they learned the ex husband and potential client had a restraining order for domestic violence. They declined to take the case, avoiding what could have been very bad for all parties involved.

The private investigator industry is a large part of our history. One of the first investigations company was the Pinkerton company in the late 1800’s. The company helped solve cases for top government officials and large corporations. They did take some controversial cases as well. One of the most notorious cases was the homestead strike. Pinkerton was hired for security at the factories where the strike took place. Shots were fired killing 7 Pinkerton workers and 9 people participating in the strike.

I believe the investigations field is only going to grow and be a more productive industry as our population grows. It helps hold people accountable and resolve issues of conflict. The investigation field has evolved with new technologies available making it easier and more time efficient to conduct certain types of investigations such as missing person investigations or background checks.

Professional Dealing With Illegal Electronic Surveillance

Not so long ago surveillance has been considered a government or spy agency priority. However a lot has changed. The rapid research and development in information technologies and electronic devices, along with their shrinkage in size has made surveillance obtainable to each of us. All you have to do is Google for GSM tracker, spy camera, hidden voice recorder. Don’t be surprised to see hundreds of thousands or even millions of espionage gear offers. And it only depends on the commitment and financial constraints for one to start secret surveillance. Thanks to the Chinese manufacturers tiny cameras, microphones and other tracking devices have become easily obtainable at a ridiculous price. The statistics of such equipment sales shows that many people are taking advantage of this hassle free access to modern eavesdropping technologies. The temptation to spy on the surrounding comes not only to perverted maniacs.

This article focuses on surveillance carried in interest of businesses, politicians and simple ordinary (or not so ordinary) people.

The threat of eavesdropping & information loss has never been greater. Nowadays most exposed to eavesdropping are famous people, individuals with access to highly confidential information, companies and individuals as objects of corporate espionage, offices and individuals involved in political campaigns, investment bankers and other investment companies.

Here’s the list of those who intercept most:

  • Competitors or partners
  • Employers against their employees
  • Subordinates against their colleagues and superiors
  • Tenderers against other bidders or against the clients
  • Spouses and lovers
  • Intrusives, maniacs
  • Neighbors

The most commonly used espionage tools and methods are:

  • Micro video cameras and recorders, often disguised as various household items such as watches, key chains, lighters, etc.
  • Wireless and wired microphones of various types (radio, Wi-Fi, GSM, Bluetooth, laser, infrared, stethoscope, parabolic or shotgun microphones, etc);
  • Eavesdropping software monitoring GSM phones, computers, laptops and tablets.
  • Microphones transmitting information through the electrical grid, internet cables or security systems wiring.
  • Devices intercepting the electromagnetic radiation of the computers, phones and other equipment for data processing and communication.

All the listed methods and devices can be considered just an illustration, as the actual number of can hardly be enumerated.What’s common for the above listed methods and devices that they are widely available, quite cheap to buy and their operation does not require any special technical skills. The equipment having the access to internet either through Wi-Fi, cellular or stationary networks could be operated in any part of the World.

Detecting the bugging devices is not an easy and simple work. The term describing this type of activity is TSCM which is the abbreviation of Technical Surveillance Counter Measures. TSCM survey is a service provided by qualified personnel to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey normally consists of a thorough visual, electronic and physical inspection inside and outside of the surveyed facility. In conducting surveillance protection one has to be familiar with the tapping methods; hardware and software products; engineering solutions used for this purpose as well as their unmasking signs. Without this knowledge it is not possible to detect a well hidden bug.

For the successful implementation of this activity is necessary to have a properly trained personnel, good working methodology and appropriate set of technical means.

As there are lots of methods of eavesdropping and much more devices used for each method, there are lots of instruments to detect a bug. Example of the necessary equipment for the detection of radio microphone is radio frequency spectrum analyzer, wideband radio receiver and a nonlinear junction detector ( NLJD ). And this should be considered an absolute minimum.

The issue of interception and eavesdropping protection is a complex. Both activities are developing very dynamically. Unfortunately there is no way to point all aspects in one article. Practice shows that the systematic work and the funds invested for eavesdropping protection are sooner or later paid off.

10 Steps to Preparing Your Business for the GDPR (General Data Protection Regulation)

Even if Your Business is Not Located in the EU

The General Data Protection Regulation is a new set of rules amended to the current Data Projection Act that will soon be mandated for those businesses dealing with European consumers.

On May 25, 2015 the regulation insists on safeguarding the personal information of all citizens of European Union member states. While many businesses are already aligned with the specifications, it’s important to make sure your business has everything covered.

This article takes a look at what you need to have in place in order to avoid being found in violation of the GDPR.

The truth is these new rules are aimed at large companies who deal in information as a source of revenue. Smaller businesses aren’t likely to be penalized the 4% of worldwide gross or 20 million Euros that large corporations will if they’re found in violation.

If you’re worried about having a mountain of work ahead of you to prepare, you shouldn’t be. If you’re unsure if you will be affected look for these key signals:

1. You deal in information as a commodity;

2. You request user’s data when they complete a purchase and use the data elsewhere or store it;

3. You deal with one or more European countries.

If the answer is no to both then you will be fine!

So what can you do just in case?

Here’s 10 steps your business can take to be best prepared for the GDPR, even if you are not physically located in the EU.

1. If your website has an online form that incudes a pre-checked box giving permission to receive promotional emails from 3rd parties, this box now needs to be unchecked.

2. If your business conducts any form of list-building, ensure everyone on that list has given explicit permission to be in it. Under the Canadian PIPEDA, it was enough to have implied permission; however, if any EU residents are in your database, the rules are much more firm that provides subscribers with the right to obtain the information stored on them.

3. Make sure your entire staff is aware of the new rules. Circulate a memo to all personnel with a follow-up meeting where the points are reviewed. Asking a few questions to key players whose roles would be most affected by the new rules is a great way to ensure they’re aware of what they need to do.

4. Audit all stored client/customer info and track where you got it from and where it’s been used. Keep a record of every bit of info and who you may have passed it to at any time, and document the relationship and reasoning.

5. Update your privacy policy so it includes the reasoning for retaining any user data, how it is legally used, and how users can contact your business if they feel their user information is in any way being misused.

6. Have a clear method in place to address requests for erasing a user’s data. Under the DPA, users already had certain rights but the GDPR takes it further with information rights pertaining to their data stored by your business.

The rights consist of:

• the right to be informed

• the right of access

• the right to rectification

• the right to erasure

• the right to restrict processing

• the right to data portability

• the right to object

• the right not to be subject to automated decision-making including profiling

You will need to be able to provide all this information in a clear and machine-readable format (not in hand writing).

7. Have a process in place for handing over large volumes of requests. Previously under the DPA businesses had 40 days to comply with a request. That has been shortened to one month. Any lawful request must be fulfilled though if there are a large number of requests and the suspected reasoning is to cause problems for your business then these requests can be contested legally.

8. Have your lawful reasoning for retaining user data or passing to others clearly stated for users and ensure the opt-in option is not pre-ticked or unclear. Users must have a clear understanding of why you want their data, what you do with it, and who you might share it with. And they must have the option to say no. This is separate from Terms and Conditions.

9. If your business deals with anyone under the age of 16 then you’ll need a parent or guardian’s permission to process any of the child’s data. This is very important and strictly regulated but at the same time if you’re not dealing in information as a commodity then you’re likely not going to have to worry.

10. Have steps in place to address a data breach. In the event that user’s data may be compromised you will need to have a way to let all affected users know what was compromised and when. Assigning someone internally the task of coordinating the response is a great idea.

And that’s it! As you can see it’s a big business problem and more so rooted in user protection in Europe where social networks have been cited as problematic and susceptible to foreign influence.