News & Blogs

Avoiding Alienation: Implementing an Insider Risk Program Without Losing the Trust of Your Employees
Avoiding Alienation: Implementing an Insider Risk Program Without Losing the Trust of Your Employees Insider risk is a major concern for organisations as it can have serious financial, regulatory

How an Ethical Burglar can Kickstart your Security Capacity Building Strategy
The term ethical hacker is quite well known, someone who infiltrates a computer network, to test or evaluate its security, allowing the organisation to rectify any weaknesses before an

Digital Profiling for Close Protection Officers
Digital Profiling One of our most frequent client requests is to conduct a digital profiling service against both executives and their families. This uncovers exactly what information can be

Airtags – love them or hate them
AirTags, Love Them or Hate Them? There have been countless articles written about air tags over the last year, ranging from how they have helped to find lost pets

Why do Businesses and Individuals use Covert Surveillance?
What is Surveillance? Surveillance is the process of obtaining information also known as intelligence by watching the movements of a subject of interest (SOI) Covert Surveillance is unobtrusively

Why CP officers are moving towards a career in Surveillance
Many Close Protection officers are moving towards a career in Surveillance, this blog looks at why this is and provides some tips for getting started. We receive muliple CV’s