How an Ethical Burglar can Kickstart your Security Capacity Building Strategy

The term ethical hacker is quite well known, someone who infiltrates a computer network, to test or evaluate its security, allowing the organisation to rectify any weaknesses before an adversary can. But what about an ethical burglar? What is an Ethical Burglar? This is another way of describing a physical penetration tester. Physical pen testers […]
Digital Profiling for Close Protection Officers

Digital Profiling One of our most frequent client requests is to conduct a digital profiling service against both executives and their families. This uncovers exactly what information can be found about them online. Even the most privacy-conscious individuals can be surprised at what we find. The weak link is usually family members such as teenagers […]
Anti Slavery Statement
Modern Slavery Statement (2022-2023) A) ORGANISATION This statement applies to Sloane Risk Group Limited (referred to in this statement as ‘the Organisation’). The information included in the statement refers to the financial year 2022-2023. B) ORGANISATIONAL STRUCTURE Sloane Risk Group is a SME with a hierarchical structure, projects consist of full-time contracts and bespoke consultancy […]
Business Continuity
Business Continuity Business continuity is an organisation’s ability to maintain essential functions and services during and in the aftermath of a disaster. It relies on solid risk management processes and procedures that aim to prevent interruptions to business-critical services and re-establish full function to the business as quickly and effectively as possible limiting the impact […]
Insider Risk
Insider Risk Protection from insider risk should be a fundamental element of an organisation’s security strategy. Employees, contractors, suppliers and business partners walk straight past physical security measures and have access to systems and assets within an organisation. An insider is a person who exploits or has the intention to exploit, this legitimate access for […]
Design
Design Safe Room Design Our safe room design team consists of both experienced close protection operators and builders, who work together to ensure that we design and build safe rooms that are fit for purpose. System Design We design and fit bespoke security systems incorporating CCTV, movement sensors, window sensors and alarms often purposefully designed […]
Airtags – love them or hate them

AirTags, Love Them or Hate Them? There have been countless articles written about air tags over the last year, ranging from how they have helped to find lost pets and baggage to the more sinister aspect of them being used as an aide to stalking. This blog is intended to address the pros v cons […]
Terms & Conditions
Terms and Conditions 1. Our Services 1.1 Our services are provided by Sloane Risk Group Ltd (“SRG” or the “Company”). The Standard Terms of Business (the “Terms”) as supplemented and/or varied by any relevant confirmation email, Proposal Letter or Service Level Agreement explain the basis upon which SRG provides its services. These Terms will apply […]
Privacy Policy
Data Processing and Privacy Statement 1. Introduction 1.1 Sloane Risk Group want to give you the best experience possible. This Data Processing Statement aims to give you a clear view of how we use the personal information that you provide, our dedication to protecting it, your rights and the options you have to control your […]
Why do Businesses and Individuals use Covert Surveillance?

What is Surveillance? Surveillance is the process of obtaining information also known as intelligence by watching the movements of a subject of interest (SOI) Covert Surveillance is unobtrusively doing this discreetly without the SOI becoming aware of your presence or what you are doing. Why do businesses require Surveillance Services? There are multiple reasons […]