A Safety & Security Solutions Snapshot

The Safety & Security solutions landscape is hugely diverse and innovative. Here’s a snapshot of just some more of the offerings passing through the Marshal Feed: Drone Security Services and Premium Executive Protection Level 3 Fire, Emergency & Security Systems (FESS) Apprenticeship (UK) Security Awareness Training and Simulated Phishing Platform HSE Safety Training Solutions: Height, Sea Survival, Fire, First Aid Advanced fiber optic monitoring sensors and integrated technologies, enabling critical Read more…

What should a First Response Emergency Care (FREC) Course Cover?

The First Response Emergency Care (FREC) course is a pre-hospital emergency care training program. It is designed to provide individuals with the knowledge and skills necessary to respond to a wide range of medical emergencies. The course typically covers topics such as: Basic Life Support (BLS) including Cardiopulmonary Resuscitation (CPR) and the use of an Automated External Defibrillator (AED) Airway management, including the use of suction and oxygen therapy Management Read more…

Mass Communications in Crisis Management – Are Current Products Effective?

Two-way mass communications tools can play an important role in crisis management by providing a means for quickly and effectively disseminating information to a large number of people, as well as receiving feedback and updates from them. Some examples of how these tools are used in crisis management include: Email: In a crisis, emergency management officials can use email to quickly send out alerts and updates to a large number Read more…

How do you locate potential threats to the privacy and security of your organization?

Technical Surveillance Countermeasures (TSCM) sweeps, also known as “bug sweeps,” are conducted to detect and locate any hidden electronic devices or bugs that may be used for unauthorized surveillance. The goal of a TSCM sweep is to locate any potential threats to the privacy and security of an organization, individual, or location. The process for conducting a TSCM sweep typically involves several steps: Planning and Preparation: Before the sweep, the Read more…

What makes a good Security Risk Management Consultant?

The foundation of good security consulting is a strong understanding and knowledge of security principles, best practices, and industry standards. This includes knowledge of risk management, incident response, and disaster recovery. Additionally, a good security consultant should have experience in the industry, including a thorough understanding of the latest security technologies, tools, and solutions. Strong analytical and problem-solving skills, the ability to communicate effectively with clients, and the ability to Read more…

Maximise the Pros and Reduce the Cons in Security Industry Tradeshows

Tradeshows can be a valuable marketing and networking opportunity for businesses, but they also have some potential drawbacks to consider. Here are some pros and cons of participating in tradeshows: Pros: Tradeshows can be a great way to showcase your products or services to a large number of potential customers in a short period of time. They can provide an opportunity to network with other industry professionals and establish new Read more…

Keeping Business Travellers Safe Just Got Easier. Here’s How.

Business travel has been coming back strongly since the easing of COVID restrictions – but challenges remain. There are several primary considerations for secure business travel, including: Personal safety: Consider the safety of your destination and any potential risks associated with your trip. Research local laws and customs, as well as the political and social climate of the area. Physical security: Protect your personal belongings and sensitive materials, such as Read more…

Operating in Iraq? First, Consider These Strategic Security Risks

There are a number of security considerations to take into account when operating in Iraq. Some of the main issues to consider include: Terrorism and insurgency: Iraq has a high risk of terrorism and insurgency, particularly in certain areas of the country. Threats can come from a variety of sources, including domestic and foreign extremist groups. Political instability: Iraq has a volatile political environment, and changes in the political landscape Read more…

Five Ways Drones can be Used in the Security of Sports Stadiums & Events

Drones can be used in a variety of ways to enhance the security of sports stadiums or events in general. Some examples of how drones can be used in this context include: Surveillance: Drones equipped with cameras or other sensors can be used to monitor the perimeter of a stadium or other areas of interest, providing an extra layer of security and helping to identify potential threats. Crowd control: Drones Read more…

Five Trends Shaping the Close Protection Industry in 2023

There are a few trends that are currently shaping the Close Protection industry. Here’s a select few: More focus on preventative measures: Rather than just reacting to threats, close protection professionals are increasingly focused on preventative measures, such as risk assessments and threat analysis, to help prevent incidents from occurring in the first place. Greater use of technology: Close protection professionals are using a variety of technology to improve their Read more…