Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

We got you covered.

EP Wired Desk

How to Come up With an Office Security Plan

If you’re navigating the fascinating world of corporate security, at one point or another, you’ll probably be tasked with coming up with an office security plan. Your employer will ask you to consider all the moving parts and design...

The Essentials of Tactical Mobility Training

As many as 30 percent of all jobs contribute nothing of use to society. That was the finding of a few studies conducted over the years, and to nobody's surprise. We knew it all along and saw it everywhere...

8 Most Common Data Security Threats

Do you want to know what the most common data security threats are and how to avoid them? If so, you’ve come to the right place. Unfortunately, these threats can happen to literally anyone, at any time. It doesn’t matter...

The Ins and Outs of Active Shooter Protection

Over the course of only a few years, we’ve seen a massive increase in active shooter situations. Even though it’s a harrowing experience, there are a lot of guidelines on active shooter protection that could help save your life...

The Basics of CCTV Services — What You Need to Know

As an EP professional, you have to be familiar with CCTV services, and also know how to use them to their full potential. But what if you’ve never dabbled in monitoring before? What if you already know a thing...

Using an Emergency Response System without an Emergency

An emergency response system constitutes the response teams' means to locate and move resources and people to emergency sites. In essence, moving people and goods to mitigate or eliminate consequences. If you read our latest article on executive protection movies,...

Residential Security Services — The Who, What, and Where

Do you want to get into the security business? Are residential security services ticking all your boxes, but you don’t know where to start? Or are you’re looking to start a residential security program at your company, but don’t...

The Truths and Lies in Executive Protection Movies

When you type in executive protection movies into your preferred browser, you will probably get some interesting recommendations. They mostly originate in Hollywood's kitchen and revolve around relationships. Those between the client and the executive protection agent, between potential attackers...

The Most Common Security Risks in the Workplace You Should Know

In 2020, we’ve seen almost every company shift its business operations from the office to home. With that, some old security risks in the workplace went away, and new ones emerged. If you want to ensure that your business and...

Maze Ransomware Attacks are Preventable – Here’s How

Maze ransomware attacks relate to malware targeting various organizations. We know that Maze likely operates via an interconnected network. There, Maze developers distribute their proceeds with different groups that deploy Maze in organizational networks. Usually, what we need to be...

About Me

415 POSTS
0 COMMENTS

Latest News

Diversity Risk and Assignment

The risk profile of any business is never a one-size-fits-all model. Chief Risk Officers (CROs), Chief Security Officers (CSOs)...

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.