We got you covered.
Home Blog Page 13

Wembanyama’s Bodyguard Slapped Britney Spears

1
bodyguard slapped britney spears

Pop star Britney Spears has made a public statement unveiling a distressing incident wherein she claims to have been slapped by a bodyguard. The incident reportedly took place in Las Vegas as the singer sought to take a photo with NBA player Victor Wembanyama, during which his bodyguard slapped Britney Spears. 

In an Instagram Stories post on July 6, Spears addressed the alleged incident and described it as a traumatic experience. She explained that she recognized Wembanyama in the hotel lobby on her way to dinner, and later saw him again at a different hotel while at a restaurant. The bodyguard slapped Britney Spears in the face without looking back, causing her glasses to fall off. 

The singer acknowledged that being surrounded by fans is not uncommon for her, but she emphasized that her security team never resorts to physical violence in similar situations. Spears deemed the incident embarrassing but felt it was important to share her story and urge those in the public eye to set an example by treating all people with respect. She also expressed her solidarity with all victims of physical violence, calling for an end to such behavior. 

Spears concluded her statement by requesting a public apology from Victor Wembanyama and his team. She expressed gratitude for the support she has received, including that of the Las Vegas Police Department and the detectives involved in the case. 

On the other hand, Victor Wembanyama spoke out in response to the incident, stating that he did not witness the alleged assault. He explained that someone had been calling him, but he was advised to continue and engage with fans to avoid creating a crowd. Wembanyama said that the person grabbed him from behind without him seeing who it was. Only later, when he returned to the hotel and was informed by the Spurs’ security team, he learned it was Britney Spears. He claimed never to have seen her face and continued walking straight. 

Sam Asghari, Britney Spears’s husband, also started Instagram Stories to defend his wife. Given the circumstances, Asghari expressed his opposition to violence and noted that his reaction was subdued. He hoped the man involved would learn a valuable lesson and change his disregard for women, thanking those who supported Britney.  

Asghari emphasized that the blame for the incident should fall on the security guard, the people responsible for hiring him without proper vetting, and the culture of disregard for women within sports and entertainment. He called for changes, stating that they must come from the top.  

Following the alleged incident in which the Wembanyama‘s bodyguard slapped Britney Spears, she filed a police report. The Las Vegas Metropolitan Police Department confirmed that officers responded to the incident and documented it in a police report. As of now, no arrests or citations have been issued. 

Reps for Britney Spears, Sam Asghari, and Victor Wembanyama have yet to respond to requests for comment. 

It is important to note that these are allegations, and the investigation is ongoing. 

Consider Leaving it Open

0
Consider Leaving it Open

As a practioner and instructor of close protection, I focus more and more of my time and attention on the two things most important in the close protection field: Time and Distance. My good friend Jeff Marquart, a fine Protector in his own right, told me once: “It all comes down to miles and minutes.” As I get older, I seem to be hyper-focused on the smallest of details and less and less on the items that stole my attention in my younger days.

Jeff Marquart, Tom Taylor, and Gavin de Becker did the close protection world a tremendous service by cataloguing, assessing, and summarizing attacks on protected personnel in their notable book – Just 2 Seconds (J2S). I refer to this as the Protection Bible. GDBA continues to maintain the compendium of attacks on protected personnel – as we believe in constantly learning, assessing, and adapting to the tactics of the adversary.

The Theory of Controlled Spaces recommends maximizing time in controlled spaces – armored car, protected estate, advanced venue, etc., and minimizing time in uncontrolled spaces – the area in and around a vehicle in a public setting, public sidewalks, public streets, etc. According to the research in J2S, 64% of attacks happen in the area in and around the vehicle and 77% of those attacks were successful.

As protection practioners, we must know this statistic and look for any advantage in this predictably unfavorable place. Many strategies exist: public arrival/non-public departure, ruse departures, ghost motorcades, etc… Another strategy I would like you to consider is leaving the Protectee’s door open on arrival.

Why? Because you absolutely have No Time.

Once out of the vehicle and moving to the next controlled space, we must consider where we are moving to – if and when we hear that gunshot. We know John Hinckley fired 6 rounds in 1.8 seconds on that fateful day in 1981, so we absolutely must not waste fractions of seconds wondering where we are going. If we are planning on bailing back to the vehicle, which is favorable, it is a hell of a lot easier entering an open door than a closed door. If your team is closing the door and you are attacked, you will need to manipulate the handle, pray the driver did not lock the door, and open/extend the door to get the Protectee inside, all while taking fire. This whole thing takes the one thing you have none of – time.

Focus on the small details, they are critical.

Top 5 threats for UHNW and HNW Individuals and Effective Mitigation Strategies

0
threats for UHNW

The top five threats for UHNW (Ultra High Net Worth) and HNW (High Net Worth) individuals can vary depending on the context and individual circumstances. Indeed, being a UHNW and HNW  individual and having a high social status does not guarantee protection from potential risks and threats. While wealth and social status can provide certain advantages and access to resources, they do not make individuals immune to risks and vulnerabilities. High net-worth individuals must recognise and address potential threats proactively.

Factors such as increased visibility, public exposure, and perceived wealth can make UHNW and HNW individuals targets for various risks, including financial crimes, privacy breaches, personal safety concerns, and reputation damage. Criminals and malicious actors may specifically target them due to their perceived wealth, making it essential to be proactive in implementing security measures and risk management strategies.

However, here are five common threats that are concerning these individuals:

Reputational risk

Reputational risk is a significant concern for Ultra High Net Worth Individuals (UHNWI), given their prominent social status and social visibility. Reputational risk refers to the potential harm to an individual’s or a family’s reputation, which can have wide-ranging consequences on personal, professional, and social fronts.

Here are some key factors contributing to reputational risk for UHNWI:

Media and Public Scrutiny: UHNWI often attract public attention due to their wealth, lifestyle, and philanthropic activities. This heightened visibility can increase media scrutiny, making them vulnerable to negative publicity, scandals, or controversies. Negative press coverage can severely impact their reputation and public perception.

Association with Controversial Entities or Practices: UHNWI may face reputational risks associated with controversial organisations, industries, or practices. Involvement with companies facing legal issues, unethical business practices, or environmental controversies can tarnish their reputation and result in public backlash.

Philanthropic and Social Responsibility Activities: UHNWIs are often involved in philanthropic endeavours and social responsibility initiatives. While these activities can enhance their reputations, mismanagement, lack of transparency, or perceived hypocrisy in their charitable endeavours can damage reputations.

Personal Conduct and Behavior: UHNWI’s conduct and behaviour can significantly impact its reputation. Unethical behaviour, involvement in legal disputes, or public scandals can harm their standing in society and diminish trust among peers, business partners, and the public.

Social Media and Online Presence: The proliferation of social media and digital platforms has increased the speed and reach of information. UHNWI face reputational risks if its online presence is mismanaged, leading to negative publicity, cyberbullying, or privacy breaches.

UHNWI should proactively manage their public image, maintain open communication, and uphold high ethical standards to mitigate reputational risks. Building a trusted team of advisors, including PR professionals and reputation management experts, can provide valuable guidance in navigating potential reputational challenges. It is also important to be transparent, address issues promptly, and demonstrate commitment to responsible business practices and social causes.

UHNWI can protect their standing, influence, and long-term success in both personal and professional spheres by prioritising reputation management and proactively aligning individual actions with values.

Cybersecurity

Cybersecurity risk is a significant concern for Ultra High Net Worth Individuals (UHNWI) due to their high-profile status and the valuable assets they possess. UHNWI are attractive targets for cybercriminals seeking financial gain or aiming to exploit their personal and financial information. Here are some key cybersecurity risks faced by UHNWI:

  • Phishing and Social Engineering: UHNWI may be targeted through sophisticated phishing emails, fraudulent messages, or social engineering tactics. Cybercriminals often attempt to trick individuals into revealing sensitive information such as login credentials, financial details, or personal data.
  • Account Compromise: Cybercriminals may target UHNWI’s online accounts, including email, social media, and financial accounts. Unauthorised access to these accounts can lead to identity theft, financial loss, and reputational damage.
  • Malware and Ransomware Attacks: UHNWIs are susceptible to malware and ransomware attacks, which can compromise their personal devices, networks, or systems. Malware can enable unauthorised access, data theft, or surveillance, while ransomware can encrypt valuable data and demand a ransom for its release.
  • Insider Threats: UHNWIs should be cautious about the individuals they entrust with their personal and financial affairs. Insider threats, such as employees, advisors, or family members with unauthorised access, can pose significant cybersecurity risks if they misuse or exploit sensitive information.
  • IoT Vulnerabilities: UHNWIs often possess a wide range of internet-connected devices, including smart homes, luxury vehicles, and personal gadgets. These devices can introduce vulnerabilities that cybercriminals can exploit to gain unauthorised access or compromise privacy.

To mitigate cybersecurity risks, UHNWI should adopt robust security practices:

  • Implement strong, unique passwords and enable multi-factor authentication for all online accounts.
  • Regularly update software, operating systems, and device security patches to mitigate known vulnerabilities.
  • Be cautious of suspicious emails, messages, or requests for personal information.
  • Use reputable and up-to-date antivirus and anti-malware software.
  • Secure home networks by using strong passwords for Wi-Fi routers and enabling network encryption.
  • Limit access to sensitive information and regularly review permissions for individuals with authorised access.
  • Educate themselves and their family members about cybersecurity best practices and potential risks.
  • Engaging cybersecurity professionals or consultants with expertise in securing high-net-worth individuals’ digital presence can also be beneficial. UHNWI can significantly reduce the risk of cyber-attacks and protect their personal information, assets, and reputation by prioritising cybersecurity measures.
threats for UHNW
Top 5 threats for UHNW and HNW Individuals and Effective Mitigation Strategies by Radoslav Savkov

Medical Risks

Ultra High Net Worth Individuals (UHNWI) may face specific medical risks due to their lifestyles, access to healthcare, and demanding schedules. Here are some medical risks that UHNWI should be mindful of:

  • Stress-related Health Issues: UHNWI often experience high levels of stress due to their professional responsibilities, financial concerns, and demanding lifestyles. Prolonged stress can contribute to various health issues, including cardiovascular problems, mental health disorders, and weakened immune systems.
  • Neglecting Personal Health: UHNWI may prioritise their business and philanthropic endeavours, often neglecting their health. This can lead to delayed medical check-ups, inadequate self-care, and increased vulnerability to illnesses.
  • Limited Work-Life Balance: UHNWI often have demanding schedules that leave little time for rest, recreation, and a healthy work-life balance. Long work hours, frequent travel, and high-pressure situations can negatively impact physical and mental well-being.
  • High-risk Activities: Some UHNWI engage in adventurous or high-risk activities, such as extreme sports, which can increase the chances of accidents, injuries, and associated medical complications.
  • Medical Privacy Concerns: UHNWIs may face challenges related to medical privacy due to their high-profile status. Maintaining confidentiality of personal health information can be crucial to prevent potential breaches, leaks, or unauthorised access.

To mitigate these risks, UHNWI can take the following measures:

  • Prioritise Self-Care: UHNWI needs to prioritise their physical and mental well-being. This includes regular medical check-ups, maintaining a healthy lifestyle, and engaging in stress-reducing activities such as exercise, meditation, and quality time with loved ones.
  • Access to Quality Healthcare: UHNWI should ensure access to quality healthcare services by building a trusted network of healthcare professionals, including primary care physicians, specialists, and wellness experts. Establishing a comprehensive healthcare plan and having a dedicated medical team can provide personalised care and prompt attention when needed.
  • Addressing Mental Health: UHNWI should recognise the importance of mental health and seek professional help if needed. This may involve engaging with therapists, counsellors, or psychiatrists to address stress, anxiety, or other mental health concerns.
  • Promoting Work-Life Balance: UHNWI should strive to achieve a healthy work-life balance by setting boundaries, delegating tasks, and allocating time for rest, relaxation, and personal activities.
  • Maintaining Medical Privacy: UHNWI should ensure that their medical records and personal health information are handled securely and confidentially. Working with trusted healthcare providers who prioritise patient privacy and confidentiality is crucial.

By prioritising personal health, seeking appropriate medical care, and maintaining a balanced lifestyle, UHNWI can mitigate the specific medical risks they may encounter and enhance their overall well-being.

Risk of Burglary

Ultra High Net Worth Individuals (UHNWI) can be at an increased risk of burglaries due to their wealth and the valuable assets they possess. Criminals may target UHNWI’s residences or properties to steal high-value items, cash, or sensitive information.

Here are some factors that contribute to the risk of burglaries for UHNWI:

  • Wealth and Perceived Value: UHNWI’s wealth and luxurious lifestyles can make them attractive targets for burglars. The perception that their residences contain valuable assets, including artwork, jewellery, high-end electronics, and expensive vehicles, can make them vulnerable to burglary attempts.
  • Public Knowledge and Media Exposure: UHNWI’s public profiles and media exposure can inadvertently provide information about their residences, travel plans, and personal routines. Criminals may exploit this information to plan and execute burglaries with higher chances of success.
  • Residential Security Measures: UHNWI often reside in large, private properties or luxury residences, which may pose unique security challenges. Inadequate security measures, such as weak locks, lack of surveillance systems, or limited security personnel, can increase the risk of burglaries.
  • Insider Threats: Individuals employed at UHNWI’s residences, such as domestic staff or security personnel, can pose a risk if they engage in criminal activities or collude with external burglars.

To mitigate the risk of burglaries, UHNWI can take several precautions:

  • Robust Security Systems: Implement comprehensive security systems, including alarms, surveillance cameras, and access control measures, to deter burglars and promptly detect unauthorised entry.
  • Physical Security Measures: Strengthen physical security by installing high-quality locks, reinforced doors and windows, and secure perimeter fencing. Safe rooms or secured areas within the residence can provide additional protection during a potential burglary.
  • Security Personnel: Employ trained security personnel to monitor and safeguard the premises, conduct regular patrols, and respond quickly to potential threats or breaches.
  • Privacy and Information Security: Maintain a low public profile and limit the dissemination of personal information that criminals could exploit. Be cautious about sharing travel plans or details of valuable assets.
  • Neighbourhood Watch and Collaboration: Engage with local law enforcement agencies and participate in neighbourhood watch programs or community security initiatives to enhance overall security in the area.
  • Insurance Coverage: Obtain appropriate insurance coverage to protect valuable assets and possessions in the event of a burglary or theft.

It is essential for UHNWI to regularly assess and update its security measures based on changing risks and vulnerabilities. Consulting with security experts or professionals experienced in protecting HNW individuals can provide valuable insights and guidance in implementing effective security strategies.

Travel Risks

Ultra High Net Worth Individuals (UHNWI) may face unique travel security risks due to their wealth, prominence, and high-profile status. When travelling, they can become targets for various threats, including theft, kidnapping, terrorism, and information breaches.

Here are some essential travel security risks to consider:

  • Targeted Theft: UHNWI may be targeted for theft due to their valuable possessions, such as jewellery, luxury items, or high-end gadgets. Opportunistic thieves or organised criminals may attempt to steal from them at airports, hotels, or during ground transportation.
  • Kidnapping and Extortion: UHNWI can be at risk of kidnapping or extortion attempts while travelling, especially in regions with higher crime rates or political instability. Criminals may perceive them as lucrative targets for ransom or financial gain.
  • Personal Security and Safety: UHNWI’s high-profile status can make them vulnerable to personal security risks, including assault, robbery, or harassment. Their prominence may attract unwanted attention from individuals with malicious intent.
  • Privacy and Information Security: UHNWI’s sensitive information, including financial data and personal details, can be at risk of breaches during travel. Cybercriminals or identity thieves may attempt to exploit vulnerabilities in digital systems, public Wi-Fi networks, or physical documents.
  • Terrorism and Political Unrest: UHNWI travelling to regions with a history of terrorism or political unrest face increased security risks. They may become inadvertent targets or be caught up in violent incidents, demonstrations, or civil unrest.

To enhance travel security for UHNWI, the following measures are recommended:

  • Risk Assessment and Planning: Conduct thorough risk assessments of travel destinations and maintain up-to-date information on local security situations. Plan itineraries and accommodations accordingly, avoiding areas with high crime rates or volatile conditions.
  • Close Protection and Security Personnel: Employ experienced and reputable security personnel or close protection officers who can provide personal security during travel. These professionals can help mitigate risks and respond to potential threats.
  • Secure Transportation and Accommodations: Arrange secure ground transportation with trusted providers and consider utilising armoured vehicles where necessary. Stay in reputable hotels or accommodations with robust security measures.
  • Privacy and Digital Security: Maintain strict privacy protocols and utilise secure communication channels while travelling. Avoid connecting to unsecured public Wi-Fi networks, and be cautious with sharing personal or financial information.
  • Travel Insurance: Obtain comprehensive travel insurance that covers kidnap and ransom, personal security, medical emergencies, and potential losses or theft of valuable items.
  • Cultural Awareness and Local Contacts: Understand and respect local customs, laws, and regulations. Establish contacts with local authorities or reputable security services for assistance and advice when needed.
  • UHNWI should work with specialised security consultants or travel security experts who can provide personalised risk assessments, travel planning, and ongoing support to ensure their safety and security while travelling.

In addressing these threats, UHNW and HNW individuals should prioritise proactive risk management, seek expert advice when needed, and establish a comprehensive security framework that includes personal, digital, and physical security measures. These steps can mitigate potential risks, protect their wealth, reputation, and personal safety, and maintain peace of mind in an increasingly complex and interconnected world.

It is important to note that these are general threats and may not cover all potential risks UHNW and HNW individuals could face. Each individual’s circumstances and geographical location may introduce additional threats to consider when assessing their overall risk profile.

The Significance of Executive Protection in Collaborative Crisis Management Planning

0
collaborative crisis management planning

In today’s dynamic and unpredictable business landscape, organizations face numerous potential crises that can disrupt operations and damage their reputation. To effectively mitigate the adverse impact of such events, organizations must consider executive protection as a crucial component of their crisis management planning. This article emphasizes the importance of collaborative crisis management planning, highlighting the critical role of executive protection in ensuring business continuity.

It provides practical examples of how organizations can develop comprehensive contingency plans, benefiting both government and business executives responsible for securing their organizations’ resilience and continuity in times of crises.

The Need for Multiple Crisis Management Plans

As crises become more frequent and severe, organizations must be fully prepared to respond efficiently and effectively to any disruption that jeopardizes their operations and survival. Recognizing the importance of business continuity, crisis management, and the role of Executive Protection enables organizations to navigate challenging times with resilience and success.

To emphasize this need, organizations should adopt multiple crisis management plans with a particular focus on collaboration and integration of Executive Protection.

Components of Comprehensive Crisis Management Planning

A comprehensive crisis management plan should incorporate the following key components

  • Risk Assessments: Organizations should conduct thorough risk assessments to identify potential crises that could adversely affect their operations. This includes evaluating internal and external risks, such as natural disasters, cyber-attacks, supply chain disruptions, or public relations crises.
  • Protocols and Communication: Crisis management plans should outline clear protocols for responding to crises and establishing effective communication channels. This includes designating Executive Protection teams, defining roles and responsibilities, establishing communication hierarchies, and ensuring timely and accurate information dissemination both internally and externally.
  • Resource Allocation: Adequate resource allocation is critical during crises. Organizations should identify and secure the necessary resources, such as personnel, facilities, technology, and financial reserves, to support crisis response and recovery efforts.
  • Training and Drills: Regular training and drills are essential to ensure that employees understand their roles and responsibilities during a crisis. By simulating different scenarios, organizations can test the effectiveness of their crisis management plans, identify gaps, and refine their response strategies.

Collaborative Crisis Management Planning

Importance of Executive Protection in Collaborative Crisis Management Planning

The integration of Executive Protection within crisis management planning provides organizations with several crucial advantages:

  • Enhanced Security and Safety: Executive Protection ensures the safety of key personnel during crises, allowing leaders to focus on critical decision-making without compromising personal security. The presence of trained security professionals mitigates risks and instills confidence in the organization’s ability to protect its assets.
  • Tailored Crisis Response: Different crises demand unique approaches. Collaborative crisis management planning enables Executive Protection experts to contribute their specialized knowledge and expertise, resulting in tailored crisis response strategies that address specific threats and vulnerabilities.
  • Geographical Considerations: Organizations with operations in multiple locations face distinct crisis scenarios. Collaborative planning involving Executive Protection experts allows for the development of localized crisis management plans tailored to specific regions or countries, ensuring a more effective response and recovery.
  • Seamless Integration: By incorporating Executive Protection into crisis management planning from the outset, organizations can seamlessly integrate security measures and protocols into their overall response strategy. This collaboration streamlines decision-making processes, enhances communication, and fosters a more coordinated and effective crisis response.

Leadership in Collaborative Crisis Management

Effective leadership plays a pivotal role in collaborative crisis management. Leaders must exhibit qualities such as decisiveness, communication and transparency, and adaptability and resilience.

These qualities enable leaders to make prompt and well-informed decisions, maintain open communication with stakeholders, and navigate uncertainty while ensuring business continuity.

Contingency Plans

While the specific content of contingency plans may vary, here are some common types of plans that highlight the role of Executive Protection:

  • Executive Protection Contingency Plan: This plan outlines measures to safeguard key personnel during crises, including threat assessments, secure transportation arrangements, emergency communication protocols, and coordination with local law enforcement agencies.
  • Cybersecurity Incident Response Plan: This plan details actions to be taken in the event of a cybersecurity breach, encompassing incident containment, forensic analysis, customer communication, and recovery procedures. Executive Protection may play a role in protecting key digital assets and ensuring the security of sensitive information.
  • Supply Chain Disruption Plan: This plan addresses alternative sourcing options, inventory management strategies, and communication with suppliers and customers in the event of a supply chain disruption. Executive Protection can contribute by ensuring the security of critical supply chain infrastructure and preventing unauthorized access.

In an increasingly uncertain world, organizations must proactively prepare for and manage crises with utmost diligence. By incorporating executive protection within collaborative crisis management planning, organizations can enhance their ability to respond swiftly and decisively to any disruption.

Business continuity, effective leadership, and comprehensive contingency plans that include executive protection are vital for organizations to navigate crises successfully. Embracing these principles empowers government and business executives to safeguard their organizations and ensure their long-term sustainability.

From Concept to Success: What Does It Take to Start a Security Company?

0

As the demand for security services escalates, venturing into this sector by starting a security business can present challenges and lucrative opportunities. In this article, we will examine the essential elements to start a security company and offer invaluable insights and guidance for aspiring entrepreneurs. 

Firstly, establishing and operating a thriving security business requires meticulous research and comprehensive planning to ensure a solid foundation.  

Understanding your target market is crucial for tailoring your services and strategies effectively. In the security industry, your target market consists of homeowners, offices, stores, event organizers, people who need bodyguards, people/businesses who need private investigators, and public places. Identify the specific niche you intend to serve, such as personal protection for a celebrity or residential protection. Focusing on a niche could help you differentiate your business and meet the unique needs of your customer base.  

Conducting extensive market research will help you gain insights into your competition, industry trends, and potential customer preferences. Analyze your competitors’ strengths and weaknesses, identify service gaps, and use this information to differentiate your company. Understand the frequent pricing models in the market and determine the value you can provide your clients to ensure a competitive edge. 

Before you start a security company you should have a robust business plan. A well-structured business plan is like a roadmap for your security company’s success. It provides a clear understanding of your vision, goals, and strategies. Include an executive summary, company description, services offered, marketing and sales strategy, operational plan, and financial projections. A comprehensive business plan guides your initial steps and is a valuable reference when seeking funding or partnerships. 

A strong foundation for your security company

Establishing a solid foundation is essential for your security company’s long-term success and sustainability. 

If you establish a legal business, you must operate 100% legally!

It is a sad fact that many who establish a legally licensed security company, continue to take shortcuts and cut legal corners. One important point, if you are hiring a company to provide protective services, make sure that they are 100% compliant with the law, and obtain copies of their licenses, and make sure they properly pay employees as required by state requirements.

Jerry Heying, President and CEO

International Protection Group LLC & Executive Protection Institute

A productive workplace that draws and keeps top personnel is essential to thriving in the fast-paced security sector. Establishing distinct company principles and fostering a powerful organizational culture can help with this. The essential values of your business should include professionalism, ethics, and an unshakable dedication to excellence. These will be the guiding principles for how your business operates. A robust and prosperous work environment in the security industry will also be facilitated by fostering cooperation, continual learning, and a sense of shared purpose among your personnel. 

A compelling brand identity will help you differentiate your security company from competitors. Develop a strong and memorable logo, create a visually appealing website, and ensure consistency in your marketing materials to build brand recognition and trust. In addition, build a solid online presence and use social media platforms to engage with your target audience and showcase your services and expertise. 

Consult with legal experts to determine the most appropriate legal structure for your security company, such as a sole proprietorship, partnership, or limited liability company (LLC). The most common business structure options for security companies include sole proprietorship, partnership, limited liability company (LLC), and corporation. Opting for a legal entity like an LLC or corporation safeguards you from personal liability in the event of lawsuits or legal disputes involving your security guard company. This separation between personal and business assets ensures that your personal finances remain shielded, providing you with peace of mind and added protection as you navigate the complexities of the security industry. Register your business, obtain necessary licenses, and comply with the security industry’s local, state, and federal regulations. Operating within the legal framework and maintaining compliance should be one of your top priorities if you would like to build trust with your clients and stakeholders. 

Protecting your security company against potential risks and liabilities should also be on your radar. Obtain appropriate insurance coverage to safeguard your business, employees, and clients. Consult with insurance experts in the security industry to ensure comprehensive coverage that addresses your unique needs and mitigates potential risks. 

What Does It Take to Start a Security Company?

Hiring and training

The first step is determining the roles required for your company’s operations, such as executive protection specialists, security consultants, or administrative staff. Clearly define their responsibilities and qualifications to ensure you hire individuals who align with your company’s values and possess the necessary skills. Consider hiring individuals with relevant experience in the security industry to leverage their expertise.  

Implement effective recruitment strategies to attract qualified candidates. You can use online job boards, industry associations, and networking platforms to reach potential hires. Consider collaborating with security training schools or programs to access a pool of trained professionals. Conduct thorough interviews and assess candidates based on their qualifications, experience, and alignment with your company’s values.  

Prioritize the safety and trustworthiness of your team by conducting comprehensive background checks and vetting procedures. Verify previous employment, check references, and conduct thorough criminal background screenings to ensure your clients receive the highest level of security. Protecting your clients’ interests and maintaining their trust will affect the long-term success of your security company. 

Providing comprehensive training programs will help you equip your team with the necessary skills and knowledge. Develop a training curriculum covering technical and soft skills relevant to the executive protection industry. For example, technical skills training may include threat assessment, emergency response protocols, surveillance techniques, and defensive driving. Additionally, offer ongoing professional development opportunities to enhance your team’s capabilities and keep them updated with the latest industry trends. 

Acquiring equipment and technology

Equipping your security company with the right tools and technology will ensure you provide effective client services.  

Identify the equipment and tools required for your niche in the industry. This may include apparel such as jackets for security guards, and bulletproof vests etc., flashlights, defense gear (guns, pepper sprays etc.). Conduct thorough research to select reliable and high-quality equipment that meets industry standards and your niche needs. 

Stay updated with the latest security technology advancements to enhance your services’ efficiency and effectiveness. Continuously explore new equipement and communication devices to determine the best fit for your company’s unique needs. Factors such as scalability, ease of use, reliability, and compatibility with existing systems should be considered during the evaluation process. 

Develop an extensive budget for purchasing and maintaining the necessary equipment and technology. First, consider initial and ongoing costs like maintenance, upgrades, and license fees. Then, allocate resources strategically to ensure you have the essential tools and technology to deliver top-notch services to your customers. 

Conclusion 

In order to start a security company one has to conduct extensive research, meticulous planning, and a commitment to providing high-quality service. By identifying your target market, conducting market research, and developing a comprehensive business plan, you can ensure the success of your business.

Building a strong foundation, recruiting and training qualified staff, purchasing the right equipment and technology, and ensuring compliance with legal regulations are essential for long-term growth. Embrace the challenges and opportunities in this dynamic industry, and always prioritize exceptional customer service.

With dedication and perseverance, you can start a security company and significantly impact and thrive in the executive protection industry. 

Executive Protection and Identity Theft Recognition, Prevention and Mitigation

0
identity theft

In today’s digital age, where the threat of identity theft looms large, executive protection professionals play a crucial role in safeguarding the lives and assets of their clients. Beyond their primary responsibility of physical protection, EP professionals should look for opportunities to educate their clients on the risks of identity theft and fraud. These threats have become increasingly pervasive and sophisticated in today’s society, making it essential for individuals to be well-informed and prepared.

Identity theft takes on various forms, each capable of causing significant harm to individuals. Financial identity theft involves the fraudulent use of someone’s financial accounts, often resulting in monetary losses and damaged credit. Criminal identity theft occurs when an individual’s identity is assumed during the commission of crimes, potentially leading to false accusations and legal consequences for the victim. Medical identity theft involves the unauthorized use of personal information to obtain medical services, which can lead to incorrect medical records and financial liabilities. Child identity theft targets the personal information of minors, allowing identity thieves to exploit their clean credit histories for financial gain. By incorporating executive protection into the article, we emphasize the importance of personal protection and the need for EP professionals to educate their clients about these different forms of identity theft.

EP professionals should place a strong emphasis on the recognition and reporting of identity theft incidents. It is crucial for individuals to be vigilant and aware of warning signs such as unauthorized transactions, unfamiliar accounts or charges on credit reports, missing mail or unexpected bills, denial of credit or loan applications, and notifications of data breaches involving personal information. By promptly recognizing these indicators, individuals can take immediate action to mitigate the potential damage caused by identity theft. EP professionals should encourage their clients to report any suspicious activity to their local law enforcement agency and notify their financial institutions promptly. Timely reporting is essential for initiating investigations and minimizing the impact of identity theft.

Recovering from identity theft can be a daunting and time-consuming process, but there are steps individuals can take to regain control of their identities. EP professionals can provide guidance on initiating fraud alerts or credit freezes on credit reports, which help prevent further unauthorized activity. It is essential to work with credit bureaus to dispute any fraudulent accounts and request their removal from credit reports. Strengthening online account security is another critical aspect of recovery, involving the updating of passwords to strong and unique combinations and enabling two-factor authentication whenever possible. Detailed records of all communication related to the theft incident should be kept ensuring a well-documented recovery process. In severe cases where the complexity of identity theft exceeds individual capabilities, EP professionals may recommend seeking professional assistance from reputable identity theft restoration services.

EP professionals should also highlight the vulnerability of specific demographic groups to this issue. Children, elderly individuals, and college-aged students are often prime targets for identity thieves due to factors such as limited awareness, trusting nature, and potential access to personal information by family members or close acquaintances. EP professionals can educate their clients on the risks faced by these groups and provide practical guidance on protecting personal information. Parents and guardians should be advised to educate children about the importance of online privacy, safe internet practices, and responsible sharing of personal information. Elderly individuals and college students should be encouraged to exercise caution when sharing sensitive information, remain vigilant against phishing attempts, and seek advice from trusted sources before disclosing personal information.

Prevention is paramount in the battle against identity theft. EP professionals should advise their clients to adopt proactive measures to minimize the risk of falling victim. Safeguarding personal information is crucial, and individuals should only share it with trusted sources or secure websites. Creating strong and unique passwords for online accounts, as well as enabling two-factor authentication whenever possible, adds an extra layer of security.

It is essential to exercise caution when encountering suspicious emails, messages, or phone calls and to verify the legitimacy of requests before providing personal information. Regularly updating software and devices is crucial to patch vulnerabilities and ensure optimal security. Monitoring financial accounts for any unauthorized transactions and reporting discrepancies promptly to financial institutions can help detect and mitigate this type of theft.

It is also recommended to utilize secure Wi-Fi networks for sensitive online activities, avoiding public Wi-Fi networks when sharing personal information. Shredding physical documents containing personal information before disposal is another preventive measure. Limiting the amount of personal information shared online, particularly on social media platforms, reduces the potential for identity theft. EP professionals may also suggest utilizing credit monitoring services that offer prevention, mitigation, and recovery assistance, providing an added layer of security and peace of mind.

By incorporating executive protection into the article, we underscore the proactive role EP professionals play in protecting their clients from identity theft. Through education, recognition, reporting, and prevention, individuals can significantly mitigate the risks associated with this type of theft and safeguard their personal information. The Federal Trade Commission (FTC) is a valuable resource for additional information and tools to combat identity theft effectively. By promoting awareness and providing practical guidance, EP professionals can help their clients navigate the digital landscape with confidence and protect themselves against the ever-evolving threats of identity theft and fraud.

 

Planning and Executing a Conference in 6 Months: Challenges Faced and Solutions Discovered

0
conference

In January 2023, we – the Board of Executive Protection Professionals, gathered to discuss the feasibility of putting on a major conference within a 6-month window. At first glance, it seems simple: you need a venue, speakers, sponsors, and attendees.

But it’s so much more complicated than that. This article outlines some of the biggest challenges and related solutions to consider when you aspire to host a large conference in another state, with over 200 attendees from around the globe, and 12 expert speakers.

Challenge #1: Venue Selection and Logistics

Selecting an appropriate hotel venue that can accommodate the needs of a security conference is crucial. First, we had to decide on the proper city to host the conference. The decision boiled down to what cities are accessible for attendees to travel to and what cities will offer the best conference experience, while limiting outside distractions. This made Kansas City the choice for us. We considered a range of hotels and venues in the Kansas City area.

With the hotel that we selected, we focused on:

  • the ability to accommodate the event’s needs
  • customer service, and
  • estimated costs.

Once we selected the hotel, there was the challenge of ensuring that all of the conference materials, literature, and branded decorations got to the venue in a timely manner. For this, the approach of nominating a local Kansas City BEPP member to receive all conference shipments was best. This approach gave us confidence that everything we needed to be onsite at the venue could easily be transported there one day ahead of the conference starting.

Challenge #2: Budget Management

Organizing a not for profit conference like ours, on a limited and dynamic budget can be daunting. The first challenge was brainstorming with the Board about delivering a conference experience that is a step above what people are accustomed to, then translating that into actionable elements. Next, we moved on to estimating the amount of funds needed to cover the costs of the conference (from venue costs to printed materials). From there, it was necessary to roughly define the number of sponsors and tickets required (along with pricing tiers) to fund all the essential expenses to turn our vision into reality. It cannot be overstated that it was an enormous task to organize all estimates on the expense and revenue side.

A critical component to generating the support from sponsors needed to make the conference possible was board members’ and advisors’ deep professional networks. Without strong connections already existing between potential sponsors, it would have been an uphill battle to sell them on the idea of supporting a conference when it is the first of its kind. On a similar note, developing professional relationships with the leadership at the venue was helpful when it came to negotiating pricing, having alternative conference areas available to us (e.g., what if it rains during the mixer?), and support after the conference.

conference

Challenge #3: Attendee Experience and Engagement

We’ve all been to conferences over the years where we could have been more engaged in the content, or the overall experience may have felt bland and cookie-cutter. Creating an engaging environment and an excellent experience for attendees is multifaceted. Solutions that we found to be useful for building engagement with the content were first to get the conference agenda out to attendees as early as possible. This got the attendees’ minds churning through the topics to be covered weeks in advance. Second, when everyone was seated for the conference and had a hardcopy of the agenda and the speakers’ presentations in their hands, it encouraged them to take notes and ask questions, whether that was in front of the group or privately with the speakers after their presentations.

The highest levels of engagement tended to come from smaller conference sessions such as the “end of conference, conference”. On the conference’s final day, panel discussions covered aspects specific to security business owners, such as legal considerations, financial/tax considerations, and branding. Based on the volume of questions and enthusiasm coming from the audience, these sessions could have easily been expanded.

Additional Insights: It’s All About Details

The more facetime we all got with attendees, the more we consistently heard feedback about how the “small things” about the conference had a significant impact on their experience. They were first impressed with the credentials they received in the mail weeks before the conference. At the mixers, they remarked that having a harpist playing live music was something they never see in our industry. And when it comes to the conference itself, attendees were thrilled to have a copy of the presentations they could take home with them and share with their team members.

As one attendee said, “The level of detail and professionalism that has been put into this event cannot and should not go unnoticed. It was evident before the conference even began. From the credentials being sent via mail, to the location, the content, down to the extremely personable members of the board, the conference was excellent.”

Taken altogether, these each appear as a small gesture. But in the grand scheme, these gestures made attendees feel like they were receiving a level of service they weren’t used to.

Closing Thoughts

Planning and executing a conference within six months presents numerous challenges, but success is achievable with support from a committed team and strategic planning.

The selection of an appropriate venue and effective logistics management are essential for a smooth event. Budget management requires meticulous estimation and leveraging professional networks to secure sponsorships. Creating an engaging and memorable experience for attendees involves early communication, interactive sessions, and attention to detail. Ultimately, the combination of these factors, along with the small gestures that demonstrate a commitment to attendees, contribute to the overall success of a security conference. By tackling each challenge head-on and prioritizing attendee satisfaction, organizers can overcome the hurdles and deliver a remarkable event that exceeds expectations.

About the Conference

From June 7th to 9th, the Board of Executive Protection Professionals hosted 230+ security leaders at their inaugural Executive Security Operations Conference in Kansas City, Missouri.

The conference featured 12 esteemed speakers ranging from the Former Assistant Secretary of State for Diplomatic Security to Chief Security Officers and beyond. They shared insights from their extensive experience on topics ranging from medical oversight, how to establish a drone program, and the fundamentals such as protective advances.

The speakers, sponsors, and attendees that made the conference possible showed great enthusiasm for the Board’s mission to elevate the executive production industry’s training, quality, and professionalism.

Highlights from conference presentations included the following:

  • Michelle Keeney’s perspective on the application of Protective Intelligence for Executive Security Operations, where she shared lessons from her career with the US Secret Service.
  • Scott Lowther’s (CPP, PCI) in-depth look at Executive Protection Operations from the Client’s Perspective. He shared tactical advice for navigating the inevitable challenges of managing vendors supporting your security mission.
  • Mary Beth Janke’s unique thoughts on Mental Health During Executive Protection Operations, as a former US Secret Service Agent and forensic/clinical psychologist. In this presentation, she gave attendees practical tools and ideas for managing stress and performing at their highest levels.

 

 

Cloudy with a Chance of Pessimism

0
security and executive protection

As the adage goes, “when it rains it pours.” Fear and panic will spread throughout the public as quick as a brush fire; ironically, this was not far from the truth on the 6th of June 2023.

Smoke, from wildfires in Quebec, Canada, blew downstream toward the New York metropolitan area – as well as other parts New York, New Jersey, and New England, creating an increasingly high poor air level quality. For the next 48 hours, Manhattan was shrouded in an orange haze accented by a charred odor. Breathing conditions became strained and the appearance of face masks brought back sour memories of the COVID-19 pandemic. Outcries ranged from mild inconvenience to partial lockdowns of commercial and residential properties to control airflow.

Security and close quarter protection operations encompass much more than deterrence of physical and cyber harm principals might face, there is also a protective, psychological aspect. Prior – mostly in the form of natural disasters, real-time, and post stages of a serious incidents or disasters, merit much more than a “muscle in the suit” approach. The well-rounded security and executive protection agent also safeguard and provides mental peace of mind of those under protection.

No two principals are alike.

Some principals have the mental toughness and rationale to adapt and cope with unexpected or precarious circumstances and others fall victim to the dire outlooks portrayed an many news and social media outlets. Security and executive protection personnel must act as optimistic strategists.

Moreover, security and executive protection management and leaders respectively, must ensure that they themselves, and their teams, maintain this mindset because if the protectors are mentally incapacitated, this increases the likelihood of harm for all those involved in the close quarter protection detail.

The public and principals might not see security as one to run to during a normal day; however, one can bet that they will be sought in the event of inconvenience, incidents, and fear. Researching and understanding the principals’ organization and personal attributes are force multipliers in preparation to face physical and psychological roadblocks that may occur.

Even though C-Suite members appear to many as untouchable, all-powerful, and able to buy their way out of anything, they too can be frightened and fear negative backlash from a serious incident or crises gone wrong. Consultant Roger Jones (Harvard Business Review, 2015), conducted a survey of C-Suite executives, and learned that the most common fears among them included but were not limited to:

  • “Imposter Syndrome,” where the executive feels themselves as to be found incompetent.
  • Underachieving.
  • Appearing too vulnerable and foolish.

The first step to overcoming something is to see something, or someone, for what they really are and understand that everyone must answer to someone – i.e. the Board of Directors, Stakeholders.

C-Suite executives and upper management might have more monetary means, possess greater organizational power, and can end security contracts and/or funding if deemed necessary; however, the human element must not be underestimated or removed out of the security and executive protection framework.

Unveiling the Power of Pre-Employment Investigations: Safeguarding Organizations with Advanced Behavioral Assessments

0
Pre-Employment Investigations

Conducting workplace investigations can be a challenging and daunting task, especially when internal investigators have personal knowledge or relationships with the individuals involved. To ensure impartiality and objective fact-finding, organizations often rely on external sources for such investigations. Among the several types of workplace investigations, pre-employment investigations hold significant importance in mitigating risks and protecting organizations from potential losses.

This article explores the critical role of pre-employment investigations and emphasizes the integration of advanced behavioral assessments, such as Verensics, to effectively screen out undesirable applicants.

The Crucial Role of Pre-Employment Investigations

Pre-employment investigations involve comprehensive background checks on potential employees before extending a job offer. While time constraints or the urgency to secure qualified candidates may limit the depth of these investigations, critical positions typically undergo thorough scrutiny. Pre-employment investigations offer numerous benefits to corporations, including:

  • loss prevention,
  • protection against negligent hiring, and
  • mitigation of potential civil litigation risks.

One primary concern addressed by pre-employment investigations is theft prevention. However, their scope extends far beyond this, as these investigations can unveil critical information such as identifying applicants with a history of criminal behavior, including pedophilia or substance abuse. By identifying and disqualifying such individuals during the hiring process, organizations can prevent potential catastrophes and protect vulnerable populations.

Moreover, comprehensive pre-employment investigations contribute to building a more trustworthy workforce. By thoroughly vetting candidates, employers can minimize the risk of discrimination and negligent hiring practices. These investigations allow employers to uncover any previous complaints, reports, or charges against the candidate, ensuring informed decision-making and safeguarding the organization’s reputation.

Pre-Employment Investigations
Unveiling the Power of Pre-Employment Investigations: Safeguarding Organizations with Advanced Behavioral Assessments by Alan Saquella

The Evolution of Pre-Employment Investigations

In the past, employers would maintain files on employees who had committed workplace crimes, containing personal information and records of their activities within the company. However, in today’s litigious society, it is recommended that publicly accessible databases of such information should be avoided. Instead, employee records should be stored securely and accessed only by authorized personnel with a legitimate need-to-know.

Obtaining relevant information about potential employees from their previous employers has become increasingly challenging due to policies on releasing information. Many organizations have adopted a more restrictive approach, often limiting their response to confirming employment dates, job titles, and eligibility for rehire. However, recent lawsuits indicate that previous employers may be held liable if they fail to disclose relevant information to new employers. To mitigate risks and ensure a comprehensive assessment, conducting thorough background investigations remains essential.

Enhancing Pre-Employment Investigations with Behavioral Assessments

To further enhance the effectiveness of pre-employment investigations, organizations are increasingly turning to advanced behavioral assessment tools. Verensics, a leading provider in this field, offers a valuable solution to screen out undesirable applicants during the hiring process.

Behavioral software leverages advanced technology and data analysis to assess an applicant’s behavioral traits, personality characteristics, and potential red flags. By employing sophisticated machine learning algorithms, this software can analyze vast amounts of data, including social media activity, online presence, and public records, to provide a comprehensive profile of an applicant. For example, during a recent panel interview, a candidate exhibited unusual responses, and while nothing was discovered in the background investigation, a behavior assessment software program detected issues. The candidate self-disclosed during the assessment their involvement in an unsolved robbery. Behavior assessments make it easier for applicants to admit to past behaviors compared to face-to-face interviews. In this illustration, the applicant could have been hired if the behavior assessment had not been used as an additional screening tool.

The integration of behavioral assessments in pre-employment investigations empowers employers to make more informed hiring decisions. By identifying behavioral patterns that may indicate potential issues, such as aggression, dishonesty, or inappropriate conduct, organizations can proactively exclude applicants who may pose a risk to workplace safety, productivity, and reputation.

Moreover, advanced analytics allow organizations to establish benchmarks and compare applicants against successful employees in similar roles, ensuring a better fit for the position and the organization’s culture. By utilizing data-driven insights, organizations can select candidates who demonstrate the desired behavioral attributes and align with the company’s values and objectives.

Conclusion

Workplace investigations, particularly those conducted internally, can be complex and challenging due to personal relationships and biases. Pre-employment investigations play a pivotal role in safeguarding organizations by preventing theft, protecting vulnerable populations, and minimizing the risk of civil litigation. While obtaining information from previous employers has become increasingly difficult, conducting thorough background checks remains paramount.

The inclusion of advanced behavioral assessments, in pre-employment investigations provides an additional layer of screening to effectively identify and exclude undesirable applicants. By leveraging innovative technology and data analysis, the program enables employers to assess behavioral patterns and potential red flags, enhancing their ability to make informed hiring decisions.

In today’s competitive and ever-evolving work environment, organizations must prioritize thorough pre-employment investigations and embrace innovative tools like Verensics to ensure the selection of qualified, trustworthy candidates while minimizing risks associated with workplace issues. By investing in comprehensive background checks and advanced behavioral assessments, organizations can strengthen their workforce integrity and create a safer and more productive workplace environment.

 

Making the Case for EP Medical Providers to Carry TXA in their Medical Bags

0
Tranexamic acid, also known as TXA

Imagine you are a lone EP Medic tasked to accompany your client for their 2-week trip to a remote destination, be it a cabin in Alaska, a ranch in Wyoming, a yacht trip to St Barts, or an Arican safari. Your client and their family count on you for their safety and medical treatment. During client coverage, an incident occurs; it could be a jet-ski accident, a vehicular accident on safari, getting bucked off a horse at a remote ranch, or a snowmobile accident in Alaska, all of which can have delayed transport times ranging from 2-10 hrs for definitive care. Now let us talk about the patient: you, as the medic, medical bag in hand, are with the client at the time of the incident. During the initial assessment, your patient has a very tender abdomen with abdominal wall bruising and flail chest segment. No further injuries are observed, and no significant bleeding is visible. Moving to your secondary assessment, you check your patient’s vitals. He is mildly tachycardic with a HR of 110, and his BP is lower than his baseline at 105/68. You have been with your patient for around 5 minutes at this point. What are you suspecting, and what interventions do you start with? Now you have been with your patient for 15 minutes; they are becoming cool, pale, and diaphoretic and are in trouble; their heart rate has increased to 130s, and their BP has dropped to 98/60. As the medic, suppose you are trained to do a FAST Scan (Ultrasound of the Abdomen) using your portable Butterfly IQ Ultrasound. In this case, you see free fluid in the hepatorenal recess or Morison pouch. What can you do next? What do you carry? Do you have TXA? Many may ask, what is TXA? 

Tranexamic acid, also known as TXA, is a drug with many uses that has attracted much attention in the medical community and has seen increased military and civilian utilization over the last decade. TXA was first made in 1962 by Japanese researchers and approved by the US Food and Drug Administration (FDA) in 1986. This article aims to give an overview of TXA, covering its mechanism of action, indications, contraindications, administration techniques, side effects, and how we can use it in the EP industry

What is the Mechanism of Action?

TXA effectively reduces bleeding by aiding in stabilizing and preserving pre-existing clots from breaking down. It is a synthetic lysine derivative and binds to the lysine-binding sites on plasminogen, preventing plasminogen from becoming the active form, plasmin, thus preventing the breakdown of blood clots.

Indications

TXA, in recent years, has been brought to the forefront of Pre-Hospital trauma due to its ability to aid in uncontrollable hemorrhage (aka bleeding in the box). However, TXA has multiple uses and is frequently used in surgical operations to control bleeding and lessen the need for blood transfusions. Additionally, TXA is widely administered to women because it is useful in controlling heavy menstrual bleeding. The treatment of hemophilia, a hereditary condition that inhibits blood coagulation, is another critical application. TXA aids in the prevention and management of hemophiliacs’ bleeding episodes by slowing clot disintegration.

Contraindications

There are a few reasons why medics should not use TXA in an uncontrolled hemorrhagic emergency. The patient has an allergy to TXA or any of its components, a history of a venous or arterial thrombotic event, suspected intracranial bleeding, or you believe the traumatic incident occurred more than 3 hours ago. 

Adverse Effects

Like any medication, TXA has potential adverse effects. The most common side effects reported include nausea, vomiting, and gastrointestinal disturbances. Rarely allergic reactions such as rash, itching, or difficulty breathing may occur. Uncommon but serious adverse effects include thromboembolic events, which can be life-threatening. Be sure to monitor the patients closely when administering TXA. Proper administration is essential to a positive patient outcome. 

Tranexamic acid, also known as TXA
Making the Case for EP Medical Providers to Carry TXA in their Medical Bags by Shane Jenkins and Michael Guirguis, MD

How and why should we use TXA in EP? 

As professionals, we should strive to provide the best protection for our clients. Adding TXA to an EP medic bag provides a unique versatility that enhances comprehensive patient care. TXA’s versatile route of administration IV/IO/IM, nebulized to the topical application, provides the practitioners with multiple modes of hemorrhage control. The use of TXA ranges from massive hemorrhage control in a multisystem trauma patient to topical application for patients who have deep lacerations while on anticoagulants. TXA’s ability to inhibit clot breakdown combined with its minimal contraindications allows it to be written into protocols with minimal to no impact on the medical director’s medicolegal liability. 

Methods of Administration: While individual protocols may differ slightly, below are some of the most common uses and routes of administration. (Disclaimer: Please follow the protocols and/or policies & procedures of your local EMS agency and/or medical director if and when giving TXA or any regulated prescription medication.)

  • IV/IO (Intraosseous): Primarily used in trauma or pre-surgical settings to prevent surgical hemorrhage. 
  • IM Use: This is a new and developing use of TXA, mostly in military applications. 
  • Topical: Can be used in minor and non-traumatic situations. 
  • Oral: Given pre/post-operative to help with clotting
  • Inhalation: Nebulized TXA may offer a hemostatic benefit and aid in stabilizing tonsillectomy hemorrhage and other nasopharyngeal and oropharyngeal hemorrhage.
  • Nasal Packing: Gauze can be soaked in TXA and placed in the nasal cavity to stop bleeding

When giving TXA during a prolonged field care setting, where treatment times are longer and transport to a higher level of care is delayed, medics should continue to monitor hemodynamics and watch out for unwanted thromboembolic events.

Conclusion

In conclusion, tranexamic acid (TXA) is a versatile medication with a potent mechanism of action that inhibits clot breakdown. It is widely used in the medical industry and easily administered via various routes, including IV, topical, oral, inhalation, and nasal packing/atomization. TXA’s proven effectiveness in bleeding control and ease of use is undeniable.

It should play a significant role in the Security and EP industry when it comes to pre-hospital client care. 

 

Co-Author Shane Jenkins is the Medical Program Manager and specializes in travel risk management, Executive Protection, and Concierge Medicine for clientele that travels worldwide. He is a Nationally Registered Paramedic licensed in Florida, AHA Instructor, as well as an NAEMT Instructor. Shane’s experience provides a unique perspective on the security industry and client risk assessment.

Co-Author Michael Guirguis, MD, is an Emergency Room Physician and Chief Medical Officer at a company which provides consulting, medical direction, and oversight for private family office and corporate executive protection programs that perform domestic and international duties.

 

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.