IDENTIFYING THE THREATS AND RISKS:
Key and vulnerable facilities such as critical national infrastructures, organizations, businesses, departments, residential properties and individuals in Government, public and private sectors, are all obvious targets for highly motivated and sophisticated criminals and terrorists.
There are countless other security threats which we face, both natural and man-made: from extreme weather, flooding, and earthquakes, to simple theft, workplace corruption, physical violence and acts of espionage and sabotage.
For example, a list (which is by no means exhaustive) of just some of the more common of threats and risks appear below. But all of which can be dealt with effectively, provided the appropriate counter measures are used to prevent them:
(a) Common theft: small amounts of cash or attractive pocketable items (e.g. mobile phones) left lying around homes and businesses.
(b) Opportunistic theft of sensitive documents left unsecured.
(c) Computer hacking (espionage) to gain a wide range of technical, economical, industrial and commercial sensitive information.
(d) Commercial, industrial, economic, technological and research information sabotaged by site contamination or arson.
(e) Cyber attacks to damage or destroy essential communications networks.
(f) Theft of Intellectual Property: copyright, trade marks, patents and designs.
(g) Commercial and industrial sabotage.
(h) Political espionage.
(i) Military equipment and technical information espionage.
(j) Military defence intelligence espionage and sabotage.
(k) Computer wireless (e.g. WiFi) intercept and theft of data.
(l) Sabotage by fire: incendiary devices, etc.
(m) Sabotage by bomb: destruction of manufacturing facilities, paper data and/or software.
(n) Damage or destruction caused by natural phenomenon.
(o) Identity theft and password theft.
(p) Assassination of key personnel.
Emergency Response and Business Continuity: It is our objective to ensure our clients are best prepared to protect themselves from, and deal with, emergencies and malicious activities, designed to compromise role and function effectiveness, by ensuring every client is able to respond by implementing the management structures and procedures, required to ensure effective and efficient Business Continuity.