The Problem: This newspaper headline depicts how low a criminal will go. Celebrities, high profile executives or even low profile moneyed individuals and their families are often targeted by criminals due to what they may have access to, their notoriety or financial status. Kidnapping, assaults, robberies, home invasions and even high tech crimes are often perpetrated on unsuspecting affluent families.

The Solution: Develop a proactive strategy that protects and preserves without impeding quality of life. A comprehensive security program is based on threat and risk level as well as the probability that a real threat exists. Coordinating a risk management strategy involves extensive research and customization. Risk mitigation revolves around the threats that a person or family is up against as well as their individual situations. Whether at home, traveling abroad or taking the kids to school, a system needs to be in place to reduce risk and increase the likely hood of avoiding and removing oneself from a dangerous situation.

You’ll Learn:

  • How to determine your level of risk, what issues have you faced, what problems are in your future.
  • Predicting and preventing violence, threats and theft.
  • Fundamentals of premise security including – gates, guard, dogs, cameras, securing mail boxes, points of entry and exit.
  • Effective home security features including bullet proof doors, shatter proof glass, alarms, secure phone lines, safes and safe rooms.
  • Incorporating a multilayered approach to personal and physical security.
  • Proper screening of employees and vendors including background checks on grounds employees, maids, nanny, butlers, pool maintenance and gardeners.
  • Effective evacuation plans in case of and intrusion or natural disaster.
  • Protecting children at home, on the way to, and at school, workers interacting with them, including nannies, piano and tennis instructors, internet safety and more.
  • Secure transportation, safe vehicles, armored, trained drivers, defensive driving, selected routes, tracking devices and emergency plans.
  • How to train employees including nannies, staff, gate guards on security and medical emergencies.
  • Protecting computers, data and internet files from being hacked and identity theft.
  • Protecting privacy in the public eye on the web and keeping personal info-personal.
  • Securing vacation properties and second homes, travel security and safety.
  • Threat assessments to determine who your enemies are and what their motivation may be.

Download PDF version

Similar Posts from the Security Blog