apple bmw

Security Threat – Consider the Extremes

Russell W. Gilmore, CISSP, CISM, EnCE Crisis Management Planning, Product Diversion and Counterfeiting, Product Theft, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment, Theft

When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …

cargo thefts

US Cargo Theft – A Five‐Year Review

Christine L. Peterson, CPP, ISP Business Continuity Planning, Counterfeiting, Crisis Management Planning, Diversion, Embezzlement, Fraud, Product Diversion and Counterfeiting, Product Theft, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment, Tampering, Theft, Theft, Embezzlement, and Fraud

Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. They produced a report that provides security and loss prevention personnel with information about trends in cargo theft, allowing companies …