Veterans in security - Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming...
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data se...
We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand c...
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and...
The security industry has been earning more than its share of accolades for employing military veterans. With big companies such as G4S Secure Solutions employing more than 9,000 veterans in various positions – 22 percent of its workforce – the industry has become distinctly “military friendly.” In fact, the company and rival Allied Barton Security Services were both named 2014 Military Friendly Employers by Victory Media, publisher of G.I. Jobs. Both have also won the G...
Veterans are able to use their skills from the military to help develop strategies Ex-army officers/ military veterans bring considerable skills and invaluable experience to security companies. Not only do they play an important role in frontline positions, but also their exposure to a diverse array of security challenges make them increasingly valuable in formulating security management strategies. At the same time, such companies also offer the veterans an alternative and re...
Many security company employees say they first learned about opportunities in the field through other employees The nation’s security companies are increasingly turning to U.S. military veterans to fill the ranks of both uniformed guards and management personnel. Getting the best former soldiers, airmen and sailors into the civilian workforce requires recruiting, and some of the best recruiters are other veterans. A wide variety of current security company employees say...
You can identify the military veterans among private security guards by the way they wear their uniforms, according to one security company executive. Each veteran looks comfortable in the uniform and exudes a confidence you don’t often see among those without a military background. It comes as no surprise that security companies like to hire veterans – more than practically any other industry. With a growing population of U.S. men and women coming out of the ser...
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download