Threat Assessment Teams (TATs) play a very important role in prevention efforts and making organizations and communities safer and are even more critical today due to the COVID-19 pandemic that has created more stressors and even more at-risk individuals for TATs to address. TATs have existed for a very long time in schools, higher education institutions, organizations, and communities, but increasing violence, suicides, and other incidents create concerns and questions on what is missing. Threat Assessment Teams: A Brief History TATs are often one of the main topics of discussion after horrific tragedies. For example, after the Columbine Massacre in April 1999 federal entities likeRead More →

Return on Prevention vs. Return on Regret This is a real-life experience. I went down to one of the main hotel/casinos on the Las Vegas Strip to meet a buddy and his wife who were in town for some fun and some gambling. As my buddy and I were standing and chatting in the casino by the poker tables, a big guy with an athletic build approached us and asked us what we did for energy and fun? My buddy and I did not know this guy, so we were a little confused and we both answered with sort of a vague “not much”. TheRead More →

Why are ransomware attacks soaring? Because they are working! It is estimated that by 2021 the predicted ransomware damages will be $20 billion. Why are ransomware attacks working? Traditional information security solutions are easy to beat! Do you remember everything from your last information security training? Do you even remember when your last training was? Why are new solutions needed? Because traditional solutions aren’t working! Watch the video below to learn more about these new solutions. Click here to learn more about the solutions discussed in this video.   Read More →

The First Preventers Playbook: How to Intervene, Disrupt, and Prevent Tragedy Before It Strikes. Enough is enough! Old playbooks and strategies depend on First Responders (defense), however First Preventers (offense) are needed too. It’s time to use a new prevention playbook to prevent more incidents and tragedies, The First Preventers Playbook is just in time to show you how. LAS VEGAS, NV – “For too long, we have ignored the signs of mass casualty attacks and refused to work together to “connect the dots”. Rick has given us a roadmap to do just that,” Captain Griger, Sarpy County Sheriff’s Office. Leaders in schools, higher education,Read More →

The Twitter hack is pretty alarming when you realize what a couple of teenage hackers were able to accomplish using one of the oldest hacking techniques in the hacker playbook. Twitter Attack What happened? Twitter employees were hacked by hackers using social engineering and exposing human vulnerabilities and lack of awareness. The result was several Twitter accounts of some very well known people were taken over by the hackers. Twitter said the hackers “successfully manipulated a small number of employees and used their credentials to access Twitter’s internal systems, including getting through our two-factor protections.”  Twitter released an update later and said the hackers “targeted aRead More →

Scary Indicators for School Leaders… Shootings, COVID, Mental Health & More Targeted Violence In a 2019 US Secret Service analysis, between 2008 and 2017 41 schools experienced targeted violence which is scary enough. However, it is also scary because BEFORE the 41 attacks occurred: ALL the individuals (attackers) exhibited concerning behaviors before the attack ALL the attackers experienced social stressors involving their relationships with peers and/or romantic partners Nearly all attackers experienced negative home life factors Sadly, none of the 41 schools were able to take advantage of the indicators (concerning behaviors, social stressors, home life factors, leakage, warning signs, red flags, etc.) to intervene,Read More →

16 years ago, on July 22, 2004, the 9-11 Commission Report was released. Do you remember one of the most important revelations in the 9-11 Commission Report? National intelligence is still organized around the collection disciplines of the home agencies, not the joint mission. The importance of integrated, all source analysis cannot be overstated. Without it, it is not possible to “connect the dots”. No one component holds all the relevant information. The biggest impediment to all source analysis – to a greater likelihood of connecting the dots – is the human or systemic resistance to sharing information. The 9-11 Commission Report revealed there wereRead More →

Hackers and breaches create huge costs and unwanted consequences, but most were preventable. Hackers – cyber criminals, corporate espionage, state-backed countries, insiders, ex-employees, and others want your organization’s information or your money. Every day hackers are successfully breaching organizations, taking advantage of gaps, and then taking the organization’s proprietary information or holding the organization’s information for ransom. Hackers are like cockroaches; they will enter wherever gaps exist. Hackers are successful because PEOPLE (employees, contractors, third-party service providers, vendors, remote workers, etc.) lack ongoing awareness about the latest phishing, business email compromise, and ransomware attacks, creating a gap for hackers. It only takes one gap, oneRead More →

As organizations are reopening and returning to work, how are you managing all the new pains and liabilities related to COVID-19 challenges on top of all the existing challenges you were already dealing with? It’s time for reopening and returning to work, however, managing lots of new COVID-19 challenges on top of all the existing challenges can create lots of new pains and liabilities too. Some of the new challenges include new and different fears, stressors, confusion, phases, compliance, and safety.  For example: How will you manage fears of employees, students, and guests who fear they may be infected with COVID-19 at work? How willRead More →