Business Security Articles

Hostile Surveillance Detection Training

Learn the terrorist planning cycle, what hostile surveillants look for, how hostile surveillance is conducted and what preventive security counter measures can be taken to identify hostile surveillance and prevent attacks. Description We know that ISIS has been operating in all 50 U.S. States and many other countries. We also know that terrorist organizations have …

Hostile Surveillance Detection Training Read More »

ASIS leader Jim McGuffey Interviewed for Church Security Meeting in Bluffton, SC

From USAV 3’s website. Article by Ashleigh Holland Published: December 2, 2015, 10:40 pm You can find the video interview and original article here. It has been nearly six months since a gunman shot and killed nine church members in their Wednesday night Bible study at Emanuel AME Church in Charleston. Ever since that night, some Lowcountry churches have …

ASIS leader Jim McGuffey Interviewed for Church Security Meeting in Bluffton, SC Read More »

ASIS International Spotlight on A.C.E. Security Consultant

From the military to law enforcement to private security, this ASIS board-certified member and volunteer leader boasts a career that has spanned 30 years in security management. Jim McGuffey, CPP, PCI, PSP, is the sole proprietor of A.C.E. Security Consultants, LLC, a position he has held for the past five years. McGuffey recently founded a new …

ASIS International Spotlight on A.C.E. Security Consultant Read More »

School Security

The school shooting in Sandy Hook created a fury of questions as it relates to preventing future incidents. Many people react with “knee-jerk” reactions, proposing security solutions ranging from posting armed guards at each school to adding expensive security systems. Adding security systems and guards as a security strategy should only be done after a …

School Security Read More »

Selecting a Security Consultant

Conducting a security risk assessment utilizing an experienced security consultant can prove invaluable for your organization. It is imperative to seek out a qualified security professional. Suggestions for selecting a security consultant: 1)  Review over-all security experience. How long has the expert worked in security management? Length of time is just one of many considerations and number …

Selecting a Security Consultant Read More »

A Summary of the Security Risk Assessment Process

As a result of the numerous domestic terrorist attacks and mass killings, I am often asked if these killings are preventable.  My response is that the vast majority all of security incidents are preventable if organizations would take time to utilize a security risk assessment process to improve safety and security at their facilities. The …

A Summary of the Security Risk Assessment Process Read More »

Scroll to Top