Do your kids have a ‘Safe Word?’

On Monday this week there was an attempted kidnapping which failed because the kids’ parents had prepared for such an eventuality. Briefly, an 11 year old boy and his 5 year old sister were riding their bikes when a car pulled along side them and the driver told the siblings that their mother had sent him to pick them up as dinner was ready and that he would take them home. That’s when the 11-year-old asked for their family safe word and the driver could not give it to them, so he and his little sister both took off towards home…


Thursday, April 16th, 2020 by admin Security No Comments

Church of England move valuables to the Tower of London for safekeeping during COVID19 crisis

Earlier this week it was widely reported that the Church of England is moving millions of pounds worth of rare valuables to the Tower of London over fears they may be looted from empty buildings during the Coronavirus lock down. If you or anyone you know have properties, empty or occupied that you feel may benefit from some additional security at this time, then please don’t hesitate to get in touch. We can secure those properties on your behalf at very short notice. We are at your service. Telephone: 0207 118 1168 – 24 hours.
Thursday, April 16th, 2020 by admin Security No Comments

Locked down in Spain – Day #16

(Published 31st March, 2020) We are now on day #16 of lockdown here in Spain. Fortunately, I am in Tenerife which appears to be faring a lot better than the mainland from where the daily updates are quite grim. It’s difficult to make accurate comparisons because different countries measure their deaths differently but, regardless of how they measure, their figures are rising at an alarming rate. The Spanish mainland are clearly having a tough time. The UK appears to be about one week behind Spain and so I find it incredulous that so many people are ignoring the social distancing…
Tuesday, March 31st, 2020 by admin Security No Comments

Smartphones. Are they sometimes too smart?

A very interesting thing happened to a friend of mine last week when they took ownership of their new Smartphone. I thought you might find it interesting. As a general rule, they never allow their mobile phone to access their location unless they’re using Google Maps to help them navigate around London. All their data and photographs were transferred to their new Smartphone and when they checked to find a photo in the Gallery they were astonished to find that ALL the photos, that’s five years worth, had been sorted into Albums, sorted by location that is. Think about that, every…

Tags: , , , ,

Tuesday, May 28th, 2019 by admin Security No Comments

Surveillance cameras at work

If you think that your employees are stealing from you, you can install a hidden camera to catch them, can’t you? Well, in most situations – no. The European Court of Human Rights decided in Lopez Ribalda and others v Spain that it was a breach of the European Convention on Human Rights to do so. A Spanish supermarket installed surveillance cameras as they suspected theft. They put up some visible cameras to catch customers stealing goods. However, they also put in place some hidden cameras behind the cash desks to see if any of their employees were stealing from…
Thursday, February 22nd, 2018 by admin Security No Comments

“All the money in the world” The portrayal of John Paul Getty III’s kidnapping in 1973 as seen in Ridley Scott’s latest release.

The film which premiered in the UK this month (January 2018) depicts John Paul Getty’s refusal to cooperate with the extortion demands of a group of kidnappers who abducted his grandson John Paul Getty III in 1973. Without doubt, the greatest line of the film was when John Paul Getty told reporters, “I have 14 grandchildren and if I pay one penny ransom, I’ll have 14 kidnapped grandchildren.” Never a truer word spoken! To pay a ransom and to be seen to pay a ransom would have simply created a market and endangered his other 14 grandchildren. John Paul Getty Senior himself,…
Wednesday, January 24th, 2018 by admin Security No Comments

The Biggest Cyber Threats Facing the United Kingdom and Europe

The rise of Ransomware and the threat it poses to businesses Back in 2012, a major ransomware Trojan began terrorising computers across the world. Known as Reveton, this Trojan virus would lock a computer and request that a sum is paid immediately to unlock the computer. What made this gambit so effective was the granular details – the message that a user would receive varied on location and behaviour, variants in the United Kingdom contained the branding of the Metropolitan Police Service and some messages had PRS (Performing Right Society) logos enforcing the virus on users, accusing them…
Wednesday, December 21st, 2016 by admin Security No Comments

Jacqueline Veyrac Ransom

Personal security is vital when out and about for preventing dangerous situations from occurring. It is particularly important for individuals of a high net worth or for those in the public eye. A number of services are available to assist those who may be in danger based on their status including celebrity close protection services, residential security and panic room installation. One thing for certain is that without it kidnappings and ransom threats can be made. One unfortunate lady to be subject to such an ordeal was Jacqueline Veyrac, a millionaire businesswoman and the president of Cannes’ five star…
Monday, November 14th, 2016 by charliestelling Security No Comments

Getting Through Airport Security As Quickly As Possible

  Getting through airport security can be a long, boring and tiresome task, particularly with the rise in commuters and staff cuts. The famous arrive two hours before departure rule can actually leave you with only minutes to spare before having to find your gate number and board your plane.  It is, therefore, a good idea to follow our tips below to ensure that you can bag yourself more time for a far more relaxing airport security experience.  
Monday, September 19th, 2016 by charliestelling Security No Comments

What Is Computer Forensics?

Computer forensics involves analysing and investigating the contents and activity of a computer. This is most often carried out for legal proceedings if it is suspected that the device has been used for illegal activities. The process involves making a digital copy of the devices storage before locking the original some place safe. Any investigations carried out are done so on the digital copy to avoid any accidental contamination of the device. A…
Monday, September 12th, 2016 by charliestelling Security No Comments