Release of the November 2024 Safeguards Consulting Chronicle

We are proud to share that we recently released the November issue of our firm's monthly newsletter, The Safeguards Consulting Chronicle. This year, we are celebrating its first anniversary and our firm’s 14th anniversary, and we would love to invite you to subscribe for free in honor of both!   

Our newsletter covers numerous industry events, news, and updates.  

Some of the items we included in our November issue was:    

+ A featured friend spotlight piece on Truliant Federal Credit Union.    

+ A exclusive article written by our Founder, Mark Schreiber, “The Engineering Tip of The Construction Iceberg”.  

+ A special Thanksgiving message. 

+ A list of beneficial industry events, that includes events we are supporting/speaking at, as well as other events we recommend attending.    

+ Our list of useful blog articles.     

+ A selection of key industry news and updates.     

+ A quick industry tip as provided by our experts.     

This month’s featured friend will also be the US CPTED Association!   

If interested, please subscribe using the hyperlink included below.    

Newsletter Signup — Safeguards Consulting, Inc.    

If you subscribe to our free newsletter, you gain access to all the exclusive security content mentioned above as well as additional content we hope will help you in your role as a security professional. It is also a wonderful way for my firm to stay in contact with you regarding company news, updates, or events so please consider subscribing in time for our December issue!  

In Bloom with Security Management Magazine: Schreiber Explains How Greenery and Landscaping Work with CPTED

Safeguards Consulting is pleased to announce that our Founder, Mark Schreiber, has recently contributed to another article for ASIS International and Security Management! 

In their most recent article, Schreiber and Sara Mosqueda are joined by Michael White, Kelly Prebble, Herb Ubbens, and Sarah Poskanzer. Together, they discuss Crime Prevention Through Environmental Design (CPTED) principles, with a focus on landscaping as a key component in improving security. They also emphasize how thoughtful landscaping can deter criminal activity and make communities safer. Later the group discusses key strategies including using vegetation strategically to improve visibility, opting for plants that are less conducive to hiding, and maintaining clear sightlines. However, their article emphasizes the significance of regular maintenance to ensure that landscaping effectively contributes to a secure space.  

Our team hopes you enjoy their most recent article and gain a better understanding of how to incorporate CPTED principles into landscaping to not only improve the security of your facility, but also the overall aesthetic and usability of your area. 

To read their article, visit:  

In Bloom: How Greenery and Landscaping Work with CPTED 

To read their first article, visit:  

Hostile Vegetation: 8 Plants to Use in Your CPTED-Friendly Flower Bed 

Our team hopes you enjoy their articles and will consider incorporating them into your facility's design. If our firm can help you with a question or an inquiry about CPTED services, please do not hesitate to contact us.  

To contact us, visit:  

Contact — Safeguards Consulting, Inc. 

Fortify Your Flower Bed with Security Management Magazine: Schreiber’s Top 8 Hostile Plants for CPTED-Enhanced Security

Safeguards Consulting is proud to share that our Founder, Mark Schreiber, recently contributed to an article from ASIS International and Security Management!  

Schreiber and Sara Mosqueda's insightful article delves into the realm of security and crime prevention using the Crime Prevention Through Environmental Design (CPTED) principles. These principles provide valuable strategies for reducing criminal activity through environmental approaches. One of the most frequently overlooked aspects of these principles is landscaping, specifically the use of "hostile vegetation" in creating a secure environment. What constitutes hostile vegetation? Plants can serve both aesthetic and protective functions, discouraging trespassers and increasing visibility. Throughout the article, Mosqueda and Schreiber will walk readers through eight different plant species that will not only beautify your facility but also help to create a CPTED-friendly flower bed. 

To read their article, visit:  

Hostile Vegetation: 8 Plants to Use in Your CPTED-Friendly Flower Bed 

To read their second article, visit:  

In Bloom: How Greenery and Landscaping Work with CPTED 

Our team hopes you enjoy their articles and will consider incorporating them into your facility's design. If our firm can help you with a question or an inquiry about CPTED services, please do not hesitate to contact us. Remember, a well-designed landscape is not just about aesthetics; it is an essential component of crime prevention. 

To contact us, visit:  

Contact — Safeguards Consulting, Inc. 

Schreiber’s Insights Shine from OSAC’s 2024 Annual Briefing at Amazon's HQ2

We are thrilled to share that our Founder, Mark Schreiber, had an incredible experience representing our team at this year’s OSAC Annual Briefing held at Amazon's HQ2 in Arlington, VA, on November 20 and 21! This prestigious event serves as a cornerstone for security collaboration, uniting thousands of U.S. Department of State (DSS) and private-sector security representatives under one roof. 
 
The overarching mission of OSAC is to foster security cooperation between the U.S. private sector and the DSS by building a global network of security professionals committed to exchanging timely information and sharing best practices. This year, the event attracted over 12,000 attendees from more than 6,000 organizations, all dedicated to mitigating risks to U.S. interests worldwide. 

Schreiber had the opportunity at this year’s briefing to engage with other leaders in the security field, exchanging insights and strategies that will help bolster safety and preparedness across various industries. The collaborative environment encouraged discussions about emerging threats and innovative solutions, underscoring the importance of proactive risk management in today’s complex landscape. 

This year’s briefing covered numerous topics such as... 

+ The State of OSAC 

+ Biological Threats and National Security 

+ Threats and Cybersecurity  

+ Mental Health in The Security Industry  

+ Crisis Communications  

+ Employee Hostage Situations 

+ Global Maritime Security Challenges  

The briefing also included numerous networking opportunities, breakout sessions, and many more opportunities for growth and insights.  

Afterward, Schreiber followed up with our team stating, “This year’s OSAC Annual Briefing was extremely well attended with a very large number of influential organizations, and it was great to participate in risk discussions with so many leaders to keep us engaged on emerging risks and geopolitical changes for multi-national organizations.”.  

Stay tuned for more updates as we begin to integrate the insights from this exceptional experience into our ongoing efforts! We also look forward to utilizing the information gained from this year’s conference when serving our clients as their trusted advisor.  

We would also like to thank our wonderful Amazon friends and their Vice President of Public Policy Americas, Steve Hartell, for hosting us this week!

Additionally, we also would like to thank this week’s speakers!

G.B. Jones

Ross Murray

Antony J. Blinken

Adam Calabro

Allison Cash Spiro

Andrea Campbell Drake

Andreea Patra

Andrew Dyer

Angela Lewis

Arian Avila

Asa Zuberman-Leibman

Ayesha Usmani

Ben Brandt

Benjamin Bosland

Bill Powers  

Brooke Kassner-Matz

Bryan Parent

Carlos Matus

Christopher T. Macolini

Cormac Mc Garry

Cory Bergman

Cris Bohanski

Daniel Giordano 

Danny Holtsclaw

David Fortino

Diana M. Concannon  

Dr. Charity Dean

Dustin Stewart 

Edward Levy

Elizabeth Gracon 

Emily Caldwell

Eva DeBella  

Gharun S. Lacy

Giovanni Gravano

Greg Wurm

Heather Suguitan-Lee

Hussein Abdallah

Jack Suwanlert

Jackie Day

James Weston

Jeff Chase 

Jeffrey T. Gilbert

Jeremy Rodrigues

Jerry Tavares

John Cory  

John Parrotte

Jonathan Welch

Joshua Levin-Soler

Kate Stubbe

Kathy Lavinder

Katie Timothy

Kendall R. Donahue

Konrad Brayer

Kristin Lenardson

Kristin Toth

Kristine Raad

Laura Clark

Liz Cathcart

Liz McNally

Logan Etheredge

Luis Matus

Mackenzie Grahek

Paul Friedrichs

Malique Carr

Marc Solomon

Marcia Henisz

Maria Robson-Morrow

Mary Hackman

Matt Clark

Matthew Mead

Maureen Handrahan

Melanie Getreuer

Melanie Higgins

Michelle Rowe

Nicholas Collura

Nick Lovrien

Nila Hayes

Paul Whelan

Pearl Francisca D'Souza

Peggy O’Neill

Phil Walker

Rachel Briggs

Rafael Saliés

Rajiv S. Maan

Ryan Wismer

Sam Vicroy

Sarah Thompson

Scott Kim

Shaun M. Jamieson

Steve Hartell

Stone Conroy  

Susana Svojsik  

Thomas Murray

Tim McAtee

Tobi Rosenzweig

Tom Sanderson

Tommy Jones

Vitaliya Peake

Safeguard Your Holidays: Essential Cybersecurity Tips to Protect Your Festive Season

The holiday season is approaching, and with it comes a time for celebration, shopping, and giving. However, it also creates opportunities for cybercrime, especially during major holiday shopping sale events such as Black Friday and Cyber Monday. While we are busy looking for the best holiday deals and preparing for family gatherings, cybercriminals are planning attacks to steal personal information, financial details, and sensitive data. 

With retailers offering massive discounts, shoppers are often quick to click on links, share payment details, and make impulsive purchasing decisions, frequently overlooking the potential risks of trusting a platform without caution. Scammers and hackers exploit this urgency by spreading fake deals, phishing emails, and malware-infected links to deceive unsuspecting buyers. 

If you are concerned, you are not alone. According to TransUnion statistics, 54% of online shoppers are worried about becoming victims of online fraud, representing a 17% increase from last year. If you are not already taking precautions, now is the time to start.  

In this article, we will explore how cybercriminals exploit the holiday season while also providing you with practical tips to protect your data, finances, and privacy. Therefore, allowing you to fully enjoy holidays and all the associated sale events as you shop for the perfect gift for your loved ones. 

Unmasking the Tactics: Understanding How Cybercriminals Exploit Your Vulnerabilities 

(1) Phishing Emails 

1) During this season, it is common to receive emails that appear to be from reputable retailers, charities, or delivery services. These emails frequently promote fraudulent deals, request urgent payments, or claim there is a problem with delivery. They may ask you to download attachments or click on links that lead to malicious websites, resulting in malware on your device or stolen personal information.  

(2) Fake Websites and Online Stores 

1) Scammers create fraudulent websites that resemble legitimate retailers. These websites advertise unrealistic discounts in order to entice victims to make purchases. Once the payment information is entered, the scammers either steal it and/or fail to deliver the products.

(3) Malicious Ads (Malvertising) 

1) Malvertising is the practice of creating fake online advertisements in order to distribute malware. These advertisements frequently appear on social media or search engines, enticing users to click on them or redirecting them to fraudulent websites. This method allows malware to be downloaded onto the victim's device, potentially giving hackers access to sensitive data. 

(4) Social Media Scams 

1) During this time of year, scammers make extensive use of social media. Scammers use these platforms to promote fake giveaways, holiday contests, and exclusive sales. Victims are frequently prompted to provide personal information or payment information in order to "claim their prize" or access the "deal," which ultimately leads to data theft.  

(5) Fake Charity Appeals 

1) The last quarter of the year is the best time to raise donations, making it an ideal time for cybercriminals to take advantage of the giving spirit by creating fake charity campaigns. These frequently take the form of emails, social media posts, or crowdfunding links requesting donations. Victims unknowingly contribute to fraudulent causes, resulting in financial loss and, in some cases, the exposure of personal information. 

(6) Delivery Scams 

1) With the increase in online purchases during the holiday season, scammers send out fake delivery notifications claiming there is a problem with a package. These messages encourage recipients to click on a link or provide additional information, resulting in phishing or malware attacks. 

(7) Public Wi-Fi Exploits 

1) Cybercriminals can create fake Wi-Fi hotspots and intercept data on unsecured networks, gaining access to personal information such as login credentials and payment details. They can use this information for identity theft, unauthorized transactions, or data selling on the dark web. 

Cybersecurity Strategies to Ensure a Stress-Free and Joyous Holiday Season 

(1) Beware of Phishing Scams. 

1) Be cautious with links and attachments found in emails, websites, social media posts, and advertisements. Through these malicious links, users are often tricked into providing personal details. Always verify the sender’s email address and look for signs of fake websites, such as misspelled domain names. 

2) Stay alert for "too good to be true" offers. If a deal seems too good to be true, it probably is. Check the legitimacy of unfamiliar brands and influencers on social media. 

3) If you receive a delivery notification, always visit the official delivery company website and manually enter the tracking number. Avoid clicking on tracking number links, as they may lead to phishing websites that steal your personal information. 

(2) Secure Your Online Shopping Accounts 

1) Make sure you enable Two-Factor Authentication (2FA) on your accounts. It is also recommended that you use strong, unique passwords for each shopping site to protect your personal information. 

2) Always make your purchases from companies that you trust and are familiar with. If you are unfamiliar with a company, read online reviews and verify its legitimacy and reputation on websites like the Better Business Bureau

3) Ensure that the website has HTTPS (not just HTTP) in the address bar, indicating that it is secured with encryption. This added layer of security ensures that your transactions and sensitive data remain private while you shop online. 

 (3) Payment Methods 

1) Using credit cards versus bank transfers is highly recommended for better fraud protection, as they allow you to easily dispute charges if goods or services are not delivered as promised. 

2) Do not pay with cryptocurrencies, as this can be a sign of a scam. This payment method provides a level of anonymity, and scammers frequently use it because transactions are difficult to track and irreversible. If a business insists on payment in cryptocurrency, proceed with caution, as this method is frequently associated with fraudulent activities.  

3) Do not pay with gift cards. Genuine businesses and organizations will never request payment via gift cards. Always be cautious if any business requests this type of payment. 

(4) Public Wi-Fi Safety 

1) Avoid making transactions on public Wi-Fi, since they are often unsecured, making it easier for cybercriminals to intercept your data. Only use secure Wi-Fi networks that you know and trust. 

2) If you must use public Wi-Fi, ensure that you have a VPN installed on your device. A VPN encrypts your internet connection, protecting your data from cybercriminals and securing your personal information. 

(5) Fake Charity Donations 

1) Before making any donation to a charity, ensure that the organization is a verifiable charity. Conduct some online research before making any transaction using social media, and consider using services like Better Business Bureau's Wise Giving AllianceCharity Watch and/or Charity Navigator

(6) Keep Software and Devices Updated 

1) It is strongly recommended that you install the latest updates to your operating system, apps, and antivirus software. Therefore, allowing you to reduce your chances of falling victim to malware or cyberattacks. 

Stay Information and Stay Jolly  

The risk of cybercrime increases as the holiday season approaches, with cybercriminals seeking to exploit the surge in online shopping. Given the various tactics they use to target online shoppers, it is important to remain vigilant. By following the key precautions outlined in this article, you can significantly reduce your chances of falling victim to fraud. Stay informed and cautious, and enjoy the holiday season with peace of mind, knowing that your data and finances are better protected. 

Author: The Safeguards Consulting, Inc. Cybersecurity Team

Release of the October 2024 Safeguards Consulting Chronicle

We are proud to share that we recently released the October issue of our firm's monthly newsletter, The Safeguards Consulting Chronicle. This year, we are celebrating its first anniversary and our firm’s 14th anniversary, and we would love to invite you to subscribe for free in honor of both!   

Our newsletter covers numerous industry events, news, and updates.  

Some of the items we included in our October issue were:    

+ A featured friend spotlight piece on Wofford College.    

+ A exclusive article written by our Founder, Mark Schreiber, “The Increasing Challenges for Large Project Physical Security Implementations”.  

+ A special Cybersecurity Awareness Month message. 

+ A list of beneficial industry events, that includes events we are supporting/speaking at, as well as other events we recommend attending.    

+ Our list of useful blog articles.     

+ A selection of key industry news and updates.     

+ A quick industry tip as provided by our experts.     

This month’s featured friend will also be Truliant Federal Credit Union!   

If interested, please subscribe using the hyperlink included below.    

Newsletter Signup — Safeguards Consulting, Inc.    

If you subscribe to our free newsletter, you gain access to all the exclusive security content mentioned above as well as additional content we hope will help you in your role as a security professional. It is also a wonderful way for my firm to stay in contact with you regarding company news, updates, or events so please consider subscribing in time for our November issue!    

The Value of Being on the Board of Directors for IAPSC: The Privilege to Serve and Make an Impact

Over the past year, our team has been proud to have our Founder, Mark Schreiber, serve on the Board of Directors for the International Association of Professional Security Consultants (IAPSC). This has not only been a transformational experience for him but also for our firm as we have been able to fully enrich ourselves with new opportunities, community, prospects, and knowledge through this great organization.  

The Compelling Value of Joining IAPSC  

When we asked Schreiber what he felt were the most valuable aspects of serving on the board and being a member of IAPSC he answered, “Serving on the Board of Directors for the International Association of Professional Security Consultants (IAPSC) is not just a prestigious title; it is a privilege to shape the future of the security consulting industry. Whether you are a seasoned professional or a rising star in the field, being a member of the IAPSC can offer unparalleled benefits that extend far beyond your individual practice. I am proud to serve on the board and to be able to further commit to expanding the industry. As we prepare for 2025, I hope that many more individuals will join our organization so they too can take part in the abundance of benefits that we have to offer to both them and their firms”.  

Afterward, he went on to add several compelling reasons as to why joining IAPSC is a valuable investment in your career, firm, and the industry at large:  

1. Influence Industry Standards 

As a member, you will have the unique opportunity to shape the direction and standards of the security consulting profession. Your input will help to shape policy, guidelines, and best practices that will set industry standards for quality and professional conduct. This level of influence can also help elevate the profession and ensure that it meets the ever-changing needs of clients all over the world. As a result, the industry's growth will also be boosted. 
 
2. Network Expansion Opportunities 

Joining the organization also provides access to a varied network of industry leaders, experts, and professionals. By becoming a member, you will have the opportunity to interact with a diverse group of industry professionals who can provide insights, collaboration opportunities, support, and more. This network can also help you improve your own practice and form valuable partnerships that would not have been possible otherwise. Another benefit to becoming a member is the access to our member directory which allows you to search, find and connect with other members.  
 
3. Professional Development 

You can also use your membership to help the organization grow and improve by joining various committees or applying for the Board of Directors. These volunteer opportunities are also an excellent way to hone your leadership skills and gain experience in governance. These positions allow you to engage in strategic planning, financial oversight, committee leadership and other areas, all of which are valuable skills in any professional setting. This is also an opportunity to expand your resume and LinkedIn profile. 

4. Advocate for Clients and Communities 

As a member, you will have the ability to advocate for client interests and contribute to community safety. By addressing critical security issues, you can help shape initiatives that protect people and property. Your efforts can also result in improved security solutions and practices that benefit both clients and communities. 
 
5. Access to an Abundance of Resources and Knowledge 

Members also gain access to exclusive resources, research, and training materials. This wealth of information will help you stay current on industry trends, technological advancements, best practices, and more. The knowledge you gain can also be used to enhance your consulting services and add even more value to your clients. Additionally, having extra knowledge under your belt will also help to enhance your networking skills as you will have more industry topics you can address.  

6. A Lasting Impact

One of the most rewarding aspects of becoming a member of IAPSC is the knowledge that you are making a difference. Your contributions can lead to transformative changes in the industry, enhancing the reputation of security consultants and promoting ethical practices. This sense of purpose can be deeply fulfilling, knowing that your efforts contribute to a safer world. 

Taking Action

Being a member of IAPSC is more than just a CV title; it represents a commitment to leadership, advocacy, and excellence in the security consulting industry. Whether you want to expand your network, influence industry standards, or improve your professional skills, the organization and IAPSC community provide a unique platform to accomplish these objectives. If you are passionate about making a difference and want to advance your career, join today and later consider applying for a position on the IAPSC Board or one of our many committees. Together, we can build a stronger, more resilient security consulting community. 

To learn more, visit:  

International Association of Professional Security Consultants: Home 

To become a member, visit:  

International Association of Professional Security Consultants: IAPSC Membership 

Empowering Leadership: Key Takeaways from the Chief Executive Network and Leadership Conference

As we wrap up our reflections on the Chief Executive Network and Chief Executive Leadership Conference held from November 6th to 8th in sunny Phoenix, Arizona, we could not be prouder of our Founder, Mark Schreiber, for representing our company at this prestigious event.  

The conference brought together industry leaders and innovators, providing a unique platform for exchanging ideas, networking, and exploring the latest leadership and business strategy trends. Schreiber returned both inspired and equipped with valuable insights that will undoubtedly contribute to our ongoing mission of excellence.  

From engaging keynote speeches to thought-provoking panel discussions, Schreiber immersed himself in a wealth of knowledge, eager to implement new strategies that align with our vision. The connections he made with other industry leaders will further strengthen our network and hopefully open several doors for collaboration in the future. 

We are excited to see how the insights gained from this conference will shape our approach as we continue to grow and evolve.  

Thank you to the Chief Executive Network and the Arizona Grand for hosting such an impactful event! Stay tuned for updates as we integrate what we have learned into our practices and culture. 

Here’s to a future filled with innovation, inspiration, and continued leadership! 

To learn more about this event, visit:  

Leadership Conference 

Stay Safe at the Polls: Essential Election Day Safety Tips for Voters

With Election Day approaching, our team felt it was important to share some key essential tips for voter safety.  

Below are our top 7 safety tips:  

  1. Fully Prepare: Before leaving to go to the polls ensure your phone is fully charged, recheck the rules in advance, verify your polling location (VOTE411), see what ID is needed if any (Search by State & Topic | VOTE411), and ensure you know what is included on your ballot (Personalized Ballot | VOTE411).  

  2. Protect Your Personal Information: Avoid sharing sensitive details on social media about your voting plans as scammers often monitor these platforms. 

  3. Rely on Trusted Sources: Only use official government websites and reputable news sources for election information to steer clear of misinformation. 

  4. Vote at Less Busy Times: If you can, plan to vote early in the morning or during mid-afternoon to avoid long lines and crowded polling places. 

  5. Large or Unruly Groups: If you observe large or unruly groups around the polling location or feel unsafe, consider leaving and then later returning at a different time. 

  6. Stay Aware of Your Surroundings: Be vigilant while at the polls. If you notice anything unusual or suspicious, do not hesitate to alert polling staff or law enforcement. 

  7. Beware of Phishing Scams: Watch out for unsolicited emails or texts about voting. Only trust verified information and avoid clicking on unexpected links. To learn more about how you can recognize and protect yourself from phishing and other cyberattacks, visit our blog post below: 

Secure Your Social Presence: Cybersecurity Best Practices for Social Media — Safeguards Consulting, Inc. 

Our team hopes those tips will help you prepare to cast your vote while also keeping you safer and your information secure. Reminder, no matter where you stand, every vote counts and every voice matters. Also, consider sharing this post with your peers, friends, and family so they too can stay safe while voting.

Secure Your Social Presence: Cybersecurity Best Practices for Social Media

Social media platforms are a central part of our personal and professional lives, connecting us with friends, family, and even customers in real-time. Social media accounts contain a wealth of personal and professional information, which malicious individuals can use for identity theft, social engineering attacks, and even corporate espionage. With billions of users sharing data daily, social media platforms offer a vast network for gathering sensitive data or tricking users into divulging personal information. Recent FBI alerts highlight a surge in social engineering attacks on high-value targets such as cryptocurrency firms, which have resulted in billions in losses. Protecting social media accounts is critical for both individuals and businesses in terms of privacy, sensitive information security, and a safe online presence. Throughout the following content, we will explore cybersecurity best practices for social media to help mitigate risks, safeguard personal information, and create a more secure digital environment. 

Recognizing Attacks

Acknowledging Suspicious Activity 

Firstly, we must be vigilant for any suspicious activity in our accounts in order to detect possible threats. Attackers are constantly adapting their tactics to exploit new vulnerabilities, so being aware of suspicious behavior is one of the most effective ways to protect your personal information and online presence. There are several types of cyberattacks that one should be aware of.  

However, we will cover the following attack types: phishing, social engineering, and account changes. 

Phishing  

Attackers frequently impersonate trusted contacts or organizations, using fake profiles and urgent messages to trick you into revealing sensitive information. These attackers may send direct messages, posts, or advertisements requiring immediate action, such as "click here to verify your account" or "your account will be suspended". Links in these messages frequently direct you to websites that appear to be legitimate but are actually designed to capture login credentials or download malicious software onto your device. Therefore, instead of following their instructions, go to your account's settings and check to see if any action is required.  

Social Engineering  

This type of attack uses psychological manipulation to gain access to sensitive information. Social engineering attackers frequently pose as trusted individuals, such as tech support, colleagues, or even friends, in order to gain your trust and persuade you to share sensitive information or take actions that jeopardize your security. Some specific examples include an attacker impersonating a company representative or a technical support agent and requesting your password to "resolve an issue." Others may impersonate a friend in need, instilling urgency by claiming they are locked out of an account or have an emergency.  

Account Changes   

Keep an eye out for any unexpected changes to your accounts, such as changed settings, unfamiliar login locations, or unknown devices accessing your profile. Attackers may gain access to your account and modify security settings, making it easier for them to maintain control or collect personal information. Check your account activity and login history on a regular basis for any signs of unauthorized access. If you notice changes you did not make, change your password immediately and enable multi-factor authentication if that has not been performed already.  

5 Best Practices to Implement 

The following set of rules can assist you in implementing a cybersecurity approach to social media. By implementing these guidelines, you will be better prepared to identify potential risks and take proactive measures to secure your accounts against threats. 

Practice #1: Be Cautious About What You Share 

When using social media, avoid sharing sensitive information like your address, phone number, or financial information, as this can lead to identity theft or social engineering attacks. Before posting, consider whether you would be comfortable with everyone on the Internet seeing your content. Take special consideration for pictures, as they can disclose significant information, such as your location, social circles, daily routines, professional connections, or sensitive information. 

This approach encourages careful consideration of what is shared online while also protecting your privacy. By carefully selecting which information you make public, you can significantly reduce your vulnerability to cyber threats and maintain a safer online presence. 

Practice # 2: Think Before Clicking 

Cybercriminals frequently use links to get you to click on harmful content that could compromise your data or infect your device. Before clicking, check the source. Examine the URL carefully and determine whether the message appears to be legitimate. If something feels off, follow your instincts and avoid clicking. This simple habit can go a long way in keeping you safe online. 

Practice # 3: Use Strong Passwords and Multi-Factor Authentication (MFA) 

Creating unique passwords for each of your online accounts is critical for safeguarding your personal information and preventing unauthorized access to sensitive data. If a password is compromised on one site, it may expose your other accounts if you reused the same password. To create a strong password, you must consider its length and complexity. This means using at least 12 characters, including uppercase and lowercase letters, numbers, and special characters. Alternatively, password manager software is highly recommended for securely storing and creating unique passwords. 

Using Multi-Factor Authentication (MFA) also adds an extra layer of security to your accounts by requiring not just a password but also a second piece of information to verify your identity. Enabling MFA also significantly reduces the risk of unauthorized access, and many social media platforms offer MFA as an option. Therefore, check your account's security settings to ensure that MFA is enabled, as not all social platforms have this feature enabled by default. 

Practice #4: Review Your Accounts’ Security and Privacy Settings 

Social media security and privacy settings can vary across different platforms, so it is important to familiarize yourself with them and review them on a regular basis, as they may change without notice. In your review, consider the following five recommendations: 

  1. Check your account's privacy settings to determine who can view your information and posts. Instead of making your profile public, consider changing the settings to limit visibility to specific individuals. 

  2. Remove any details on your account that are unnecessary or could be exploited, such as your phone number, home address, workplace, or any other private information. 

  3. Regularly check which third-party apps are connected to your social media accounts. Remove any that you no longer use or that seem suspicious. These apps can have access to your data, so it is important to manage them carefully. 

  4. Social media platforms frequently update their privacy policies and settings. Therefore, regularly review these updates to discover new features that can enhance your security. 

  5. Verify that the multi-factor authentication feature is enabled. 

Practice #5: Be Cautious with “Friend” Requests 

Cybercriminals frequently use fake accounts to impersonate someone you know or trick you into connecting with them. These profiles may appear to belong to friends, colleagues, or even celebrities, and they may share innocent posts or engage in casual conversations to foster trust. Once they gain your confidence, they may attempt to obtain personal information or solicit money. 

To protect yourself, be wary of accepting friend requests from unknown individuals and regularly review your friend list for suspicious accounts. If you encounter a questionable profile or receive a strange request, report it to the platform. Most social media platforms have reporting mechanisms for fake accounts or suspicious behavior, which helps to keep the community safe. 

Stay Safe and Aware  

Following these practices helps protect your personal information, ensure your data is secure, and that you have control over who has access to your information. Furthermore, these practices help to make the online community safer for everyone. By being proactive and implementing best practices to secure your accounts, you can enjoy social media while reducing potential risks like cyber-attacks. Staying alert and informed is critical; the decisions you make, guided by these rules, have a significant impact on your online safety. 

Author: The Safeguards Consulting, Inc. Cybersecurity Team

Release of the October 2024 Safeguards Consulting Chronicle

We are proud to share that we recently released the September issue of our firm's monthly newsletter, The Safeguards Consulting Chronicle. This year, we are celebrating its first anniversary and our firm’s 14th anniversary, and we would love to invite you to subscribe for free in honor of both!   

Our newsletter covers numerous industry events, news, and updates.  

Some of the items we included in our September issue was:    

+ A featured friend spotlight piece on the Security Industry Association (SIA).    

+ An exclusive article written by our Founder, “Critical for Convergence - Identity and Access Management”.  

+ A message from our firm about National Security Officer Appreciation Week. 

+ A list of beneficial industry events, that includes events we are supporting/speaking at, as well as other events we recommend attending.    

+ Our list of useful blog articles.     

+ A selection of key industry news and updates.     

+ A quick industry tip as provided by our experts.     

 If interested, please subscribe using the hyperlink included below.    

Newsletter Signup — Safeguards Consulting, Inc.    

If you subscribe to our free newsletter, you gain access to all the exclusive security content mentioned above as well as additional content we hope will help you in your role as a security professional. It is also a wonderful way for my firm to stay in contact with you regarding company news, updates, or events so please consider subscribing in time for our October issue!    

FREE Webinar Recording with SIA and IAPSC; How to Hire and Work with Security Consultants

Curious About Hiring and Working with Security Consultants? 

If you have ever pondered the ins and outs of hiring and working with security consultants, you and your firm are not alone. At Safeguards Consulting, we understand that navigating the security landscape can be daunting, which is why our team is excited to share the highlights from our recent webinar in collaboration with the Security Industry Association (SIA) and the International Association of Professional Security Consultants (IAPSC). 

On October 16th, our Founder, Mark Schreiber, had the incredible opportunity to join forces with industry experts (Sean A. Ahrens - Security Market Group Leader at Affiliated Engineers, Inc., and Bill Durso - Founder and Principal Advisor at The Durso Group, LLC) to present a webinar titled “What to Know About Hiring (and Working With) Security Consultants”. This engaging discussion provided invaluable insights into the myriad benefits of leveraging consultants for various security projects. 

Whether you are refreshing your existing technology or scaling up for a comprehensive enterprise-wide security audit, the right consultant can be a game-changer. From enhancing your security posture to ensuring compliance with industry standards, these experts bring specialized knowledge and experience to the table, allowing you to focus on what you do best. 

Throughout the webinar, Schreiber and his peers explored key considerations for hiring security consultants, including how to identify the right fit for your organization, the importance of clear communication, and the value of establishing a collaborative partnership. Additionally, the panel also shared real-world examples of successful projects where consultants played a pivotal role in achieving security goals. 

If you missed the live session, do not stress, as we are offering a FREE recording of the webinar at the link below!  
https://www.linkedin.com/posts/security-industry-association_security-security-activity-7252362665740636163-4gqd?utm_source=share&utm_medium=member_desktop 

Our firm and founder would also like to take the time to thank both IAPSC and SIA for having him speak at last week’s webinar, additionally, we would also like to thank all of those who were able to attend.  

For more updates, insights, and future events, follow us on social media. At Safeguards Consulting, our team is always committed to helping you navigate the complex world of security with confidence as your most trusted advisor

Schreiber Takes the Stage: Representing IAPSC at the Prestigious 'Securing New Ground' Event in New York City

On October 8th and 9th, our esteemed Founder, Mark Schreiber, took on a pivotal role as a volunteer liaison at the renowned Securing New Ground (SNG) conference in the vibrant city of New York. Since its inception in 1996, SNG has grown into the premier executive conference hosted by the Security Industry Association (SIA), attracting over 250 senior-level industry leaders and financial partners each year. This prestigious event serves as a platform for professionals to expand their networks and deepen their understanding of the evolving security landscape. 

This year held special significance for Schreiber, as he was invited to share his insights during the conference. On October 8th, he spoke at the “Rapid-Fire Insights From the 2024 SNG Luncheon Roundtables,” where he engaged with his peers in exploring the most impactful ideas that emerged from audience discussions. His contributions not only highlighted key themes but also fostered meaningful dialogue among industry leaders about the future of security. 

His fellow luncheon roundtable discussion hosts included: 

+ Matt Barnette, CEO of PSA 

+ Robert Lydic, President of Wavelynx Technologies  

+ Lee Odess, Founder of Access Control Executive Brief  

+ Tim Solomon, Director of Sales – East at Eagle Eye Networks  

As we reflect on this remarkable experience, we are proud to see our firm represented at such a high-profile event, paving the way for innovative conversations that will shape the security industry for years to come. Our team is also proud of Schreiber's contributions and the valuable insights he shared, reinforcing our commitment to driving progress in the security sector.    

Stay tuned for more updates as we continue to engage and influence in the world of security! 

To read more about his SNG session or to view his speaker profile, visit:  

Rapid-Fire Insights From the 2024 SNG Luncheon Roundtables - Securing New Ground (securityindustry.org) 

Mark Schreiber - Securing New Ground (securityindustry.org) 

To learn more about the conference, visit:  

Securing New Ground | The Security Industry's Executive Conference 

Schreiber Represents ISO TC292 and ASIS International in the UK

From September 30th to October 4th, our Founder, Mark Schreiber, had the incredible opportunity to represent ASIS International as a volunteer liaison at the International Organization for Standardization (ISO) gathering in Liverpool, UK. This gathering of industry leaders, policymakers, and security experts was more than just a meeting; it marked an exciting moment in the advancement of international security standards. 

As a member of ISO Technical Committee 292 (ISO TC292), which focuses on security and resilience, Schreiber participated in critical discussions aimed at improving the effectiveness and consistency of security practices worldwide. ISO TC292 also plays an important role in developing and promoting international standards that provide frameworks for organizations to protect their assets and ensure the safety of their employees and communities. 

During the meeting, he also worked with representatives from various countries to share insights and experiences that highlighted the challenges and successes encountered in the field of security. The discussions focused on best practices, emerging threats, and the value of standardized protocols for streamlined crisis responses. It was truly inspiring to see how professionals from various backgrounds came together with a common goal of creating safer environments through strong security frameworks. 

The importance of volunteer roles, such as ours, in fostering collaboration between organizations like ASIS International and ISO TC292, cannot be overstated in our field. Schreiber served as a liaison, bridging the gap between practical security applications and the development of normative standards. This connection is critical because it ensures that the standards developed are not only theoretically sound but also practical in real-world situations.  

As we reflect on this significant gathering, our Safeguards Consulting team is reminded of our commitment to improving global security practices. The insights and connections made during this week-long gathering will help us continue to support our clients, ASIS members, and the larger community in navigating the complexities of our industry's security challenges.  

 In conclusion, Schreiber's attendance at the ISO TC292 meeting in Liverpool exemplifies our commitment to advancing international security standards. We are excited to share our learnings from this exciting experience with our peers and to continue advocating for a safer, more secure world for all. 

To learn more about the ISO Technical Committee 292, visit:  

ISO/TC 292 - Security and resilience 

To learn more about ASIS International, visit:  

Home - ASIS Connects (asisonline.org) 

Sunny Success: Highlights from Founder Mark Schreiber’s Inspiring Week at #GSX2024

Our team is excited to share that our Founder, Mark Schreiber, had an incredible experience at this week’s GSX conference in sunny Orlando, Florida! This annual gathering brought together industry leaders and innovators, and we are proud that we were able to be a part of it. 
 
During the conference, Schreiber showcased his expertise through a pre-conference session and two engaging conference sessions, where he and his co-speakers covered a range of impactful topics that resonated deeply within the security sector. 

Here is a brief overview of his sessions: 
- Pre-Conference Session:  

Facility Security Design: A Strategic Approach alongside esteemed colleagues Rene Rieder Jr., J. Kelly Stewart, and Rick Lavelle. This session explored innovative strategies for designing secure facilities, laying the groundwork for effective security planning. 
 
- Conference Session #1: 

Incorporating Security and CPTED Within University Master Planning with Jeff McDonald. Together, they discussed how to seamlessly integrate security measures into the fabric of university campus planning. 
 
- Conference Session #2:  

Drone Management Advancements and Airspace Situational Awareness - Driving A New Security Paradigm with Jason Cansler This session highlighted the latest developments in drone management as well as their implications for modern security practices. 

Following Schreiber’s return, he left us with this statement to share, “This year’s ASIS GSX Conference was another great event with a wealth of educational events, product exhibits, and professional networking. It is always an honor to share our knowledge with so many security professionals and support ASIS International. I have many takeaways that I will share with my team when I return, and I hope that my sessions provided my attendees with actionable information that they can immediately apply. I would also like to thank my esteemed friends and co-speakers, Rene Rieder Jr., J. Kelly Stewart, Rick Lavelle, Jeff McDonald, and Jason Cansler, for their assistance and support. I hope to see everyone again next year in New Orleans!”  

Overall, our team could not be prouder of Schreiber’s contributions to the industry and the valuable insights he gained from this remarkable event. We look forward to applying this newly gained knowledge to enhance our services and continue pushing the boundaries of security innovation. Stay tuned for more updates as we put these insights into action!  

To learn more about Schreiber's sessions, visit:  

Pre-Conference Program - Global Security Exchange (gsx.org) 

Incorporating Security and CPTED Within University Master Planning - Global Security Exchange 2024 (mapyourshow.com) 
 
Drone Management Advancements and Airspace Situational Awareness—Driving a New Security Paradigm - Global Security Exchange 2024 (mapyourshow.com) 
 
To view Mark Schreiber’s speaker profile, visit:  
Mark Schreiber - Global Security Exchange 2024 (mapyourshow.com) 
 
To learn more about the conference, visit:  
https://www.gsx.org/ 

Navigating the Crossroads of Safety and Security: Highlights from Donald McInnes's #GSX2024 Session

Safeguards Consulting is thrilled to share highlights from an enlightening session led by our esteemed Physical Security and Fire Alarm Systems Specialist and Instructor, Donald McInnes, at #GSX2024 on Tuesday! His presentation, titled “Fatal Flaws: When Life Safety and Security Conflict,” took place from 2:00 PM to 3:00 PM and attracted a fantastic turnout. 

During this engaging session, McInnes expertly navigated the critical intersection of physical security and fire and life safety standards. Attendees explored how these essential areas can sometimes clash, leading to potential risks that threaten lives, property, and business continuity. With real-world scenarios and valuable insights, he also shed light on the importance of cohesive strategies that prioritize both security measures and life safety protocols. 

We hope that everyone who attended found the session as informative and impactful as we did. Additionally, we encourage all attendees to take the valuable insights learned and apply them in their respective environments upon their return home. At Safeguards Consulting, we believe that education and collaboration are key to enhancing safety and security in our communities. 

Thank you to all who joined us for this insightful session; we look forward to continuing the conversation about safeguarding lives and property in the future!  

Release of the September 2024 Safeguards Consulting Chronicle

We are proud to share that we recently released the August issue of our firm's monthly newsletter, The Safeguards Consulting Chronicle. This year, we are celebrating its first anniversary and our firm’s 14th anniversary, and we would love to invite you to subscribe for free in honor of both!   

 Our newsletter covers numerous industry events, news, and updates.  

Some of the items we included in our August issue was:    

+ A client spotlight piece on Scout Motors.    

+ An exclusive article written by our Founder, Mark Schreiber, on “Why Should I Hire a Professional Security Consultant?”  

+ A list of beneficial industry events, that includes events we are supporting/speaking at, as well as other events we recommend attending.    

+ Our list of useful blog articles.     

+ A selection of key industry news and updates.     

+ A quick industry tip as provided by our experts.     

 If interested, please subscribe using the hyperlink included below.    

Newsletter Signup — Safeguards Consulting, Inc.    

If you subscribe to our free newsletter, you gain access to all the exclusive security content mentioned above as well as additional content we hope will help you in your role as a security professional. It is also a wonderful way for my firm to stay in contact with you regarding company news, updates, or events so please consider subscribing in time for our September issue!    

Release of the August 2024 Safeguards Consulting Chronicle

We are proud to share that we recently released the July issue of our firm's monthly newsletter, The Safeguards Consulting Chronicle. This year, we are celebrating its first anniversary and our firm’s 14th anniversary, and we would love to invite you to subscribe for free in honor of both!   

Our newsletter covers numerous industry events, news, and updates.  

Some of the items we included in our July issue were:    

+ A client spotlight piece on ReWa.    

+ An exclusive article written by our Founder on “The Value of Resiliency”.  

+ A special Independence Day message from our team.  

+ A list of beneficial industry events, that includes events we are supporting/speaking at, as well as other events we recommend attending.    

+ Our list of useful blog articles.     

+ A selection of key industry news and updates.     

+ A quick industry tip as provided by our experts.   

If interested, please subscribe using the hyperlink included below.    

Newsletter Signup — Safeguards Consulting, Inc.    

If you subscribe to our free newsletter, you gain access to all the exclusive security content mentioned above as well as additional content we hope will help you in your role as a security professional. It is also a wonderful way for my firm to stay in contact with you regarding company news, updates, or events so please consider subscribing in time for our August issue!    

Exciting Industry News: IAPSC and SIA Sign Memorandum of Understanding Agreement

Our firm is delighted to announce a major milestone in the security industry: our friends at the International Association of Professional Security Consultants (IAPSC) and the Security Industry Association (SIA) have signed a Memorandum of Understanding (MOU) agreement! 
 
This groundbreaking partnership is designed to foster collaboration, generate valuable content, and facilitate knowledge-sharing between the two associations. By working together, IAPSC and SIA aim to elevate the profile of the security consultant profession, highlighting the crucial role that IAPSC members play in conjunction with the manufacturer and integrator members represented by SIA. 
 
The significance of this agreement cannot be overstated. Over the next two years, we can expect to see a tangible impact on the industry as a result of this partnership. By pooling their resources and expertise, IAPSC and SIA will be able to provide even more value to their members, drive innovation, and advance the security industry as a whole. 
 
At Safeguards Consulting, we are proud to be a part of this exciting development and look forward to seeing the positive changes that this partnership will bring. We believe that this MOU will have a profound impact on the industry, and we are eager to see the fruits of this collaboration. 

Our Founder, Mark Schreiber, also serves as an elected board member for IAPSC, and a SIA volunteer. He recently gave his feedback on this exciting partnership, “This MOU provides a great opportunity for the large group of SIA members to engage with professional security consultants and to share valuable knowledge from IAPSC members with leaders within SIA”.  
 
Congratulations to IAPSC and SIA on this landmark agreement! We are honored to be a part of this vibrant community and cannot wait to see what the future holds. 

To learn more, visit:  

Security Industry Association and International Association of Professional Security Consultants Announce Partnership - Security Industry Association

To learn more about IAPSC, visit:  

International Association of Professional Security Consultants: Home (iapsc.org) 

To learn more about SIA, visit:  

Security Industry Association (SIA) - Information. Insight. Influence. 

Release of the July 2024 Safeguards Consulting Chronicle  

We are proud to share that we recently released the June issue of our firm's monthly newsletter, The Safeguards Consulting Chronicle. This year, we are celebrating its first anniversary and our firm’s 14th anniversary, and we would love to invite you to subscribe for free in honor of both!   

Our newsletter covers numerous industry events, news, and updates.  

Some of the items we included in our June issue were:    

+ A client spotlight piece on Bladen County Schools.    

+ A special sneak peek at our upcoming blog post “Understanding the Basics of Cyber Hardening for Physical Security Systems”.    

+ A list of beneficial industry events, including events we are supporting/speaking at and other events we recommend attending.    

+ Our list of useful blog articles.     

+ A selection of key industry news and updates.     

+ A quick industry tip as provided by our experts.    

If interested, please subscribe using the hyperlink included below.    

Newsletter Signup — Safeguards Consulting, Inc.    

If you subscribe to our free newsletter, you gain access to all the exclusive security content mentioned above as well as additional content we hope will help you in your role as a security professional. It is also a wonderful way for my firm to stay in contact with you regarding company news, updates, or events so please consider subscribing in time for our July issue!