How to Foster a Culture of Risk Awareness and Responsibility

An engineer and the safety team walking a construction site discussing risk awareness

In a world where new threats seem to emerge every single day, how can businesses protect themselves from the next danger hiding around the corner?  Technology can help. So can guidance from trained security experts. But one of the most powerful defenses is a workplace culture that values risk awareness. When the entire organization is…

Read More

Secure Your Business: The Top Business Security Systems for Property Managers

Woman unlocking a door with a key card - The best Business Security Systems for Property Managers

As a property manager, you are responsible for the security of your business premises and the assets that are within it. With criminal activities on the rise, ensuring maximum safety for your property is crucial to maintain a secure environment for both employees and customers. To achieve this, investing in top-notch business security systems is…

Read More

Brand Protection: How Businesses Can Identify and Stop Intellectual Property Theft

brand protection Services helps brands protect their intellectual property

Adam Shipley was furious. He spent years building up his company’s brand of elite fishing gear, and now someone was selling counterfeits — even using lookalike packaging — through a half-dozen online marketplaces. At half price! The copycats were cheap knockoffs that broke easily. Shipley knew that because hundreds of hoodwinked customers were deluging his…

Read More

Dell Spry Promoted to Vice President Emeritus

Dell Spry being promoted to Vice President Emeritus

Dell Spry is an attorney by education a investigator by passion. He has been in law enforcement for over 30 years. In that time he served in the FBI as a Supervisory Special Agent and was lead investigator on some of the most high-profile cases in the country, including the infamous Aldrich AmesCIA Spy case.Through…

Read More

Why your business may need an asset search

Construction worker and business man in suit shake hands after an in-depth asset search

Written By: James Hart Linda Daly didn’t know exactly what was wrong, but something was off about her latest business deal.  A month earlier, Daly – the owner of a midsize retail chain in the upper Midwest — had been excited about investing in an up-and-coming manufacturer that lined up perfectly with her own mission. …

Read More

How to Secure Intellectual Property and Trade Secrets

How to Secure Intellectual Property - featuring a picture of a woman scientist in a lab

Anything that has value is at risk of being stolen, and unfortunately, that includes your company’s ideas and information. After all, intellectual property generates tremendous value in today’s economy. In 2019, American industries that rely on IP generated more than $7.8 trillion in gross domestic product, according to the US Patent and Trademark Office. Those…

Read More

How to Respond to a Whistleblower’s Report

a consultant discusses How to Respond to a Whistleblower’s Report

In theory, it should be a good thing when employees come forward with a whistleblower report.  They’ve spotted a threat to your organization and are giving you the insight you need to address the problem before it becomes even more serious.  Unfortunately, even in the best-case scenario, whistleblower complaints can still be stressful for employees,…

Read More

The First Steps for Conducting Internal Investigations

Human Resources team conducting internal investigations with current employees

Written by: James Hart When the call finally came, Raquel Henderson lunged for the phone on her desk.  Henderson was less than three months into her job as the HR director for a midsize family business in a rural part of the state. The company was the community’s largest employer and a point of pride…

Read More

Theft of Trade Secrets: How to Prevent the Loss of Key Intellectual Property

theft of trade secrets: A business man with his head in his hands dispairingnover the loss of his trade secrets. Theft of trade secrets is big problem for businesses.

Written by: James Hart The names have been changed, but the following story is a compilation of real situations faced by real businesses. Doug Medford had never considered himself paranoid. But there were too many coincidences to merely be coincidental.  Medford, the CEO of a small Midwestern manufacturer, learned that an up-and-coming competitor from China…

Read More

How to Prepare for a Cyberattack

Written by: Dell Spry At Chesley Brown, nothing is more sacrosanct than the safety and security of our clients. It is our intention to keep you educated, updated, and informed as world events continue to unfold and keep you aware of what the potential consequences of those events to your company might be. We are…

Read More

A Nation Under Attack: The Colonial Pipeline Attack

The Colonial Pipeline Attack revealed how underprepared our nation's critical infrastructure is to outside threats.

Written by: Dell Spry Introduction: Before the Colonial Pipeline Attack In earlier centuries wars were fought between nation states to acquire water and fertile land. Then came the quest for natural resources; gold, silver, oil. These wars were fought utilizing large armies requiring massive supplies to achieve their goal of conquest and colonization and probably,…

Read More

Reasons to Hire an Outside Security Risk Firm

security risk firm at a class A office tower

The security services industry is one of the fastest growing industries in America today. With so many disruptive technologies, emerging threats, and the growing frequency of natural disasters, its easy to understand why — It can be exceedingly difficult to keep up with the myriad risks facing your organization. So how do you bring order…

Read More

The Ultimate Guide for Small Businesses to Combat Economic Espionage

preventing economic espionage, trade secret theft and intellectual property theft

For decades, the US has been a victim of economic espionage — a foe that is now costing American companies billions of dollars in lost revenue. From hacking government websites to infiltrating research institutions with spies, competitors and foreign governments are pulling out all the stops to steal trade secrets. This scourge is no longer…

Read More

Preventing Civil Unrest

Protestors storming the captiol in an act of civil unrest, insurection

We’ve all recoiled in disbelief and horror as we watched scenes of violence stream across our TVs. The violent insurrection we saw in the U.S. capitol was unprecedented. That is to say nothing of the  collapse in security measures and barriers that allowed rioters to breach our nation’s capitol. Deservedly so, leaders are alarmed about…

Read More

What Achilles can Teach us About Threat Management

Vulnerability assessments and management in the new risk landscape. Threat assessment

By: Dell Spry There are numerous similar, seemingly inconsequential, soft targets scattered across our country unprotected by a single surveillance camera or even a strand of barbed wire. Is this issue getting the attention it deserves? Just whose responsibility is it to make that determination? Have you included threat planning in your risk management strategy?…

Read More

The SolarWinds Supply Chain Attack: What Businesses Need to Know

The solarwinds supply chain hack represented by 6 locks, one of which is a different color

What is the SolarWinds Supply Chain Attack? SolarWinds, the Austin-based cybersecurity firm, found itself in the middle of a catastrophe due to internal security lapses. The firm recently earned headlines for making it to the list of unsuspecting service providers targeted for its elite supply chain. A week ago, the popular Cybersecurity firm confirmed falling…

Read More

Lessons Businesses Must Learn from the Nashville Bombing

Picture of downtown Nashville Tennessee a dusk. Lessons learned from the nashville bombing

The sound of gunfire punctuated the peaceful hush of Christmas morning. According to one witness, “It sounded like an automatic weapon.” About 10 minutes later she heard a second round of gunfire, then a third. When police arrived at the scene a little after 5:30am they found an RV parked in front of a nondescript…

Read More