SIM Swapping Attacks: A Surprisingly Common Cyberthreat

Author: Robert James Collie, Intelligence Analyst SIM swapping attacks quintupled from 2021 to 2022. Potential consequences of this cyberattack include monetary theft and reputational harm. Anyone may be targeted by a SIM swapping attack and the impacts can extend far beyond the individual who is targeted to include professional or personal networks. In this post, […]
Fox Bravo Overland and Red Hands Helping Honor Heroes with Wilderness Therapy Out West

By Kris Coleman, Founder, President and CEO of Red Five Security Red Hands Helping, the charitable arm of Red Five Security, supported Fox Bravo Overland this summer in getting first responders and veterans into the wild for some nature therapy amongst peers. Fox Bravo was started back in 2017 with a handful of former veterans and […]
Protests and Disruptive Activity Likely Through the Weekend Following Hamas Calls for Global Protests

Author: Nick Nemtuda, Intelligence Analyst International calls to protest by the former Hamas chief will likely lead to an uptick of demonstrations in support of Palestine worldwide through the weekend. Protest activity probably will increase in the next few weeks in response to the changing security situation and number of civilian casualties. Peaceful protests probable, […]
Hamas’ Use of Social Media & How to Protect Your Family

Author: Kelly Shemansky, Red Five Security The recent use of social media by Hamas presents an increased risk of exposure to harmful content to social media users, including families. This week, as everyone’s social media feeds are flooded with content covering the Israel-Hamas war, it is important to remember that the “barrier for entry” to […]
Best Practices for Internal Threat Teams During a Crisis

Author: Karna McGarry, Vice President of Managed Services, Red Five Security The recent violence in Israel is a stark reminder of how quickly the security environment can change—often without warning—and raises the risk for a company’s safety of personnel, facilities, and operations. The war in Ukraine continues and other threats loom, which can overwhelm your threat […]
What are Online Romance Scams, and How Can You Recognize Them?

What is it that usually comes to mind when thinking about fraud? For some, identity theft or large-scale investment fraud, such as Ponzi schemes, comes to mind. However, “Romance Scams” are a form of fraud that has rapidly increased over the last two years. According to the Federal Trade Commission (FTC), reports of romance scams […]
2022 – Are You Ready?

With almost 15 years working for the CIA and the FBI and now another 17+ in the private sector, I still regularly bring those well-honed government skills to bear in the ever-changing threat environment of the private wealth arena. My experience in those organizations gave me a foundation of anticipation and agility, and then for […]
Security Considerations and Planning for Independent Schools

Independent schools differ significantly in their sizes, academic approaches, histories, and cultures; however, all have a common interest in protecting their students, staff, and reputations. Independent schools that invest the necessary time and resources into security planning and preparedness can gain peace of mind and mitigate the risk of harm impacting their students, staff, and […]
What is IRS 132 Assessment?

Does your corporation expend funds protecting the founder, CEO, or a member of the Board of Directors? Or perhaps the focus is on the Head of Research and Development upon which the corporate intellectual property is based. Regardless, corporations should hire a professional security consultant to provide outside expertise to assess and document the key […]
Personal Security While Traveling in 2021 & Beyond

As travel continues to increase across the US and globally, it is critical to be cognizant of privacy exposure while away from home. Many travelers may not consider the threats to their privacy, personal information, or corporate data when setting out for a trip; however, compromised privacy can have long-lasting effects personally and professionally. Airports, […]