Physical Security
PROTECT YOURSELF, YOUR BUSINESS, & YOUR ASSETS
THREAT, VULNERABILITY, AND RISK ASSESSMENT
A TVRA Assessment provides in-depth analysis of relevant threats, and examines the current security elements in place to identify vulnerabilities – providing a full picture of how an adversary might target the executive and/or organization to cause physical, reputational, or financial harm, and offers guidance for how best to mitigate the risks using Design Basis Threat scenarios that demonstrate the most likely and impactful scenarios for you or your business.
SECURITY NEEDS ASSESSMENT
An on-site assessment of the physical security of a location, such as a residence or office space. The Security Needs Assessment examines the current security systems and devices, reviews all procedural security components, such as security policies and standard operating procedures, and provides actionable recommendations to key stakeholders.
TECHNICAL SECURITY COUNTERMEASURES (BUG SWEEP)
Highly trained former Secret Service and FBI agents will “sweep” your environment using the latest TSCM equipment to scan for implanted technology, such as miniature recording and transmitting devices and their software equivalents, and advise on how to proceed if any such devices are discovered.
TRAVEL REPORTS
Travel Reports address the relevant safety and security considerations you may encounter when traveling to an unfamiliar location – civil unrest, crime, environmental hazards, health and safety, terrorism, transportation, COVID-19 requirements, and US Embassy information, among other topics and resources to prepare for safe and secure travel.
Intelligence & Investigation
INTELLIGENCE FOR YOUR PEACE OF MIND
DUE DILIGENCE
Non-financial due diligence on a person, company, or organization to determine whether there are any “red flags” that could cause financial, reputational, and/or legal harm to you or your business by having such an affiliation.
PERSON OF INTEREST INVESTIGATIONS
An investigative report focused on specific individuals, Person of Interest Investigations examine individuals of interest, their motivations, and whether they may pose a threat of physical harm, exploitation, or embarrassment.
CYBER ATTRIBUTION
Gain an understanding of how and why a threat actor is targeting you, your family, or business, and learn how to counter the threat. Cyber Attribution investigations are designed to identify individuals who have acted, or may act, in a malicious manner against your business, employees, family members, or associates.
ONLINE EXPOSURE REPORT
Online Exposure Reports focus identifying the security vulnerabilities that are unintentionally created by the accessibility of your information online – through social media, public records, and online activity – and provide targeted, actionable recommendations to limit your exposure and mitigate the risk of misuse of your personal information.
EVENT GUEST LIST REVIEW
Event Guest List Reviews identify potential risks to you, or the success of your event. Using open source information, such as social media, blogs, forums, news and media outlets, combined with paid and proprietary databases for criminal history and sanctions, Red Five will scan and vet the list of attendees for any “red flags” with the potential to impact your event.
Cyber Solutions
DIGITAL SECURITY FOR COMPLETE PROTECTION
CYBER RISK & NETWORK TECHNOLOGY ASSESSMENT
Standard home network devices are often pre-configured for easy set up, however, they are also relatively easy for hackers to breach. The Cyber Risk & Network Technology Assessment examines your overall cybersecurity posture at your residence or home office. Red Five will provide specific mitigation measures to better secure your network, devices, and accounts.
WEBSCRUB
Reducing your visibility on the web is one of the best ways to protect your data and keep it away from threat actors. Red Five’s WebScrub is an ongoing service to identify and remove Personally Identifiable Information (PII) from over 220+ data aggregators online.
DARKWATCH
An ongoing monitoring and alerting service that actively looks for the Client’s personally identifying information (PII) listed for sale on the dark web, or on discussion forums, imposter accounts, unauthorized domain name registration, and/or posting of doxing material. DarkWatch includes WebScrub to actively remove your PII from online data aggregators and provide a holistic solution for protecting your online data.
ONLINE THREAT MONITORING
Early detection of threats posted on social media platforms is essential to preventing potential loss or damages to an individual, business, or event. Red Five uses our robust access to intelligence and monitoring tools to monitor, triage, and alert clients to any rhetoric posted online that may pose a physical, reputational, or financial threat.
DIGITAL FORENSICS
An examination of hardware and accounts to assess whether a device was compromised, identify what was taken, and report on forensic details. Digital Forensics is a process with endless applications, including: Post-Breach Digital Forensics Intellectual Property Theft Insider Threat Investigations Regulatory Compliance
Blockchain & Crypto
SECURE YOUR DIGITAL ASSETS
KNOW YOUR TRANSACTION
In today’s world, merely identifying individuals and businesses isn’t enough. Know Your Transaction (KYT) is considered the future of Know Your Customer (KYC). KYT Reports examine crypto transactions for suspicious activities or ties to known bad actors so you can proceed with confidence in your business decisions and transactions.
CRYPTOCURRENCY INVESTIGATION
Crypto transactions move quickly, making it difficult to identify where funds came from and where they went. Cryptocurrency Investigations trace on-chain wallet activity, follow the flow of funds, and identify wallet ownership.
DIGITAL ASSET SECURITY AUDIT
Digital Asset Security Audits provide live, on-line auditing and account hardening services with one of Red Five’s Chainalysis Reactor Certified experts to safeguard your digital wallets and assets against credential compromise, and limit potential damages from compromises of the exchange platform itself.
CRYPTO SCAM RECOVERY
Capabilities of law enforcement are often limited in their ability to support victims of crypto scams immediately after account compromises, scams, or thefts. Red Five’s Chainalysis Reactor Certified experts will trace the flow of stolen funds and provide guidance for reporting to law enforcement and centralized exchanges.
WALLET ACTIVITY MONITORING
Without warning, blockchain transactions can happen in an instant, allowing for funds to move quickly between accounts or individuals. For those monitoring digital assets, watching stolen funds, or trying to better understand connections between wallets through their transactions, every second counts. Wallet Activity Monitoring will alert you to movement of funds from exchange accounts and enable you to take the appropriate action.
Enterprise Operations
SOLUTIONS THAT SCALE WITH THE BUSINESS
IRS 132 APPENDIX
Companies that fund security services for their key executives may be eligible to take advantage of certain tax benefits under Section 132 of the IRS Code. Red Five’s IRS 132 Appendix documents how the company’s security spend is commensurate with the assessed threats and vulnerabilities, per IRS Section 132 guidelines.
INSIDER THREAT CONSULTING
With the frequency of insider threat incidents and their associated costs rising each year, Insider Threat Programs and Incident Response Workflows continue to be a crucial necessity for every enterprise.Red Five will build and develop an Insider Threat Program and provide training that empowers your team to prevent and identify potential insider threats to your business, as well as Incident Response Workflows to minimize any negative impacts of such incidents.
BUSINESS CONTINUITY PLAN (BCP)
A well-defined BCP ensures the continuity of business-essential functions across a wide range of emergencies and events – whether natural, manmade, or technological in nature.Red Five’s continuity planning takes into consideration the activities of individual groups, departments, and operational units across the company to build a comprehensive plan that accounts for all mission-critical personnel, functions, and technologies to ensure minimal disruption to operations in an emergency scenario.