We are giving away 2 full Scholarships!

We are giving away 2 full Scholarships! Donate to our “Bodyguards for Kids” Fundraising Event and enter to win an Executive Protection Specialist Course offered by Independent Security Advisors LLC, or a Surveillance Driving Course offered by Optimal Risk Group Ltd!


Not only will your donation be making a change and helping children in need, but it is also your ticket to our virtual educational event, and what a line of speakers we have! Plus, it is your ticket to our raffle prizes! Thank you to our donors for their generous offers on the scholarships! You are truly bringing our industry together!

“Bodyguards for Kids” the first annual fundraising event for St. Jude Children’s Research Hospital is now officially open and ready to accept your donations. Join us for our two-day virtual educational event as we are hosting 17+ subject matter experts from different countries.


Why participate?
1) Your donation is helping children in need and making a difference in their lives, first and foremost!
2) Your donation is your ticket to our educational event where, for only $39, you will have the chance to learn from 16+ Subject Matter Experts.
3) Your donation is also your ticket to our raffle prizes for a chance to win an Executive Protection course scholarship, books, and other great prizes!
4) This event will unite the security industry. No matter where you stand, no matter how you feel, this is for the kids…Do it!

We have also created multiple options for an individual or a company to contribute, participate in our event, and get highlighted as an Individual or Corporate Sponsor.

Minimum donation for individuals to be listed as event sponsors $250.
Minimum donation for companies to be listed as event sponsors $500.

For detailed information about our event, educational courses, speakers, and their bios please visit: www.bodyguardsforkids.com
After your donations, please contact us at info@lemareschal.com to be sent the event zoom invitation or to be listed for one of the above sponsorships options.

And don’t forget this event is for the kids! Let’s bring awareness about our industry and the human side of Executive Protection!

Operational Communication for Close Protection Operations

In the world of security operations, one of the most critical areas is communication, which involves constant cooperation and vital information sharing between top-level executives, their respective EA/P/A, the GSOC team, company employees, vendors, and agents working on the ground. Now, if you have been working for any reasonable amount of time in our industry, we are sure that the majority of you have experienced situations where the operation and security of everyone involved has been negatively affected by poor communication, inconsistent communication, or even the complete lack of communication. How information is being shared, what kind of information is being shared, and how/when it is documented is a skill one will quite often learn more readily outside the traditional ‘’EP Schools’’. Considering the fact that many security operations involve a huge number of people and different companies/vendors creating a hierarchy level, coupled with the fact that many companies have a tendency to be highly secretive with the information regarding the operation, you begin to understand how failing to communicate properly will not only create more risks but also will create day to day complications that don’t allow for a smooth operation. This is something that will not only be experienced by anyone secondarily involved, but also by the very protectees themselves. Keep in mind that your clients need peace of mind as well, and they shouldn’t be bothered or have their daily schedule negatively affected by your lack of communication skills or the resulting issues that ensue.

Communication tools

There is a common misbelief (Hollywood and action entertainment are all too often to blame for this) that all EP operations have agents using radios and other high-tech gadgets. In all actuality, the majority of EP agents are required to appear either low profile or not given a radio based on client proximity so they must rely upon and use their cellphones for a majority of their detail communication needs. Using your cellphone may seem like an easy tool and really quite convenient, but there is a downside, and it should also come with specific warnings regarding the pitfalls that come with its use.

Currently, for your operational needs, in order to communicate, you will need some form of a publicly available chat app. Some of the most utilized and popular platforms are Signal, Telegram, Wickr Pro, and Threema, to name a few. The majority of our colleagues have used and are still using WhatsApp, even though the app has been reported for multiple data breaches and leaks, as well as ‘’system shutdowns’’, leaving many colleagues panicked and scrambling to rapidly find an alternative communication system. But no matter how serious the issues that it presents, WhatsApp seems to be yet another example of the phenomenon where people get so accustomed to a product and do not want to change because change means you have to learn to use something new from the ground up and start again. We have had serious resistance from other companies we provided services to, as well as our clients themselves when we asked to use a different and more secure platform. In the end, we and our agents agreed to use WhatsApp as per our clients’ request for them; however, we were utilizing other platforms privately between our own agents. When you are using a third-party App such as WhatsApp, Telegram, Signal, etc., keep in mind that you will never be in control of the safety of the information you are sharing. Never. None of these apps are or ever will be entirely safe. So, when you are deciding, choose carefully based on who has fewer privacy issues, who is the creator (country), who your client is in relation to the creator (can the creators of this app be targeting your client?), what are your operational needs and always make sure you stay on top of the latest changes (social-political, geopolitical as well as company changes) that may affect the risk to your client. There are also paid work chat apps or business apps created for the workplace and personal messaging that promise a safer environment but again, one must take into consideration the fees and accessibility. (Who is paying when there is /more than one company involved and who IS involved, i.e. contractors, employees, 2nd parties, etc.).

Photo by MOHI SYED on Pexels.com

And the available functions and capabilities of each platform need to be vetted thoroughly as well. What are your needs or requirements? Will you be using large group chats? Will you and any size group be able to utilize voice texting? Will you be able to send small packets of information through the groups that you set up? (Pics of critical POIs, BOLO vehicles, onsite venue pics for inbound teams or advances, etc.) These are just a few of the features that operational teams use all the time and finding the right platform for your team’s needs and unique requirements is very important. No one operational has any desire to have any more apps or sites open at once on their personal devices than is absolutely necessary in an effort to try to manage a detail. Less “moving parts” is always better, if possible.

Information flow

During a protective operation, there is information that is crucial and must be passed among the parties involved (as per their responsibilities) and the agents on the ground. For numerous reasons, some individuals who are assigned as an operation manager or contract manager seem to be apprehensive about asking the necessary questions of the client or the people assigned to act on behalf of the client. This apprehension, quite often, is caused by their own insecurity in what they want to ask, fear of a negative response to their request, or the simple fact that they do not know what to ask. Insecurity in what to ask is a skill acquired by time in grade. As we spend time in our Craft, it’s almost impossible not to learn what the correct questions or inquiries would be. Fear of a negative response can be associated with the desire for acceptance or to have the client like them. We all know that what is best for the client’s safety and family security may not exactly be what THEY want…Be prepared to patiently and thoroughly explain the reasoning behind the questions and the resulting decisions. And for those who don’t know what to ask, stay tuned we will share a template one can use as one sees fit for his/her own needs.

When you receive a request to provide protective services, you must ensure that any/all specific information that is necessary for that detail’s success is obtained from the client right away and is passed along immediately to the agents on the ground. How many of us have found ourselves working on short gigs and know nothing or very little about the client? Sometimes even the very basic information that pertains to the gig itself? While we all know that clients can change their minds about what they want from second to second, there is specific information that still must be passed to the agents. This is an inherent need to set your team up for success. Period. Being able to plan ahead, run successful advances, and lower the risk levels, or even eliminate them altogether, means you must have as much information as you can and communicate it properly.

Now, the information flow definitely has two sides. Because the agents on the ground are reacting in real-time during any situation, they are actively aware of new information that must be passed on to the GSOC or the assigned person in charge. It must be done on a consistent basis. This is critical for operational effectiveness. But we all know “that” agent who will put every, little, minute bit of information that he/she may think it is relevant to the task. Always keep this in the back of your mind…While you are communicating with your fellow team members or passing vital information to your GSOC, keep it brief. Short and to the point. Only the facts. K.I.S.S. is the acronym that suits this best…

Photo by Lukas on Pexels.com

Briefings and De-briefings

I don’t believe that we can accurately highlight enough how important briefings and de-briefings are in our line of work. It seems that more and more, only a handful of companies or team leaders are utilizing them properly or using them at all. This lack comes from basic laziness in people who want to merely save time (Even though you can keep them short if you keep them on point and factual) and/or the absence of needed information. If you have nothing to pass on to your agents, why have one, right? Wrong. You, as a team lead, are not the only one who may have information that needs to be brought to the group. Allow team members to speak and ask questions so that later issues are avoided.

Photo by Christina Morillo on Pexels.com

Communication Briefings are designed to provide necessary information about a client, the detail, events or occurrences and how they all interact, in a quick and effective way. They can also inform your agents about the SOPs, how to carry on specific instructions or corrections/encouragements to how they are performing or changes required to perform their duties. Everyone involved will hear about current risks and key threats in the areas they will be operating and will all be on the same page.

De-briefings are equally important as it gives the team the opportunity to again share any information they gained through the day, identify any issue, discuss risks, possible POIs, improve communication between the team members and provide any additional support or guidance depending on the situation. It may also include discussions about changing tactics for the next day of operations as required due to new informational input gathered. And if there is truly nothing to report at the end of any time period, take the opportunity to boost morale and congratulate the team on a job well done. Remember, while we work very hard to stay out of sight and not draw attention to ourselves, this in no way means that we don’t need encouragement from time to time.

Documentation

After being in this industry for a combined 54 years, we can both tell you how important documentation is (And it will save your position [And your posterior] one day!). If you are an EP agent and part of the team, it doesn’t matter if you have been sending your information and communicating with your fellow team members, your TL, or GSOC during the day. At the end of each shift, or the end of the operational day, you MUST keep a daily report. Your own daily report. In simple words, your own ‘’diary’’. As much as we have been discussing communication during this article, this is the most important form of communication that you can possibly use. It literally is your communication with the future. We know that sounds a bit “out there”, but hear us out. At any one point in the future, you may be called upon to recount a day, event, or occurrence that is critical and it could very well be the difference between safety or an unsafe condition…contract or no contract….Employment or unemployment…Some little detail that will be the deciding factor between simplicity and severity.  And the very fact that you kept an intricate record of your daily operations will be the one factor that makes all the difference in the world. The reason is, the information you (or that has been circulated by others during the shift) may or may not have reported or documented, or the incidents or special client’s requests of that day that may or may not have been registered will be absolutely dependent on the accurate reporting and documentation that you and your team kept. As part of our job is preparing and preventing the worst, keeping your own diary/documentation means you are protecting yourself and the decisions you or your team made at work if you ever are questioned or called in for explanations. It will help you to tell your side of what happened and why you made the decisions you made, what were client’s requests or TL requests, and how you responded. The easiest way to do this is by sending yourself an email at the end of your shift. Besides the information you would obviously include, you will have (because of the e-mail) the time and date also registered.

Ever since there was ever more than one of us in proximity to one another, there is one undeniable fact…To survive, we MUST communicate. Every deciding moment in history has been built around communication. Banners, signs, signal fires, telegraph messages, the Pony Express, Morse code, Enigma, emails, burst satellite…All based on the need for and the understanding of communication. In our Craft, we must be the true professionals, and with this requirement comes the critical need to convey what we know, what we’ve seen, where we’ve been…The list goes on. Now, we know that this article only covers the basics when it comes to the subject of communication, and we realize that. But for those of us in our Craft, these points that we have made in this article are several of the “little things” that come up all too often in any detail AND they are the most frequently abused, ignored, and neglected aspects of what we consider to be a crucial part of any successful operation in close protection. How we communicate. For once we can smoothly, eloquently, accurately, safely, and quickly disseminate information properly, all the other aspects of our task will fall into place.

The Grows

Denida & Chris Grow bring a combined 54 years of international experience in the Protective and Intelligence services. They are based in Seattle, WA, and run their companies LeMareschalAthena Worldwide and Nannyguards

Nannyguards has been selected by the Leaders Network team at Meta

We are very happy and quite proud to announce that Nannyguards has been selected by the Leaders Network team at Meta to showcase our success story. It has been a tough road and many long hours since the very first day Nannyguards was created and we feel extremely blessed to share our work and heartfelt passion with some amazing professionals who have since joined our team. Dr. Mary Beth Wilkas Janke (Psychology), JD Elkin (Cyber Security Awareness), Kelly Sayre (Situational Awareness) and Chris Grow.

Want to learn more about Nannyguards? Visit www.nannyguards.com

Boys aggressively targeted on Instagram and Snapchat, analysis of Cybertip.ca data shows

Parents, pay attention! “Adolescent boys are being targeted primarily on social media giants Instagram® and Snapchat® as part of an ongoing sextortion crisis, an analysis of July Cybertip.ca data by the Canadian Centre for Child Protection (C3P) shows.
For the month of July 2022, Cybertip.ca has opened case files for 322 victims of sextortion:
When the gender victim was known, 92 percent of cases involved boys or young men;
Sixty‑three percent of victims reported they did not disclose the incident to trusted person;
Fifty percent of victims were under than 18 years of age, 37 were 18 years or older. In 13 percent of cases, the victim’s age was unknown;
When the platform used to facilitate the harm was disclosed, Instagram (42 percent) and Snapchat (38 percent) were by far the most frequently used social media environments where victims were targeted. Whatsapp® (5.6 percent), Facebook® (3.6 percent), and Apple’s iMessage® (1.2 percent) were the next closest platforms in terms of frequency.”

Read the full report at: https://lnkd.in/gP3nkJ4h

#socialmedia#sextortion#childsafety#childprotection#childabuse#onlinerisks#cybersecurity#onlinesafety#familyprotection#kidssafety#securityservices

‘Wren Eleanor’ TikTok movement inspires moms on social media to remove photos of kids: ‘Sick people’

TikTok sleuths noticed that users were saving videos of 3-year-old Wren Eleanor in concerning numbers

For years, security professionals have been repeatedly sounding the alarm in regards to the extreme danger of parents posting their children’s pictures or videos online. Your child’s adoring pictures or videos can be downloaded, used, and, quite often, photoshopped in horrific circumstances by pedophile rings, child traffickers, and ‘kiddie porn’ websites. What to you is “cute” and “adoring,” or a great way to draw more followers or make money as an influencer account, is for these insidious others “attractive,” “sexually stimulating,” or “erotically arousing”! Evil absolutely DOES exist…Horrible individuals and organizations are very real, and they are preying on your ignorance and hunting your children. Be alert!

According to the Fox News article, “One user, @hashtagfacts, noted that a video of Wren wearing a cropped, orange shirt was saved more than 45,000 times. A video of Wren eating a hotdog was saved nearly 375,000 times. She also highlighted unsettling comments on Wren’s videos and pointed out that popular searches for Wren’s account included phrases like “Wren Eleanor hotdog” or “Wren Eleanor pickle,” meaning users were frequently searching for videos of the three-year-old eating a hotdog or pickle.”…

Click here to read the full article

Residential Security-It is more important than you think

What do celebrities like Piers Morgan, Tyler Perry, Paris Hilton, Simon Cowell, Ariana Grande, Kate Moss, Kim Kardashian, Rita Ora, Rihanna, Hilary Duff, Lindsay Lohan, Dorit Kemsley, Bella Thorn, Kelly McGillis, Chris Brown, Miley Cyrus, Kanye West… (Yeah, the list is a bit long, isn’t it? Wait though, we’re not done yet…), Sandra Bullock, Selena Gomez, David and Victoria Beckham, Christine Quinn, P.Diddy, Audrina Patridge, Orlando Bloom, Megan Fox, Kelly Clarkson, Scott Disick, Kendall Jenner, Charlie Hunnam, Taylor Swift, Cara Delivingne, Kylie Jenner, Harry Styles (We’ll have to end the list here so we don’t spend the fill page just on names) have in common? I mean, besides the fame, careers, and money? All their homes have been broken into either by fans, stalkers, or burglars. In some cases, the victims were either inside their homes when this happened or entered the home to find the intruders there. And this, fellow practitioners, is where we come in!

Besides the damages and the loss of valuables, cash, or assets that have enormous value, some of these victims are going to be scared forever. It is never easy for one to have his/her safe heaven, their home, broken into by others. Knowing that the place you consider the safest is not safe and seemingly anyone can target you, come closer to you, or steal from you, makes the victims feel vulnerable and unsafe and brings substantial levels of anxiety into their daily life. Having your privacy torn from you can leave mental and emotional scars that do not mend.

Photo by Ingo Joseph on Pexels.com

”A burglar has been found guilty of raiding the home of pop star Rita Ora while she and her sister slept upstairs. Charaf El Moudden, 26, took £200,000 worth of property from the former X Factor judge’s house during the burglary on 28 November last year. Her sister Elena was awoken by a man rifling through items in her bedroom, prompting Ora to call police.” BBC News

What’s even scarier is that many of these victims have families, and their children can be targeted as well. And if you think that only celebrities can be victims of having their homes broken into, think again. Many incidents show that other individuals such as C-Suite corporates, businessmen and businesswomen, as well as Royal Family members, have had their homes broken into. Florence Mirsky, Elton B. Stephens Jr, and the former prime minister of Qatar, Hamad bin Jassem Al-Thani are just a few examples.

You can download and use the picture as well as the full data by clicking the links below. Please make sure you mention the source of our blog.
If you have any issues downloading, please e-mail info@lemareschal.com

According to Vanity FairDavid and Victoria Beckham were reportedly “shaken up” after a masked intruder broke into their home while they were asleep. The couple’s West London mansion was burglarized in late February. The pair and their 10-year-old daughter, Harper, were apparently asleep when the intruder broke in upstairs, only becoming aware of the invasion later. In the meantime, the burglar was able to quietly make off with thousands of pounds worth of their belongings. The Beckhams didn’t realize they’d been burglarized until their 17-year-old son, Cruz, came home later that night after an evening out with friends and discovered a ransacked spare bedroom with broken glass from where the window had been smashed in. Cruz alerted his father, who called the police. They then both went looking for the trespasser, but he was long gone by then with their designer goods and electronics.

Reading all these names (who are just a small group considering the larger picture) you may ask: since they have the money, why can’t they protect their homes more efficiently?

One of the primary reasons is the all too common PROACTIVE vs REACTIVE security stance they take. This unfortunate view has become one of the leading factors in these types of circumstances. Many people, no matter what their financial background or celebrity status might be, will only take action and reach out for help AFTER an incident has taken place. They are convinced, either on their own or by friends and associates, that they don’t need that kind of protection, they’ll be fine, it won’t happen to them…Until it does. Then, some may invest in a close protective detail, but not in a residential security team, and in doing so, will never learn what may be truly necessary. Some interesting residential security facts brought up by the 2022 State of Safety report showed that although Americans believe that crime is on the rise, the use of property protection measures fell 6% between 2019 and 2020, and nearly 40% of American residents don’t use any kind of security measures to protect their home whatsoever.

What is Residential Security?

Residential security is a combination of technological measures, methods, and manpower to ensure the safety and security of a household (lives, valuables, privacy) and the assets and property that lie within its perimeter. Depending on the client’s risk and threat factors (their security needs), it can be alarm systems, controlled access, guard dogs, physical residential security teams/guards (RST), drone coverage, or any combination of these tools.

A good residential security plan starts with a detailed, in-depth risk, threat, and vulnerability assessment. An expert should visit your residence and do a detailed physical survey to identify any weak points that will make it easier for someone to gain access to you or breach your privacy. The expert will be able to determine the seriousness of potential risks and the likelihood of an incident taking place, either due to what is discovered during the assessment or specific threats you have currently. He/she will consult with you on a plan and give their recommendations (upgrading the locks on windows and doors, upgrading the level of glass security, placing an alarm system and CCTV, hiring security guards, etc.) on how to mitigate any risk and/or threat factors and protect your property. They can also identify the response time for first responders and law enforcement and do thorough research on your area’s criminal activities, crime rates/types, and even any known sex offenders’ presence in your surrounding neighborhood. So many families have small children, and knowing the potential risks in the surrounding area helps to mitigate any possible dangers to the children’s safety. During an estate risk, threat, and vulnerability assessment, they look for anything that can be harmful to you or disturb your life. A threat can be anything such as a natural disaster, fire incident, stalking and harassment, privacy violation, smash and grab theft, robbery, vehicle theft, or a serious physical attack such as a kidnapping, active home invasion when you’re home or even murder.

Photo by PhotoMIX Company on Pexels.com

Things to consider when establishing a Residential Security Team

     A Residential Security Team is not established just because the client lives or spends the majority of their time at the said estate, a residential security team is placed for the safety of the premises even when the client is not home. Arriving home to find a violent individual in your home awaiting your return is no less disturbing than stopping one from coming in when you’re present in the home. Most clients and security companies focus so much on protective details that they forget the importance of having a proper and balanced RST in place that will make sure the house, your belongings, and your privacy are protected 24/7. Most of the victims mentioned at the beginning of our article could have prevented what happened to them if they had put the needed importance on their RST teams. While a determined criminal might come in when you’re home, most will attempt their task when you’re away from the residence, and a mere security system with cameras only takes great pictures of them getting away, not stopping the loss of assets or the even more frightening possibility of someone waiting until you arrive home.

     A Residential Security Team and the Protective Detail teams must cooperate and communicate with each other on a regular basis. They are two departments with the same goal, to keep the family safe. Either when the family is on the move or back at home. We’re highlighting the necessity of cooperation significantly because there seems to be a competition at times between RST and Protective Details teams who don’t share information or report to each other as they should. Remember, as an RST, you have eyes on the property and around it; as a Protective Detail team, you have eyes on the client while in public or away. Many incidents would have been avoided if one team could pass on the information they found to the other. In the end, we all truly want the same thing…A safe and happy client and his family.

     The training of your Residential Security Team is crucially important. You must have trained personnel who not only know every inch of your premises and all the needed procedures but also are trained and qualified for the job requirements. Make no mistake, a residential security team member is not just a uniform guard.

RST members are individuals who are responsible for a variety of functions such as:

  • access control
  • patrols
  • CCTV monitoring
  • surveillance
  • documenting and reporting
  • emergency response
  • providing real-time information about the surrounding area
  • identifying suspicious behaviors and reporting them
  • have a high level of customer service attitude
  • conduct ongoing threat, risk, and vulnerability assessments
  • follow up with SOPs
  • work directly with household personnel, other security teams, and local law enforcement
  • know how to use alarm and surveillance equipment
  • can support event security operations
  • mail screening

The residential security team is your first line of defense, and when they are truly professional, they can be a deterrent to anyone who may want to target your home.

     When you’re vetting your Residential Security Team, there are a few steadfast rules to always keep in mind. Would you allow just anyone to be close to your family and friends? No, of course, you wouldn’t! Then why shouldn’t you be extremely careful during the vetting and hiring process of your residential security team? Known incidents have shown that ‘’strong castles fell from within’’, and many home break-ins have happened due to insider information. When we deal with celebrities or people with specific wealth, insider threat is very real. Many of the break-ins happened because one of the residential security guards either committed the crime or made it easier/assisted the actual burglars. Vetting your security personnel is mandatory, a criminal background check should be done before hiring and be done again regularly at random after the initial hiring. An additional credit check is necessary to assure that your RST members are of sound financial background. There can be no room for any type of bribery or theft of the client’s assets due to an individual’s monetary indiscretion. Driving records are crucial as the RST members may or may not have access to or need to move the client’s vehicles. And as much as it sounds ‘extremist,’ there MUST always be a background into anyone near the children or having regular interaction with the children. The world is no longer a safe place…Unless we make it that way. This is our task…This is our Craft. We have chosen this, and a Residential Security Team is a very necessary asset for the proper 24/7 protection of clients, property, assets, and even their very lives.

If you are interested in learning more about Residential Security or need a Residential Risk, Threat, and Vulnerability Assessment? contact us today at info@lemareschal.com

Chris Grow

Protective & Intelligence Services

AUS Global Special Services Travel Team

Managing Partner LeMareschal LLC

Denida Grow

Protective & Intelligence Services

Founder & CEO

Athena Worldwide Nannyguards

Managing Partner LeMareschal LLC

Marketing tips for Executive Protection Agents

Perception is everything, protect yourself and build your reputation on solid ground.

*These are part of a panel of personal opinions formulated from my experience in the industry as an EP agent, business owner and recruiter for other corporations. Keep in mind that just because I preach it, doesn’t mean I haven’t made the mistakes. It’s actually the fact I have made some of these and it’s caused me to learn what can work and what doesn’t. You may not agree with me or follow up with the suggestions, but experience is an amazing teacher…”Let he who has ears…”*

1) Know what you know and know your value. (Know what you are willing to sacrifice as well, working more hours, night shifts, holidays, for how much, or how little.)

2) Know what you don’t know and either leave it to someone else or study it (There is nothing worse than someone who is trying to operate in many different fields, and yet, have quite limited knowledge on each field and act as though they’re the authority on it.) Focus on what you are most interested in and master it. Only move on to something else when you have a solid foundation on a topic and you are prepared to expand to something else.

3) “Listen more and talk less” Comment or post on social media only if you have something constructive to say and always stay on point and use professional language.

4) Post or comment only on subjects you know well, subjects you have studied, and subjects you know from real-life experience. There is no need to post daily or non-related posts.

5) It takes specific work and, quite simply, boots on the ground to consider yourself experienced. Having worked EP two or three days a month doesn’t make you qualified enough to disagree or raise your voice with people who have been doing this for 10+ years. Neither are you an expert after one or two years in the industry (You can always see who is who and what they know and don’t know by what they post on social media). Stay humble, lay low and learn your trade well…Your day will come.

6) Maintain a professional image on all business-related social media sites. A suit and tie picture will always be better than a tank top or a duckface selfie.

7) Build a professional LinkedIn Profile, highlight your skills and post all your professional and educational achievements.

8) Stop posting sensitive information, IDs, and license numbers on social media (You are a security professional! If you fail to protect even your own personal information, what does that tell me about how you handle your clients’ information??)

9) Always maintain OPSEC in every post you make. Always think, “How could this be used to harm my client or my team?

10) Protect your data! We have seen more and more security professionals warning their connections that they have been hacked! If your ex-girlfriend can hack your Facebook or LinkedIn profile, then you are probably not very good at keeping your clients or your information safe.

11) Keep high school drama out of social media.

12) Control your emotions, and remain professional at all times…You are your client’s close protection, NOT his/her “Buddyguard”. Friendly at all times, not Friends.

13) Be careful of your connections and the people that you recommend or work with. Have you heard of death by association? Make no mistake, it is a very real factor in our business!

14) Build a professional-looking CV. Keep it simple and to the point. There is no need to hire a CV writer, you know what you have done, trained for, and accomplished.

15) Invest time in building connections. Spend time talking to others or helping them with their projects. I have gained many contracts after the interviews I did with others.

16) Offer pro bono services to companies you respect and want to be involved with.

17) If you are single and have no family commitments, perhaps you work that shift on Christmas or other holidays so someone else can spend the day with his children. You have no idea how being understanding can help you in the long term.

18) Study your clientele and any potential clients. The industry has changed significantly, and the new wave of clients are IT gurus, app developers, cryptocurrency investors, reality stars, etc. Always be knowledgeable on current trends and topics.

19) Be informed on local and international news, threats, and events that affect the industry and the needs or operational aspects of your clients.

20) Don’t be arrogant, there is a fine line between being confident and arrogant. Never cross it…There usually is no way back once the damage is done.

Denida Zinxhiria Grow

Founder & CEO

Athena Worldwide

Athena Academy

Nannyguards

Managing Partner

LeMareschal LLC