Threat assessment

The Importance of Travel Security Assistance in Today's Volatile World

  • Posted on: 18 July 2019
travel security

These days, the world has become smaller with the rise of technology. Thanks to the recent technological advances, ease of access to information and people has never been easier. The internet has made it possible to explore the world and travel overseas to foreign countries. While there is a lot of good that comes out of international travel, we can’t overlook the importance of travel security.

Why is Risk Assessment Important Today?

  • Posted on: 18 April 2019

Before we dive into why a risk assessment is essential in today’s world, it is important to briefly define what a risk assessment is. A risk assessment is best defined as a systematic process of evaluating the potential risks that one encounter in a projected activity or undertaking. There are different types of risks spanning from security-related to physical and personal. For this answer, we will draw mainly from our expertise in the security industry. With that said, elements of a standard risk assessment include the following:

Sudan Uprising: April 2019

  • Posted on: 11 April 2019

On Thursday morning April 11th, conflicting reports had surfaced, some claiming that there has been a military coup in Sudan forcing the Sudanese president Omar Al-Bashir to step down, and other stated that the Sudanese President Omar Al-Bashir willingly stepped down, following months of anti-government protests. According to reports, celebrations are already under way in Sudan as protesters have taken to the streets, waiting for the official announcement to be made.

General Threat Assessment

  • Posted on: 2 February 2018
  • By: laila Akel

Organizations operating in a conflict zone have 2 challenges: How to create a secure work environment, and deciding when it has become too dangerous to continue operating. In order to address the latter, a general threat assessment is necessary. In which different incidents are evaluated and sorted into one of four levels. Starting with low threat, and escalating to operation shutdown. In this blog we identify incidents at each level, to make evaluating situations easier, we have added examples of past events around the world for each level.