Navigating Hostile Terminations: Read This Before Firing Someone

Nearly 2 million American workers report having been victims of workplace violence each year, according to OSHA statistics. This highlights the relatively common occurrence of such challenging scenarios and the importance of having proper security measures in place to ensure the safety of all parties involved.

2024-02-22T20:55:05+00:00August 25th, 2023|Armed Security, Private Investigator|

CEO Reveals Top 6 Takeaways Over 6 Years

With an overwhelming sense of pride and excitement, we are delighted to announce Covert Results' nomination for not just one but two prestigious accolades at the highly esteemed 2023 NEXT Awards & Entrepreneurs' Hall of Fame. As a finalist for both the Market Mover and Entrepreneur of the Year awards in the Products, Services, and Retail category. This coveted recognition underscores our dedication, innovation, and unwavering commitment to providing exceptional services in the security industry for our community. 

Protect Your Digital Footprint

Are people still masking up and running into a bank with a gun demanding money? The FBI leads the investigations on bank robberies and they have been tracking this crime since the 1930’s. Early data was based only on voluntary reports from police chiefs and high ranking officials of large cities. In 1948 there were only 53 bank robberies that were reported. Better data and higher reporting started about 1970 when the FBI’s Uniform Crime Reports reported just over 2,000. The number of US bank robberies peaked in 1991 when over 9,000 were committed.

2023-04-19T14:47:58+00:00April 19th, 2023|Cybersecurity|

Are There Good Hackers?

Time is precious. Time is money. Time affects everything that we do. So how do you feel when a hacker targets you and your precious time and interrupts that time by attempting to hack into your business and personal life? And if the hacker is successful and actually compromises your data then there is nothing you can do…or is there?

So what is a hacker and where did that even come from? In the 1960s, 'hacker' emerged as a designation for an individual with expert programming knowledge who could craft highly efficient code; they had a knack for "hacking away" superfluous instructions and streamlining programs. Basically a guy cut some corners and boom…a hacker was born.

2023-03-02T03:44:30+00:00March 2nd, 2023|Cybersecurity|

Catfish Task Force

A catfish is a person who sets up a false or fake profile on a social network or dating site for the purpose of deception and fraud. Generally speaking, the goal of the person who is creating the fake account— known as the catfish, is financial gain. 

Storytime…

In a recent sextortion blog posted by Covert Results, a lot of people got interested and reviewed the blog. We had multiple calls with individuals admitting that sextortion had happened to them. We know this is a problem all across the world, with AI and technology getting a lot better. People have to be more cautious about what kind of information they’re putting out on the internet.

2023-02-16T13:03:24+00:00February 16th, 2023|Cybersecurity, Private Investigator|

What’s Your Plan?

Super Bowl LVII is nearing, where the Philadelphia Eagles are going to face the Kansas City Chiefs. This is going to be a great match up! These two teams have been planning all year — they play regular season games, play and win play off games and now only two are left for the Super Bowl, the grand finale! 

If you’re a business owner and you’re not feeling prepared, you should plan ahead just like a professional team. Do better; plan better, and prepare with armed security. Planning ahead includes: taking a look at your security budget and potentially hiring armed security for your event, venue, building, business, or personal protection.

2023-02-08T15:00:00+00:00February 8th, 2023|Security|
Go to Top