E-Mail Scams
Internet Scams for the most part originate from overseas. You may receive an e-mail which looks like Norton Antivirus or other program you use, but the e-mail is really from a bad actor trying to scam you out of your hard-earned money.
We can teach you how to tell the difference between the two and the steps to verify if the e-mail is real or not.
Phone Scams
Phone scams like e-mail scams mostly originate from Overseas. We can teach you the common pitfalls people fall for. We can teach you common working and the most advanced AI scams to watch out for. and how to verify if it's real.
Classes:
We can teach you one on one with virtual classes or in a group setting in person. Contact us today for a phone consultation on how we can help you.
Let us design you an emergency action response plan, evacuation best route diagrams, employee training, special considerations for employees with disabilities, First aid kit design and recommendations, Screening check point design, Weapon Detection and Mitigation techniques.
With thirty plus years in emergency response, emergency management and access control in government and privet sectors, we have the experience and knowledge to improve the efficiency and response times to keep your facility and employees safe when emergencies happen.
Safety, Security, Emergency Response Let us evaluate your current plan and improve the effiency of what you have in place.
An efficient emergency action plan is key to employee safety and evacuation in case of an emergency. We can design an evacuation plan with special considerations for employees with disabilities, with equipment that can be used by any employee.
We bring the latest tactics, safety devices and procedures to aid you in securing your facility and keeping your employees safe when the unthinkable happens.
RUN - HIDE - FIGHT
Designing an efficient and safe security checkpoint is tricky. We have the experience to train your personnel how to detect weapons including those that are 3D printed. Improvised explosive devices and mannerisms of someone looking to do harm.
With a network of carefully vetted instructors from different fields we can tailor our instructors to your industry to ensure you receive the most up to date training your company requires.
The bad actor only needs to be right once, Secuity needs to be right 100% of the time. Weapons detection is an artform and the training is never ending. Assuming your company only uses Hand Wand metal detectors or the trifecta of hand wand, walk-thru and x-ray machine, using all of the skills we can teach will assist you in achieving the 100% goal of detection. Using our system of See, Feel Listen and Scan we can teach your personnel the best practice to achive your goal.
Event screening is tough using our skills your team can manage a flow of 300-400 persons per mag per hour without sacrificing your goal of quick through screening.
Bottom left: 3D printed gun, Only the rounds are metal. If the owner had removed the rounds and concealed them another way the gun would never have been found on the X-Ray Image.
Bottom center: 3D printed knife concealed on the persons back, (No metal) for a Magnetometer to alert on.
Bottom Right: 3D printed knife as sharp as any metal knife, Undetectable with Magnetometer and barely detectable with an X-Ray Machine and minimal contents in a bag.
Did you know Mags and X-Ray Machines require regular calibration?
we give you options, our equipment recommendations are thought out and designed with your industry in mind. Executive areas that require discrete protective measures would remain hidden, while areas like schools will require more robust protective measures designed to be secured by anyone.
Call, E-mail or Text Info@magsafellc.com
We are based in Myrtle Beach, South Carolina and will travel to you and work within your schedule to complete the training.
Carlos Arglebe
Our Firm is veteran, and Law Enforcement officer owned and operated. with 30 plus years in the industry and constant updated training we have the knowledge to teach your organization the most up to date threat mitigation techniques.
We need your consent to load the translations
We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.