Protective Group

We specialise in providing safety and security solutions to the most vulnerable people and organisations.

14/06/2024

๐ˆ๐ ๐€๐๐๐ซ๐ž๐ฌ๐ฌ.
Perpetrators will use any information they can obtain to try and track and locate their victims, particularly in the days after their victim may have left or actioned their escape plan.

Often perpetrators will use an IP address which can provide a general idea of a user's geographic location, such as the city or region, but it typically will not give an exact address.

However, there are exceptions, especially in a domestic violence situation where more precise location information might be determined if the perpetrator has certain technical skills or resources.

In scenarios involving domestic violence, it's vital to be aware of the following:

โ€ข Online databases associate IP addresses with locations. They are not typically exact but can sometimes provide specific information such as a suburb.
โ€ข Some websites and services track and record IP addresses for various purposes. A perpetrator with access to this information, either from the site or directly from a network device, could make educated guesses about a person's location.
โ€ข With proper legal authorization, such as a court order, law enforcement may be able to compel internet service providers to release information that can be used to find an individual's exact location.

How to hide or โ€œmaskโ€ your IP address:

โ€ข Use a VPN or Tor: To hide your real IP address, consider using a Virtual Private Network (VPN) or The Onion Router (Tor). These tools mask your IP, making it more difficult to track your activities back to a physical location.
โ€ข Check Device Permissions: Ensure that no unwanted tracking apps have been installed on your device and that location permissions are only given to trusted applications.

Smartphones and many apps report location data more accurately than just an IP.
If a perpetrator has installed spyware or has access to login credentials, they could potentially track a device's location via these means.

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.

12/06/2024

๐ƒ๐ข๐ ๐ฒ๐จ๐ฎ ๐ค๐ง๐จ๐ฐ?
Protective Group offers free in-person on-site training and awareness sessions to referral services, support organisations, Police and Victim Survivors.

Bringing our experience from the frontline we understand domestic and family violence, and we understand how perpetrators misuse technology. We have conducted over 20,000 on-site technology assessments giving the victims confidence to live a life free from tech abuse.

A victim should never be forced to factory reset their phone, be told to purchase a new device, be forced to speak outside their home at the fear of hidden cameras inside or limit their car movements at fear of the perpetrator knowing where they are.

Our training will allow you to assist in identifying tech abuse and understand how to allow the victim to regain control of their digital eco-systems and not be told to โ€œjust factory reset your phoneโ€.
Sessions can be facilitated online or in-person.

We offer the following training and awareness sessions:
- Tech Abuse Awareness
- Identifying Tech Abuse
- Technology Safety Tips
- Victim Survivor Tech Abuse Training (For Victim Survivors)

We are also pleased to announce that we have added a new course for Police, Magistrates and Police Liaison Officers where we discuss the following topics that those attending experience on a daily basis:
- The types of tech considered for varying types of risk and abuse
- Tips and info to talk to users about obtaining as evidence for court matters
- Presentations or early signs that may indicate tech abuse
- Types of tech safety available

Our training team have also added new dates for July and August.

Please visit https://calendly.com/protectivegroup to learn more about our free training sessions and secure a time for your organisation and team.

06/06/2024

Last night Protective Group CEO Stephen Wilson talked to Channel 7 News about the disturbing ways domestic violence offenders are using technology to control and harass their victims and how innocent devices can be turned sinister.

Even the most inconspicuous devices are often used: baby monitors being pre-programmed to listen to their victim, controlling home Wi-Fi networks to turn on music at 3am in the morning or turning the heating on at the highest temperature.

Protective Group weekly locate tracking tiles and other Bluetooth enabled devices such as the Apple AirTag. Tracking tiles have been readily available for years- a small device that works very similar to Appleโ€™s well known โ€œTrack my iPhoneโ€ program.

Such tiles/tags present a significant risk as perpetrators, disgruntled work colleagues, anyone with ill-intentions can place one of these in a victimโ€™s car or belongings (handbag) and it doesnโ€™t require the perpetrator to be in proximity to locate the tracking tile.
Another concern is the ability to conceal these devices as they are magnetic- A perpetrator could easily attach these to a petrol cap and underneath a car with ease.

The violence isn't always physical, but the intent is always the same- control their victim and their movements.

We thank Channel 7 News and James Carmody for allowing us to share our thoughts.

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.

05/06/2024

๐‘๐ž๐ฆ๐จ๐ญ๐ž ๐‚๐จ๐ฆ๐ฉ๐ฎ๐ญ๐ž๐ซ ๐€๐œ๐œ๐ž๐ฌ๐ฌ.
Victims of Domestic and Family Violence often have remote access software installed on their PC and Apple, Laptops and Desktop computers, often being installed by their perpetrator.

Once remote access is installed the perpetrator is able to connect to and control a computer from a remote location over a network or the internet.
This technology enables a perpetrator to access files, applications, and resources on a computer as if they were physically present at the machine.

If you suspect that someone has gained remote access to your computer there are some signs and steps you can take to investigate and secure your device:

โ€ข Check for Remote Access Software: Look for any remote desktop applications that you did not install, such as TeamViewer, AnyDesk, GoToMyPC, Chrome Remote Desktop, or others.
โ€ข Review Installed Programs: Go through the list of installed programs on your computer and look for anything unfamiliar or suspicious. You can usually do this through the Control Panel on Windows or the Applications folder on macOS.
โ€ข Monitor Active Connections:
โ€ข On Windows, you can use the Task Manager (Ctrl + Shift + Esc) to see if there are any unknown active connections. Go to the "Performance" tab and then open "Resource Monitor" to see network activity.
โ€ข On macOS, you can use the Activity Monitor found in the Utilities folder. Check the "Network" tab for unusual activity.
โ€ข Examine Startup Items: Check your device's startup items to see if any unfamiliar programs are set to run when the computer boots. These could potentially be remote access tools set up to start automatically.
โ€ข Keep Your Computer's Security Updated: Make sure your antivirus software is up to date and consider running a scan to detect any malicious software.

If you are unable to remove remote access software capabilities, then refrain from using the computer until you are confident that it is safe again. Use a safe device in the interim such as a library computer.

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.

02/06/2024

๐†๐จ๐จ๐ ๐ฅ๐ž ๐‘๐ž๐ฏ๐ข๐ž๐ฐ๐ฌ.
We are seeing a disturbing increase in the use of perpetrators using Google and other review sites to track or harm their victims. This generally involves exploiting publicly available information that the victim may unknowingly share.
A perpetrator could monitor their victim's activity on Google Reviews to see which places they are reviewing, which can give clues about their routines and frequent locations.

Know what you post and how you post:

โ€ข By monitoring reviews posted by the victim, a perpetrator can gather information about their frequented locations, their routines, and even their preferences. This information might be used to predict where they might go next or to show up unexpectedly.
โ€ข Some review platforms allow users to include geotags and timestamps with their reviews. Perpetrators could use this detailed location and time data to build a timeline of the victimโ€™s movements.
โ€ข Review sites often have social features that allow users to connect with friends or see othersโ€™ activity feeds. A perpetrator might use a fake profile to connect with the victimโ€™s account or to monitor their interactions with others.
โ€ข Perpetrators could engage with the victimโ€™s reviews either by commenting directly or by monitoring who interacts with the reviews. This could also be a way to emotionally manipulate or intimidate the victim.
โ€ข By analysing the patterns and frequency of reviews, a perpetrator might deduce the victimโ€™s schedule or upcoming plans.

To prevent such tracking, individuals should consider taking the following protective steps:

โ€ข Ensure that account privacy settings are configured to limit who can see your posts, reviews, or any personal information.
โ€ข Be cautious about what personal details are shared in reviews, including specific locations and times.
โ€ข Consider using a username that doesnโ€™t reveal your real identity.
โ€ข Keep online accounts secure by regularly updating passwords and enabling two-factor authentication.

If someone suspects they are being tracked or harassed through any online platform, it is advisable to collect evidence and report it to the platform and local authorities.

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.

27/05/2024

๐๐ก๐จ๐ญ๐จ ๐‹๐จ๐œ๐š๐ญ๐ข๐จ๐ง ๐ƒ๐ž๐ญ๐š๐ข๐ฅ๐ฌ.
Majority of smartphones and mobile devices now save basic information to each photo they take such as mode of the photo, shutter speed and of most concern the date and time of where the photo was taken and even provide you a map. Our mobile devices are automatically set to have geolocation turned on, and a lot of victims donโ€™t realise their phones are tracking them and storing their last location. When a location is tagged to a form of media such as a photo or video it is also known as โ€˜Geotaggingโ€™.

Frequently, the GPS functionality in these devices allow "geotagging" to be added to the exif data, meaning the photo's location is embedded in the photo. Without realising it, sending a photo to a friend or posting it online can expose incredibly private information about where you are. The same information can be found in videos too.

Such information could be used by a preparator in a Domestic Violence situation to potentially locate their victim who maybe in a safe location. Always be careful when sending screenshots, videos and other media as it may still have a location assigned to the file. A simple lapse of judgement of sending a photo through a trusted person such as a lawyer may reveal the location. Photo details such as the location, time and date can still remain on the photo even when forwarded to 3rd-party. This includes SMS, email, chat programs, dropboxes and other methods of file sharing.

Typically, you can find the details of the photo along with the location if itโ€™s been saved in the photos setting or properties information. To remove the โ€˜geotaggingโ€™ information from a photo file you can use a website such as www.verexif.com/en/

Always make sure you review your childrenโ€™s photos before they send them to a friend or family member.

If you are concerned about yourself, family members or friends please call 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.

21/05/2024

๐๐ž๐œ๐จ๐ฆ๐ข๐ง๐  ๐š ๐’๐ข๐ฅ๐ž๐ง๐ญ ๐•๐จ๐ญ๐ž๐ซ
At Protective Group we recommend that vulnerable members of the community and those whose safety would be at risk if their details were available on a public electoral register consider becoming a silent voter.

You can apply to be registered as a silent elector if you believe having your address included on the publicly available electoral roll could put you or your familyโ€™s safety at risk.
Silent enrolment means that a memberโ€™s address will not be shown on future editions of the electoral roll that is publicly available.

All applications for silent elector status are carefully considered by the AEC. If there are other family members enrolled at your address with the same family name, it is strongly recommended that they also become silent electors so that the address does not appear in association with your family name on the electoral roll. They must complete their own application for silent registration and can request silent status on the grounds that you have silent status.

๐–๐ก๐š๐ญ ๐ข๐ง๐Ÿ๐จ๐ซ๐ฆ๐š๐ญ๐ข๐จ๐ง ๐œ๐š๐ง ๐›๐ž ๐š๐œ๐œ๐ž๐ฌ๐ฌ๐ž๐ ๐จ๐ง ๐ฉ๐ฎ๐›๐ฅ๐ข๐œ ๐ž๐ฅ๐ž๐œ๐ญ๐จ๐ซ๐š๐ฅ ๐ซ๐ž๐ ๐ข๐ฌ๐ญ๐ž๐ซ?
โ€ข name
โ€ข address
โ€ข s*x
โ€ข date of birth
โ€ข occupation

๐–๐ก๐จ ๐œ๐š๐ง ๐š๐œ๐œ๐ž๐ฌ๐ฌ ๐š ๐ฉ๐ฎ๐›๐ฅ๐ข๐œ ๐ž๐ฅ๐ž๐œ๐ญ๐จ๐ซ๐š๐ฅ ๐ซ๐ž๐ ๐ข๐ฌ๐ญ๐ž๐ซ?
The electoral roll is not available for sale in any format.
Under the Commonwealth Electoral Act 1918, the electoral roll (containing names and addresses) can be access by:
โ€ข Members of parliament
โ€ข Political parties
โ€ข Approved medical researchers
โ€ข Public health programs
โ€ข State Police
โ€ข Other approved agencies from time to time

๐–๐ก๐š๐ญ ๐ฒ๐จ๐ฎ ๐ง๐ž๐ž๐ ๐ญ๐จ ๐›๐ž๐œ๐จ๐ฆ๐ž ๐š ๐ฌ๐ข๐ฅ๐ž๐ง๐ญ ๐ฏ๐จ๐ญ๐ž๐ซ.
In applying, the AEC asks for a statutory declaration explaining the risk to you or your family.
โ€ข To be enrolled at your current address
โ€ข To complete the application for silent elector registration
โ€ข To include a completed Statutory Declaration, and
โ€ข To provide either your Australian driver's licence, or Australian passport number
That application is then considered by the AEC and it ultimately decides whether silent status is granted.

๐๐จ๐ญ๐ž. You will need to remove yourself from your state or territory publicly available electoral roll and also the national electoral roll.

Remember in certain situations it is critical to remain as anonymous as possible, we encourage victims of violence to consider a range of precautions, including to consider registering as a Silent Elector with the Australian Electoral Commission (AEC).

Visit the AEC website to learn more about becoming a silent voter: https://formupload.aec.gov.au/Form?FormId=SilentEnrolment

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.

14/05/2024

๐๐ฅ๐š๐ง๐ง๐ข๐ง๐  ๐Ÿ๐จ๐ซ ๐ฎ๐ง๐ฌ๐ฎ๐ฉ๐ž๐ซ๐ฏ๐ข๐ฌ๐ž๐ ๐ฏ๐ข๐ฌ๐ข๐ญ๐ฌ.
If your children are required to spend time with your perpetrator it is imperative, you create a safety plan for them if you feel they may be at risk whilst being alone.

If your children are old enough, brainstorm with them to come up with ways that they can stay safe using the same model as you would for your own home. Help them identify where they can get to a phone, who they can contact, how they can leave the house, and where they can go.

If your child is of a mature age provide your children a mobile phone to be used in an emergency situation. Make sure the phone is a non-smartphone so the perpetrator is unable to install a tracking app or other malicious programs on the device. Ensure there is credit on the phone before leaving your children.

If possible, instruct your children to leave the home when situations begin to escalate and establish where they can go. Create a plan ahead of time with people who your children can turn to during a moment of crisis.
Have a code word for when to leave the house in an emergency and make sure they know not to tell others what the secret word means.

Instruct them to stay out of areas containing items that could be used to harm them, including kitchens and bathrooms.

Tips for concerned parent:
- Avoid exchanging custody at your home or your partnerโ€™s home. Meet in a safe, public place like a restaurant, store, or other area with visibility.
- Bring a trusted friend or family member with you to make exchanges, or have them make the exchange on your behalf.
- Find ways to schedule exchanges without interacting with your perpetrator.

Always remind your children that their safety comes first.
Belongings such as toys or games can be replaced.
If in danger tell them to leave if safe to do so and leave behind possessions to ensure a timely escape.

If the perpetrator provides a gift to the child, ask they leave it at their house. Increasingly perpetrators are using gifts such as toys, iPads and other devices to track the child back to their victim's location/home.

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.

10/05/2024

Last night Protective Group featured on The Project to discuss Technology Abuse and the lengths perpetrators go to when constantly monitoring their victims.

We see each day the perpetrator controls their victim and the physiological and emotional effects it has on the victim leading them to question themselves every minute of the day โ€œam I being watched, are they looking at me?โ€.

At Protective Group we find the use of Technology Abuse is prevalent in nine out of ten Domestic and Family Violence cases that are referred to us.

Technology Abuse isnโ€™t only prevalent when there is a breakdown in a personal relationship but can occur as normal abuse would, just not physical.

We thank Georgie Tunny and The Project for allowing Protective Group to share our daily struggle in disrupting Technology Abuse and keeping victims safe.

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.

08/05/2024

๐‹๐ข๐ฏ๐ข๐ง๐  ๐ข๐ง ๐š ๐ซ๐ฎ๐ซ๐š๐ฅ ๐š๐ซ๐ž๐š.
DV victims in regional, rural and remote areas are more likely than victims in urban areas to experience domestic and family violence.

Victims living in regional, rural and remote areas who experience domestic and family violence face specific issues related to their geographical location and the cultural and social characteristics of living in small communities.

A lack of privacy due to the high likelihood that police, health professionals and domestic and family violence workers know both the victim and perpetrator can inhibit victims' willingness to use local services.

If you live in a rural area or a small town, there are some extra things to keep in mind when creating a safety plan:
โ€ข If you call the police, get to a safe place to wait for them to arrive. You may want to go to the home of a trusted friend or neighbour, or to a public place you think is safe.
โ€ข If you decide to leave the perpetrator, think about leaving your area, at least for a little while. Think about it even if you get a protective order.
โ€ข Make a plan with a trusted friend who can give you a ride whenever you need one.
โ€ข See if your local police can help es**rt you out of the home to get to a safe place.
โ€ข Know where guns, knives, and other weapons are. If you can, lock them up or make them as hard to get to as possible. If you live in a country town or farming community the perpetrator may be more likely to have guns and other weapons in the home (or have access to them) than a perpetrator who lives in a city.
โ€ข If you have access to a car, try to always have a full tank of petrol in case you need to get to a far-away place in a hurry.
โ€ข Be aware of where neighbours live along the road in case you ever need to pull the car over and run to a neighbour for help.
โ€ข Be aware that the perpetrator and other people may know where the refuge is, do not let your guard down when entering and exiting the refuge.
โ€ข Think about going to a refuge outside of the area where you live, even if itโ€™s only for a little while.

If you suspect your friend or family member of suffering from domestic violence, offer to be on standby for their text or call.
Have your phone on and fully charged at all times and keep it on you. If you have a car and need to intervene immediately, make sure that the petrol tank is full.

If you are concerned about yourself, a loved one or family members please call 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.

06/05/2024

๐๐ž๐ญ ๐’๐š๐Ÿ๐ž๐ญ๐ฒ
If you have pets make sure they are part of your safety and escape plans. Planning for your loved onesโ€™ safety means planning for the safety of your pets.
If possible, ask a trusted friend or family member to take your animals before activating your escape plan- this isnโ€™t always possible as it may make the perpetrator suspicious of your plans and intentions.
While your personal safety should always be your first priority, itโ€™s important to consider how your pets fit into any plans you make to leave.

Pets in abusive situations often experience violence similarly to people. Often domestic violence victims are reluctant to escape abusive situations because theyโ€™re concerned about what will happen to their pets. Taking steps to ensure your petโ€™s protection will make it easier to bring them with you when the moment is right.

Consider the following when safety planning:

โœ”๏ธ Before leaving make sure your pets have no smart technology attached to them such as Apple AirTags
โœ”๏ธ Take steps to prove ownership of your pet
โœ”๏ธ If your pet is microchipped, make sure the perpetrator is not listed as a contact
โœ”๏ธ If youโ€™re planning to leave, talk to friends, family, or your vet about temporary care for your pet if necessary. In Victoria Safesteps can assist with interim housing and care for your pets
โœ”๏ธ Contact your local domestic violence service or animal shelter directly to see if the can assist in housing your pet for a short period of time
โœ”๏ธ If you decide to leave, bring extra provisions for your pets including food and medications
โœ”๏ธ If youโ€™re thinking about getting a protective order, find out if your state allows pets to be included in such orders
โœ”๏ธ After leaving, consider changing vets and avoid leaving pets outside alone to ensure their long-term safety

Always put your own safety first, if you are forced to leave without your pets and animals leave sufficient food and water for a couple of days until help can reach them.

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.

Demands for new laws to protect women from stalkerware 05/05/2024

In todayโ€™s Herald Sun newspaper, Protective Group Chief Operating Officer Tristan Wilson and CEO Stephen talk to Aneeka Simonis about our daily fight with Technology Abuse.

Every week our team see the prevalence and disturbing increase in the use of Technology Abuse in Domestic and Family violence situations.
While technology has many advantages, it can also be used as a tool for abuse. Some family violence perpetrators go to great lengths to locate, stalk and control their partners and families

Perpetrators have long used tech to spy on victims, but the advancement of technology has given them greater opportunities than ever before. Itโ€™s much easier to get access to a partnerโ€™s phone to alter privacy settings, obtain passwords, or install tracking software. Cheap and easy surveillance such as Apple Airtags and Hidden Cameraโ€™s allow victims to be tracked and watched at all times.

A simple Google search can reveal 100's of Mobile Apps that a perpetrator can download to a victimโ€™s phone to track their every move, and websites to purchase devices for illegal surveillance and harassment- something we find daily when searching cars and mobile devices.

We thank Aneeka Simonis from the Herald Sun newspaper for giving us the opportunity to raise awareness of Technology Abuse and our daily fight to disrupt it.

If you are concerned about yourself, family member or friend please call:

Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.

Demands for new laws to protect women from stalkerware Tracking of women through covert stalkerware is rampant in Victoria and new laws are needed to hold perpetrators to account, family violence experts say.

03/05/2024

๐€๐œ๐œ๐จ๐ฎ๐ง๐ญ ๐ซ๐ž๐œ๐จ๐ฏ๐ž๐ซ๐ฒ ๐ฆ๐ž๐ญ๐ก๐จ๐๐ฌ.
Everyday our team see perpetrators of Domestic and Family Violence take over their victimsโ€™ accounts as they have either likely set them up or changed them during the course of the relationship.
Keeping your account recovery methods up to date is crucial in todays technology world.
Ensuring your recovery methods are updated regularly is critical in ensuring your accounts are not easily taken over and the owner of the account locked out.

Here are the main reasons to ensure your account recovery methods need to be up to date:

โ€ข Should you forget your password or get locked out, current recovery information ensures you can regain access to your accounts swiftly
โ€ข Updated recovery details help protect against unauthorized access. For instance, if an old email no longer in use is linked to your account, someone else could take control of that old email and use it to reset your passwords
โ€ข Out-of-date recovery methods can result in the permanent loss of access to important accounts, such as email, banking, or social media, which might have significant personal or financial implications

For victims of Technology Abuse and Domestic Violence maintaining updated recovery methods for your accounts is particularly critical due to the unique risks involved:

โ€ข Evidence Preservation: Victims sometimes need to access their accounts to save or document evidence of abuse
โ€ข Quick Response: In situations where an abuser misuses account recovery options to take control, having updated and privately held recovery methods can help the victim quickly regain access and protect their information
โ€ข Control Over Personal Information: Updating recovery details hampers a perpetrators ability to alter account passwords, thus preventing further isolation
โ€ข Safety Planning: When preparing to leave an abusive situation secure access to personal accounts is essential

When experiencing Technology Abuse or Domestic Violence, it is crucial to treat digital security with the same priority as physical security.

If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.

01/05/2024

๐Œ๐š๐ฒ ๐ข๐ฌ ๐ƒ๐จ๐ฆ๐ž๐ฌ๐ญ๐ข๐œ ๐•๐ข๐จ๐ฅ๐ž๐ง๐œ๐ž ๐€๐ฐ๐š๐ซ๐ž๐ง๐ž๐ฌ๐ฌ ๐Œ๐จ๐ง๐ญ๐ก๐Ÿ’œ

Domestic Violence Awareness Month is a time for all of us to speak up about domestic violence, raise awareness, and support survivors of this devastating but common issue.

Domestic and Family Violence isnโ€™t always physical, it can be Financial, Emotional or Technology Abuse, there are many different forms of Domestic or Family Violence however they are all used to control a person and their actions.

Domestic violence can happen to anyone and it is present in every community, regardless of age, gender, s*xual orientation, race, socioeconomic status, religion, or nationality.

We are often at the beginning or the end of the cycle of support for victim survivors and there are many people that assist the victim before being referred to us. DV support services are one such service.
We say Thank You to all DV support services for your compassion, empathy and resolve in the daily fight against Domestic Violence.

If you are concerned about yourself, family member or friend please call 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.

Protective Group Learning Portal 30/04/2024

Protective Group are excited to announce the launch of our dedicated Victim Survivor Learning Portal. Educating you to protect your online footprint and digital eco-systems.

With over 150 courses and 1,200 lessons currently available our goal is to empower victims of Technology Abuse or those wishing to gain a better understanding of technology, account management and keeping their digital footprint safe.

Bringing our experience from the frontline we understand domestic and family violence, and we understand how perpetrators misuse technology.

Courses include our most commonly found issues such as compromised Apple IDโ€™s, Google Play Protect, Managing Location Permissions, Dangers of Google Photos and many more.

Access is offered free of charge post-appointment for all of our clients along with our printed Protective Group Tech Safety Guide.

Our Learning Portal can be found at: (https://learn.protectivegroup.com.au/)

Protective Group Learning Portal Our online training covers all aspects of technology awareness. We take you on a journey to secure your networks and devices, reduce risk and exposure to online predators and cyber bullies. We bring the user on the journey of how Technology Abuse happens and how to make sure you are not the next vic...

Want your business to be the top-listed Business in Melbourne?
Click here to claim your Sponsored Listing.

Our story.

Protective Group is a premium provider of proven professional services for vulnerable people. We work to disrupt family and domestic violence, and abuse facilitated via technology. We then use technology to enhance safety. Our โ€˜end to endโ€™ services are personalised to individual circumstance and focus on reducing further risk and optimising safety. We provide our clients with enhanced safety and peace of mind, tailoring interventions to meet their needs. Since 2016 we have partnered with The Salvation Army Australia to deliver services to the Commonwealth government funded Safer in the Home program across Australia, reaching thousands of women and children in metropolitan, regional and rural areas. Our in demand and unique Tek Assure service has successfully worked with hundreds of clients intervening to disrupt technology facilitated abuse and implementing measures to keep them safe from further abuse via this medium. We provide services to individuals and organisations, including not for profits, businesses, education, government and legal firms across Australia.

Videos (show all)

Last night Protective Group CEO Stephen Wilson talked to Channel 7 News about the disturbing ways domestic violence offe...
Last night Protective Group featured on The Project to discuss Technology Abuse and the lengths perpetrators go to when ...
Last night Protective Group talked to Channel 9 News about the Apple AirTag and how an innocent device can be turned sin...
Last night Protective Group featured on Channel 9 news. We shared our thoughts on yesterdayโ€™s welcome announcement of ad...
๐“๐ž๐œ๐ก๐ง๐จ๐ฅ๐จ๐ ๐ฒ ๐€๐›๐ฎ๐ฌ๐ž ๐š๐ง๐ ๐€๐ฉ๐ฉ๐ฅ๐ž ๐€๐ข๐ซ ๐“๐š๐ ๐ฌ- ๐“๐จ๐ง๐ข๐ ๐ก๐ญ ๐Ÿ•๐ฉ๐ฆ- ๐‚๐ก๐š๐ง๐ง๐ž๐ฅ ๐Ÿ—Tonight we talk to 'A Current Affair' about the new Apple Air...
Tonight is the final episode of โ€˜See What You Made Me Doโ€™. The three-part series that has brought to loungeroom screens ...

Telephone

Address


18B/75 Lorimer Street, Docklands
Melbourne, VIC
3008

Other Business Services in Melbourne (show all)
Astute Payroll Astute Payroll
Level 10, 440 Collins Street
Melbourne, 3001

Providing the recruitment industry with simple and effective back office solutions and outsourced pa

Augusta Jane Photography Augusta Jane Photography
Melbourne, 3188

Augusta is passionate about photography. Every image tells a story....What will yours be?

Myguestlist Myguestlist
Global
Melbourne

A powerful marketing automation and events management tool for the modern marketer. www.myguestlist.

AKA Virtual PA AKA Virtual PA
PO Box 5305
Melbourne, 3195

Australian Virtual Assistant | Social Media | Association Management | Internet Marketing www.akavir

Brunswick Business Incubator Brunswick Business Incubator
420 Victoria Street, Brunswick
Melbourne

The home of entrepreneurs 420 Victoria Street, Brunswick, Victoria, AUS (03) 9940 1444 info@brunsw

AGdesign AGdesign
Luvlygrafix@yahoo. Com
Melbourne, 3132

ANGELA GALL - Graphic Design I'm a freelance Graphic Designer with over 10 years experience in the Design & Printing industry.

Studio Legal Studio Legal
Level 1, 105 High Street
Melbourne, 3181

Weโ€™re a studio of lawyers inspired by those who dare to dream, make and create big.

Heath's Window Cleaning Heath's Window Cleaning
Earlsfield Road
Melbourne, 3188

Window Cleaning, Gutter Cleaning & Pressure Washing

Bear & Duck Bear & Duck
Melbourne, 3000

Bear & Duck is an online retailer that offers its members luxury manchester products without the platinum price tag. We also deliver your orders FREE OF CHARGE, anywhere in Austra...

Zelo Group Zelo Group
Aquavista Tower, 1125 401 Docklands Drive, Docklands
Melbourne, 3008

Keyless, hands-free, automated, integrated โ€“ our ever-growing range of services allows us to tailo

Belinda Jane Video Productions Belinda Jane Video Productions
350 Baxter-Tooradin Road, Baxter
Melbourne, 3911

Belinda Jane Video Productions is a small business offering that personal level of service that you

Funktion Australia Pty Ltd Funktion Australia Pty Ltd
5 Phoenix Court
Melbourne, 3195

Funktion Australia is one of Australia's leading suppliers of thermal coding and printing Solutions