Protective Group
Nearby businesses
City Road, South Melbourne
Wilson Street South Yarra
Market Street
Market Street
Cochranes Road, Kingston
Drummond Street
Market Street
Cecil Street
We specialise in providing safety and security solutions to the most vulnerable people and organisations.
๐๐ ๐๐๐๐ซ๐๐ฌ๐ฌ.
Perpetrators will use any information they can obtain to try and track and locate their victims, particularly in the days after their victim may have left or actioned their escape plan.
Often perpetrators will use an IP address which can provide a general idea of a user's geographic location, such as the city or region, but it typically will not give an exact address.
However, there are exceptions, especially in a domestic violence situation where more precise location information might be determined if the perpetrator has certain technical skills or resources.
In scenarios involving domestic violence, it's vital to be aware of the following:
โข Online databases associate IP addresses with locations. They are not typically exact but can sometimes provide specific information such as a suburb.
โข Some websites and services track and record IP addresses for various purposes. A perpetrator with access to this information, either from the site or directly from a network device, could make educated guesses about a person's location.
โข With proper legal authorization, such as a court order, law enforcement may be able to compel internet service providers to release information that can be used to find an individual's exact location.
How to hide or โmaskโ your IP address:
โข Use a VPN or Tor: To hide your real IP address, consider using a Virtual Private Network (VPN) or The Onion Router (Tor). These tools mask your IP, making it more difficult to track your activities back to a physical location.
โข Check Device Permissions: Ensure that no unwanted tracking apps have been installed on your device and that location permissions are only given to trusted applications.
Smartphones and many apps report location data more accurately than just an IP.
If a perpetrator has installed spyware or has access to login credentials, they could potentially track a device's location via these means.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
๐๐ข๐ ๐ฒ๐จ๐ฎ ๐ค๐ง๐จ๐ฐ?
Protective Group offers free in-person on-site training and awareness sessions to referral services, support organisations, Police and Victim Survivors.
Bringing our experience from the frontline we understand domestic and family violence, and we understand how perpetrators misuse technology. We have conducted over 20,000 on-site technology assessments giving the victims confidence to live a life free from tech abuse.
A victim should never be forced to factory reset their phone, be told to purchase a new device, be forced to speak outside their home at the fear of hidden cameras inside or limit their car movements at fear of the perpetrator knowing where they are.
Our training will allow you to assist in identifying tech abuse and understand how to allow the victim to regain control of their digital eco-systems and not be told to โjust factory reset your phoneโ.
Sessions can be facilitated online or in-person.
We offer the following training and awareness sessions:
- Tech Abuse Awareness
- Identifying Tech Abuse
- Technology Safety Tips
- Victim Survivor Tech Abuse Training (For Victim Survivors)
We are also pleased to announce that we have added a new course for Police, Magistrates and Police Liaison Officers where we discuss the following topics that those attending experience on a daily basis:
- The types of tech considered for varying types of risk and abuse
- Tips and info to talk to users about obtaining as evidence for court matters
- Presentations or early signs that may indicate tech abuse
- Types of tech safety available
Our training team have also added new dates for July and August.
Please visit https://calendly.com/protectivegroup to learn more about our free training sessions and secure a time for your organisation and team.
Last night Protective Group CEO Stephen Wilson talked to Channel 7 News about the disturbing ways domestic violence offenders are using technology to control and harass their victims and how innocent devices can be turned sinister.
Even the most inconspicuous devices are often used: baby monitors being pre-programmed to listen to their victim, controlling home Wi-Fi networks to turn on music at 3am in the morning or turning the heating on at the highest temperature.
Protective Group weekly locate tracking tiles and other Bluetooth enabled devices such as the Apple AirTag. Tracking tiles have been readily available for years- a small device that works very similar to Appleโs well known โTrack my iPhoneโ program.
Such tiles/tags present a significant risk as perpetrators, disgruntled work colleagues, anyone with ill-intentions can place one of these in a victimโs car or belongings (handbag) and it doesnโt require the perpetrator to be in proximity to locate the tracking tile.
Another concern is the ability to conceal these devices as they are magnetic- A perpetrator could easily attach these to a petrol cap and underneath a car with ease.
The violence isn't always physical, but the intent is always the same- control their victim and their movements.
We thank Channel 7 News and James Carmody for allowing us to share our thoughts.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.
๐๐๐ฆ๐จ๐ญ๐ ๐๐จ๐ฆ๐ฉ๐ฎ๐ญ๐๐ซ ๐๐๐๐๐ฌ๐ฌ.
Victims of Domestic and Family Violence often have remote access software installed on their PC and Apple, Laptops and Desktop computers, often being installed by their perpetrator.
Once remote access is installed the perpetrator is able to connect to and control a computer from a remote location over a network or the internet.
This technology enables a perpetrator to access files, applications, and resources on a computer as if they were physically present at the machine.
If you suspect that someone has gained remote access to your computer there are some signs and steps you can take to investigate and secure your device:
โข Check for Remote Access Software: Look for any remote desktop applications that you did not install, such as TeamViewer, AnyDesk, GoToMyPC, Chrome Remote Desktop, or others.
โข Review Installed Programs: Go through the list of installed programs on your computer and look for anything unfamiliar or suspicious. You can usually do this through the Control Panel on Windows or the Applications folder on macOS.
โข Monitor Active Connections:
โข On Windows, you can use the Task Manager (Ctrl + Shift + Esc) to see if there are any unknown active connections. Go to the "Performance" tab and then open "Resource Monitor" to see network activity.
โข On macOS, you can use the Activity Monitor found in the Utilities folder. Check the "Network" tab for unusual activity.
โข Examine Startup Items: Check your device's startup items to see if any unfamiliar programs are set to run when the computer boots. These could potentially be remote access tools set up to start automatically.
โข Keep Your Computer's Security Updated: Make sure your antivirus software is up to date and consider running a scan to detect any malicious software.
If you are unable to remove remote access software capabilities, then refrain from using the computer until you are confident that it is safe again. Use a safe device in the interim such as a library computer.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.
๐๐จ๐จ๐ ๐ฅ๐ ๐๐๐ฏ๐ข๐๐ฐ๐ฌ.
We are seeing a disturbing increase in the use of perpetrators using Google and other review sites to track or harm their victims. This generally involves exploiting publicly available information that the victim may unknowingly share.
A perpetrator could monitor their victim's activity on Google Reviews to see which places they are reviewing, which can give clues about their routines and frequent locations.
Know what you post and how you post:
โข By monitoring reviews posted by the victim, a perpetrator can gather information about their frequented locations, their routines, and even their preferences. This information might be used to predict where they might go next or to show up unexpectedly.
โข Some review platforms allow users to include geotags and timestamps with their reviews. Perpetrators could use this detailed location and time data to build a timeline of the victimโs movements.
โข Review sites often have social features that allow users to connect with friends or see othersโ activity feeds. A perpetrator might use a fake profile to connect with the victimโs account or to monitor their interactions with others.
โข Perpetrators could engage with the victimโs reviews either by commenting directly or by monitoring who interacts with the reviews. This could also be a way to emotionally manipulate or intimidate the victim.
โข By analysing the patterns and frequency of reviews, a perpetrator might deduce the victimโs schedule or upcoming plans.
To prevent such tracking, individuals should consider taking the following protective steps:
โข Ensure that account privacy settings are configured to limit who can see your posts, reviews, or any personal information.
โข Be cautious about what personal details are shared in reviews, including specific locations and times.
โข Consider using a username that doesnโt reveal your real identity.
โข Keep online accounts secure by regularly updating passwords and enabling two-factor authentication.
If someone suspects they are being tracked or harassed through any online platform, it is advisable to collect evidence and report it to the platform and local authorities.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.
๐๐ก๐จ๐ญ๐จ ๐๐จ๐๐๐ญ๐ข๐จ๐ง ๐๐๐ญ๐๐ข๐ฅ๐ฌ.
Majority of smartphones and mobile devices now save basic information to each photo they take such as mode of the photo, shutter speed and of most concern the date and time of where the photo was taken and even provide you a map. Our mobile devices are automatically set to have geolocation turned on, and a lot of victims donโt realise their phones are tracking them and storing their last location. When a location is tagged to a form of media such as a photo or video it is also known as โGeotaggingโ.
Frequently, the GPS functionality in these devices allow "geotagging" to be added to the exif data, meaning the photo's location is embedded in the photo. Without realising it, sending a photo to a friend or posting it online can expose incredibly private information about where you are. The same information can be found in videos too.
Such information could be used by a preparator in a Domestic Violence situation to potentially locate their victim who maybe in a safe location. Always be careful when sending screenshots, videos and other media as it may still have a location assigned to the file. A simple lapse of judgement of sending a photo through a trusted person such as a lawyer may reveal the location. Photo details such as the location, time and date can still remain on the photo even when forwarded to 3rd-party. This includes SMS, email, chat programs, dropboxes and other methods of file sharing.
Typically, you can find the details of the photo along with the location if itโs been saved in the photos setting or properties information. To remove the โgeotaggingโ information from a photo file you can use a website such as www.verexif.com/en/
Always make sure you review your childrenโs photos before they send them to a friend or family member.
If you are concerned about yourself, family members or friends please call 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
๐๐๐๐จ๐ฆ๐ข๐ง๐ ๐ ๐๐ข๐ฅ๐๐ง๐ญ ๐๐จ๐ญ๐๐ซ
At Protective Group we recommend that vulnerable members of the community and those whose safety would be at risk if their details were available on a public electoral register consider becoming a silent voter.
You can apply to be registered as a silent elector if you believe having your address included on the publicly available electoral roll could put you or your familyโs safety at risk.
Silent enrolment means that a memberโs address will not be shown on future editions of the electoral roll that is publicly available.
All applications for silent elector status are carefully considered by the AEC. If there are other family members enrolled at your address with the same family name, it is strongly recommended that they also become silent electors so that the address does not appear in association with your family name on the electoral roll. They must complete their own application for silent registration and can request silent status on the grounds that you have silent status.
๐๐ก๐๐ญ ๐ข๐ง๐๐จ๐ซ๐ฆ๐๐ญ๐ข๐จ๐ง ๐๐๐ง ๐๐ ๐๐๐๐๐ฌ๐ฌ๐๐ ๐จ๐ง ๐ฉ๐ฎ๐๐ฅ๐ข๐ ๐๐ฅ๐๐๐ญ๐จ๐ซ๐๐ฅ ๐ซ๐๐ ๐ข๐ฌ๐ญ๐๐ซ?
โข name
โข address
โข s*x
โข date of birth
โข occupation
๐๐ก๐จ ๐๐๐ง ๐๐๐๐๐ฌ๐ฌ ๐ ๐ฉ๐ฎ๐๐ฅ๐ข๐ ๐๐ฅ๐๐๐ญ๐จ๐ซ๐๐ฅ ๐ซ๐๐ ๐ข๐ฌ๐ญ๐๐ซ?
The electoral roll is not available for sale in any format.
Under the Commonwealth Electoral Act 1918, the electoral roll (containing names and addresses) can be access by:
โข Members of parliament
โข Political parties
โข Approved medical researchers
โข Public health programs
โข State Police
โข Other approved agencies from time to time
๐๐ก๐๐ญ ๐ฒ๐จ๐ฎ ๐ง๐๐๐ ๐ญ๐จ ๐๐๐๐จ๐ฆ๐ ๐ ๐ฌ๐ข๐ฅ๐๐ง๐ญ ๐ฏ๐จ๐ญ๐๐ซ.
In applying, the AEC asks for a statutory declaration explaining the risk to you or your family.
โข To be enrolled at your current address
โข To complete the application for silent elector registration
โข To include a completed Statutory Declaration, and
โข To provide either your Australian driver's licence, or Australian passport number
That application is then considered by the AEC and it ultimately decides whether silent status is granted.
๐๐จ๐ญ๐. You will need to remove yourself from your state or territory publicly available electoral roll and also the national electoral roll.
Remember in certain situations it is critical to remain as anonymous as possible, we encourage victims of violence to consider a range of precautions, including to consider registering as a Silent Elector with the Australian Electoral Commission (AEC).
Visit the AEC website to learn more about becoming a silent voter: https://formupload.aec.gov.au/Form?FormId=SilentEnrolment
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.
๐๐ฅ๐๐ง๐ง๐ข๐ง๐ ๐๐จ๐ซ ๐ฎ๐ง๐ฌ๐ฎ๐ฉ๐๐ซ๐ฏ๐ข๐ฌ๐๐ ๐ฏ๐ข๐ฌ๐ข๐ญ๐ฌ.
If your children are required to spend time with your perpetrator it is imperative, you create a safety plan for them if you feel they may be at risk whilst being alone.
If your children are old enough, brainstorm with them to come up with ways that they can stay safe using the same model as you would for your own home. Help them identify where they can get to a phone, who they can contact, how they can leave the house, and where they can go.
If your child is of a mature age provide your children a mobile phone to be used in an emergency situation. Make sure the phone is a non-smartphone so the perpetrator is unable to install a tracking app or other malicious programs on the device. Ensure there is credit on the phone before leaving your children.
If possible, instruct your children to leave the home when situations begin to escalate and establish where they can go. Create a plan ahead of time with people who your children can turn to during a moment of crisis.
Have a code word for when to leave the house in an emergency and make sure they know not to tell others what the secret word means.
Instruct them to stay out of areas containing items that could be used to harm them, including kitchens and bathrooms.
Tips for concerned parent:
- Avoid exchanging custody at your home or your partnerโs home. Meet in a safe, public place like a restaurant, store, or other area with visibility.
- Bring a trusted friend or family member with you to make exchanges, or have them make the exchange on your behalf.
- Find ways to schedule exchanges without interacting with your perpetrator.
Always remind your children that their safety comes first.
Belongings such as toys or games can be replaced.
If in danger tell them to leave if safe to do so and leave behind possessions to ensure a timely escape.
If the perpetrator provides a gift to the child, ask they leave it at their house. Increasingly perpetrators are using gifts such as toys, iPads and other devices to track the child back to their victim's location/home.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.
Last night Protective Group featured on The Project to discuss Technology Abuse and the lengths perpetrators go to when constantly monitoring their victims.
We see each day the perpetrator controls their victim and the physiological and emotional effects it has on the victim leading them to question themselves every minute of the day โam I being watched, are they looking at me?โ.
At Protective Group we find the use of Technology Abuse is prevalent in nine out of ten Domestic and Family Violence cases that are referred to us.
Technology Abuse isnโt only prevalent when there is a breakdown in a personal relationship but can occur as normal abuse would, just not physical.
We thank Georgie Tunny and The Project for allowing Protective Group to share our daily struggle in disrupting Technology Abuse and keeping victims safe.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.
๐๐ข๐ฏ๐ข๐ง๐ ๐ข๐ง ๐ ๐ซ๐ฎ๐ซ๐๐ฅ ๐๐ซ๐๐.
DV victims in regional, rural and remote areas are more likely than victims in urban areas to experience domestic and family violence.
Victims living in regional, rural and remote areas who experience domestic and family violence face specific issues related to their geographical location and the cultural and social characteristics of living in small communities.
A lack of privacy due to the high likelihood that police, health professionals and domestic and family violence workers know both the victim and perpetrator can inhibit victims' willingness to use local services.
If you live in a rural area or a small town, there are some extra things to keep in mind when creating a safety plan:
โข If you call the police, get to a safe place to wait for them to arrive. You may want to go to the home of a trusted friend or neighbour, or to a public place you think is safe.
โข If you decide to leave the perpetrator, think about leaving your area, at least for a little while. Think about it even if you get a protective order.
โข Make a plan with a trusted friend who can give you a ride whenever you need one.
โข See if your local police can help es**rt you out of the home to get to a safe place.
โข Know where guns, knives, and other weapons are. If you can, lock them up or make them as hard to get to as possible. If you live in a country town or farming community the perpetrator may be more likely to have guns and other weapons in the home (or have access to them) than a perpetrator who lives in a city.
โข If you have access to a car, try to always have a full tank of petrol in case you need to get to a far-away place in a hurry.
โข Be aware of where neighbours live along the road in case you ever need to pull the car over and run to a neighbour for help.
โข Be aware that the perpetrator and other people may know where the refuge is, do not let your guard down when entering and exiting the refuge.
โข Think about going to a refuge outside of the area where you live, even if itโs only for a little while.
If you suspect your friend or family member of suffering from domestic violence, offer to be on standby for their text or call.
Have your phone on and fully charged at all times and keep it on you. If you have a car and need to intervene immediately, make sure that the petrol tank is full.
If you are concerned about yourself, a loved one or family members please call 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
๐๐๐ญ ๐๐๐๐๐ญ๐ฒ
If you have pets make sure they are part of your safety and escape plans. Planning for your loved onesโ safety means planning for the safety of your pets.
If possible, ask a trusted friend or family member to take your animals before activating your escape plan- this isnโt always possible as it may make the perpetrator suspicious of your plans and intentions.
While your personal safety should always be your first priority, itโs important to consider how your pets fit into any plans you make to leave.
Pets in abusive situations often experience violence similarly to people. Often domestic violence victims are reluctant to escape abusive situations because theyโre concerned about what will happen to their pets. Taking steps to ensure your petโs protection will make it easier to bring them with you when the moment is right.
Consider the following when safety planning:
โ๏ธ Before leaving make sure your pets have no smart technology attached to them such as Apple AirTags
โ๏ธ Take steps to prove ownership of your pet
โ๏ธ If your pet is microchipped, make sure the perpetrator is not listed as a contact
โ๏ธ If youโre planning to leave, talk to friends, family, or your vet about temporary care for your pet if necessary. In Victoria Safesteps can assist with interim housing and care for your pets
โ๏ธ Contact your local domestic violence service or animal shelter directly to see if the can assist in housing your pet for a short period of time
โ๏ธ If you decide to leave, bring extra provisions for your pets including food and medications
โ๏ธ If youโre thinking about getting a protective order, find out if your state allows pets to be included in such orders
โ๏ธ After leaving, consider changing vets and avoid leaving pets outside alone to ensure their long-term safety
Always put your own safety first, if you are forced to leave without your pets and animals leave sufficient food and water for a couple of days until help can reach them.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
In todayโs Herald Sun newspaper, Protective Group Chief Operating Officer Tristan Wilson and CEO Stephen talk to Aneeka Simonis about our daily fight with Technology Abuse.
Every week our team see the prevalence and disturbing increase in the use of Technology Abuse in Domestic and Family violence situations.
While technology has many advantages, it can also be used as a tool for abuse. Some family violence perpetrators go to great lengths to locate, stalk and control their partners and families
Perpetrators have long used tech to spy on victims, but the advancement of technology has given them greater opportunities than ever before. Itโs much easier to get access to a partnerโs phone to alter privacy settings, obtain passwords, or install tracking software. Cheap and easy surveillance such as Apple Airtags and Hidden Cameraโs allow victims to be tracked and watched at all times.
A simple Google search can reveal 100's of Mobile Apps that a perpetrator can download to a victimโs phone to track their every move, and websites to purchase devices for illegal surveillance and harassment- something we find daily when searching cars and mobile devices.
We thank Aneeka Simonis from the Herald Sun newspaper for giving us the opportunity to raise awareness of Technology Abuse and our daily fight to disrupt it.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
New Zealand: 0800 733 843 or if in danger now call 111.
Demands for new laws to protect women from stalkerware Tracking of women through covert stalkerware is rampant in Victoria and new laws are needed to hold perpetrators to account, family violence experts say.
๐๐๐๐จ๐ฎ๐ง๐ญ ๐ซ๐๐๐จ๐ฏ๐๐ซ๐ฒ ๐ฆ๐๐ญ๐ก๐จ๐๐ฌ.
Everyday our team see perpetrators of Domestic and Family Violence take over their victimsโ accounts as they have either likely set them up or changed them during the course of the relationship.
Keeping your account recovery methods up to date is crucial in todays technology world.
Ensuring your recovery methods are updated regularly is critical in ensuring your accounts are not easily taken over and the owner of the account locked out.
Here are the main reasons to ensure your account recovery methods need to be up to date:
โข Should you forget your password or get locked out, current recovery information ensures you can regain access to your accounts swiftly
โข Updated recovery details help protect against unauthorized access. For instance, if an old email no longer in use is linked to your account, someone else could take control of that old email and use it to reset your passwords
โข Out-of-date recovery methods can result in the permanent loss of access to important accounts, such as email, banking, or social media, which might have significant personal or financial implications
For victims of Technology Abuse and Domestic Violence maintaining updated recovery methods for your accounts is particularly critical due to the unique risks involved:
โข Evidence Preservation: Victims sometimes need to access their accounts to save or document evidence of abuse
โข Quick Response: In situations where an abuser misuses account recovery options to take control, having updated and privately held recovery methods can help the victim quickly regain access and protect their information
โข Control Over Personal Information: Updating recovery details hampers a perpetrators ability to alter account passwords, thus preventing further isolation
โข Safety Planning: When preparing to leave an abusive situation secure access to personal accounts is essential
When experiencing Technology Abuse or Domestic Violence, it is crucial to treat digital security with the same priority as physical security.
If you are concerned about yourself, family member or friend please call:
Australia: 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
๐๐๐ฒ ๐ข๐ฌ ๐๐จ๐ฆ๐๐ฌ๐ญ๐ข๐ ๐๐ข๐จ๐ฅ๐๐ง๐๐ ๐๐ฐ๐๐ซ๐๐ง๐๐ฌ๐ฌ ๐๐จ๐ง๐ญ๐ก๐
Domestic Violence Awareness Month is a time for all of us to speak up about domestic violence, raise awareness, and support survivors of this devastating but common issue.
Domestic and Family Violence isnโt always physical, it can be Financial, Emotional or Technology Abuse, there are many different forms of Domestic or Family Violence however they are all used to control a person and their actions.
Domestic violence can happen to anyone and it is present in every community, regardless of age, gender, s*xual orientation, race, socioeconomic status, religion, or nationality.
We are often at the beginning or the end of the cycle of support for victim survivors and there are many people that assist the victim before being referred to us. DV support services are one such service.
We say Thank You to all DV support services for your compassion, empathy and resolve in the daily fight against Domestic Violence.
If you are concerned about yourself, family member or friend please call 1800 RESPECT (1800 737 732) for support services or if in danger now call 000.
Protective Group are excited to announce the launch of our dedicated Victim Survivor Learning Portal. Educating you to protect your online footprint and digital eco-systems.
With over 150 courses and 1,200 lessons currently available our goal is to empower victims of Technology Abuse or those wishing to gain a better understanding of technology, account management and keeping their digital footprint safe.
Bringing our experience from the frontline we understand domestic and family violence, and we understand how perpetrators misuse technology.
Courses include our most commonly found issues such as compromised Apple IDโs, Google Play Protect, Managing Location Permissions, Dangers of Google Photos and many more.
Access is offered free of charge post-appointment for all of our clients along with our printed Protective Group Tech Safety Guide.
Our Learning Portal can be found at: (https://learn.protectivegroup.com.au/)
Protective Group Learning Portal Our online training covers all aspects of technology awareness. We take you on a journey to secure your networks and devices, reduce risk and exposure to online predators and cyber bullies. We bring the user on the journey of how Technology Abuse happens and how to make sure you are not the next vic...
Click here to claim your Sponsored Listing.
Our story.
Protective Group is a premium provider of proven professional services for vulnerable people. We work to disrupt family and domestic violence, and abuse facilitated via technology. We then use technology to enhance safety. Our โend to endโ services are personalised to individual circumstance and focus on reducing further risk and optimising safety. We provide our clients with enhanced safety and peace of mind, tailoring interventions to meet their needs. Since 2016 we have partnered with The Salvation Army Australia to deliver services to the Commonwealth government funded Safer in the Home program across Australia, reaching thousands of women and children in metropolitan, regional and rural areas. Our in demand and unique Tek Assure service has successfully worked with hundreds of clients intervening to disrupt technology facilitated abuse and implementing measures to keep them safe from further abuse via this medium. We provide services to individuals and organisations, including not for profits, businesses, education, government and legal firms across Australia.
Videos (show all)
Category
Contact the business
Telephone
Address
18B/75 Lorimer Street, Docklands
Melbourne, VIC
3008
Level 10, 440 Collins Street
Melbourne, 3001
Providing the recruitment industry with simple and effective back office solutions and outsourced pa
Melbourne, 3188
Augusta is passionate about photography. Every image tells a story....What will yours be?
Global
Melbourne
A powerful marketing automation and events management tool for the modern marketer. www.myguestlist.
PO Box 5305
Melbourne, 3195
Australian Virtual Assistant | Social Media | Association Management | Internet Marketing www.akavir
420 Victoria Street, Brunswick
Melbourne
The home of entrepreneurs 420 Victoria Street, Brunswick, Victoria, AUS (03) 9940 1444 info@brunsw
Luvlygrafix@yahoo. Com
Melbourne, 3132
ANGELA GALL - Graphic Design I'm a freelance Graphic Designer with over 10 years experience in the Design & Printing industry.
Level 1, 105 High Street
Melbourne, 3181
Weโre a studio of lawyers inspired by those who dare to dream, make and create big.
Earlsfield Road
Melbourne, 3188
Window Cleaning, Gutter Cleaning & Pressure Washing
Melbourne, 3000
Bear & Duck is an online retailer that offers its members luxury manchester products without the platinum price tag. We also deliver your orders FREE OF CHARGE, anywhere in Austra...
Aquavista Tower, 1125 401 Docklands Drive, Docklands
Melbourne, 3008
Keyless, hands-free, automated, integrated โ our ever-growing range of services allows us to tailo
350 Baxter-Tooradin Road, Baxter
Melbourne, 3911
Belinda Jane Video Productions is a small business offering that personal level of service that you
5 Phoenix Court
Melbourne, 3195
Funktion Australia is one of Australia's leading suppliers of thermal coding and printing Solutions