Employment & Due Diligence Background Checks

Cybersecurity Consultations & Proactive Products

Global Security & Investigations

XG Consultants Group is a proud Chubb partner and expert service provider for individuals and firms in need of pre-employment background checks, due diligence screenings, cybersecurity consultations and investigative services. From conducting a basic background check on a nanny or personal assistant, to conducting a home security assessment or providing event security, to implementing a cybersecurity monitoring tool to mitigate security issues caused by employees, let XG help protect your integrity and securely walk you through the process from beginning to end.

Chubb logo
XG Consultants Group logo

What is included in a
Chubb Background Check:

  • Address History/Alias History

A search to identify prior addresses, aliases, and social security number, to ensure that it verifies the state and year of issuance. The SSN is verified with the Social Security Administration and other databases to provide insight into possible additional counties that might require further investigation.

Please note that Address/Alias history information is not recorded in the final report as it is not considered FCRA compliant material. However, this information is still used by XG to determine all jurisdictions and other aliases necessary to be searched

  • Civil Court Search – County Upper & Lower*

Based on the subject’s residential history, a civil records search is conducted in each county where the subject resided. Civil record results typically provide the case type, the amount sought, and any disposition found. Civil recordings are typically classified by the amount of money sought by the plaintiff. Civil records typically do not contain a subject’s date of birth or social security number.

*Searches are performed by researchers dispatched to the court unless we are connected directly to the court’s records via the internet. Some records found may not contain complete identifiable information on the subject. Further investigations can be made available upon request to fully identify the subject of the record. Additional charges will apply.

Searches will not be conducted in all specialized local courts in every county that the subject has history in. Such information can be obtained at your written request. Additional charges will apply.

  • Civil Court Search – Federal*

A Transunion credit report is conducted on the subject with their consent. This search includes civil and bankruptcy records.

*Some records found may not contain complete identifiable information on the subject. Further investigations can be made available upon request to fully identify the subject of the record. Additional charges will apply.

  • Credit Report*

A Transunion credit report is conducted on the subject with their consent. This search includes credit history, past due amounts, address comparison, and repository remarks.

*Requires acknowledgement, disclosure, and authorization form to be filled out by the subject.

  • Criminal Court Search – County Upper & Lower*

Based on the subject’s residential history, a felony and misdemeanor search will be conducted in each county where the subject has resided. This search is conducted in the courthouse in “real time”. When a record is found, we will provide full case information including case number, date of offense, level of offense, charge description, dispositions, and identifiers as they appear in the court dockets.

*Searches are performed by researchers dispatched to the court unless we are connected directly to the court’s records via the internet. Some records found may not contain complete identifiable information on the subject. Further investigations can be made available upon request to fully identify the subject of the record. Additional charges will apply

  • Criminal Court Search – Federal*

A search of Federal records that includes cases where the U.S. government is the plaintiff or where the case crosses state lines. This search includes criminal and bankruptcy records.

*Some records found may not contain complete identifiable information on the subject. Further investigations can be made available upon request to fully identify the subject of the record. Additional charges will apply.

  • Drug Screening*

10-Panel or 5-Panel (Dependent on location /availability. Cannabinoid tests can be removed.)


10- Panel test: Amphetamines, Cocaine, Cannabinoids, Opiate, PCP, Barbiturate, Benzodiazepine, Methadone, Oxycodone,  Ecstasy.

*Requires acknowledgement, disclosure, and authorization form to be filled out by the subject.

  • Education Verification*

A verification of a subject’s education history. The search provides confirmation and/or details on dates of attendance, graduation date, degree(s) received, and major areas of study.

*Requires acknowledgement, disclosure, and authorization form to be filled out by the subject.

  • Employment Verification

A verification of the subject’s employment history. The search provides dates of employment, job title, and reason for leaving. If available, we can also obtain more pertinent job information based on your individual or business needs.

  • Sex Offender Search

A name search through various National Sex Offender Databases.

  • DMV Search*

A driver’s license verification with driving history results. This will provide accidents, violations, and/or suspensions. The search scope for DMV history records varies by state.

*NH, PA, PR, and WA require acknowledgement, disclosure, and authorization forms to be filled out by the subject.

  • Media Search (1-hour search)

Social media findings are located based on the information provided by the subject/entity or client, as well as through targeted keyword searches, algorithms, and public and private database searches. These methods are designed to locate both innocuous information as well as potentially criminal, controversial, or otherwise noteworthy content. Key findings will be highlighted along with links, screenshots, a list of social media profiles, name match results, and a comprehensive report summary. Our media analysts can conduct as little as 1-hour searches to unlimited searches. We can tailor our searches to align with your specific individual or business needs.

  • Professional Licensing Verification

This search verifies any professional licenses and certifications held by the subject and will provide any sanctions records relating to such licenses. The search will provide records on accuracy of the subject’s license, any disciplinary actions taken, date of issue, expiration dates, and status of license.

Additional fees will apply for additional name searches or verifications. Please contact us for more information.


Request a Background Check or Cybersecurity Consultation

Cybersecurity Services & Products

XG Consultants Group can help you mitigate your cybersecurity risk by addressing immediate threats, implementing proactive monitoring tools, and sharing best practices to prevent cyber issues from occurring in the future. We are dedicated to human capital risk management. Our goal is to merge human processes and data intelligence seamlessly. We strive to bring clarity and trust that is much needed in this fast-paced digital era. With us, you’re not just adopting a service, you’re embracing transparency that paves the way for better decision-making.

XG offers “Tier 1” and “Tier 2” Consulting Services. 

“Tier 1” Cyber Consulting Services may include multiple service calls (no
limit) aggregating no more than 2 hours of consulting time. If more than 2 hours of consulting
time is needed, the service level can advance to “Tier 2” level service, pending additional fees and investigations (defined below).

“In Scope” Tier 1 Services: Personal and/or Home cybersecurity concerns. “Out of Scope” Tier 1 Services: Business and/or Government market segments cybersecurity concerns (data backup for computers, phones, etc.). All “Out of Scope” services must be directed to Chubb.

Tier 1:

  • Perform Risk Assessment
    • Informational, incident, or breach identification
      • *Identity theft identification must be routed to CyberScout
      • *Cyberbullying identification must be routed back to Chubb
    • Define the loss or what was revealed
    • Investigate the severity of the compromise
      • Date/Time of occurrence
      • Who, what, when, and where?
      • Traceability of impact:
        • Other people?
        • Other websites, email accounts, etc.?
        • Other computers networked or devices?
        • Software, hardware, and browser versions?
        • Scam websites (FTC reporting)?
    • Reporting agencies and contacts
  • Social Engineering Identification and Prevention
    • Baiting – downloading foreign software
    • Scareware – bombarded with false alarms and fictitious threats
    • Pretexting – obtain sensitive information through carefully crafted lies
    • Phishing (most popular) – email and text messaging campaign to fool the user in revealing personal information
    • Spear Phishing – intentionally targeting individuals or enterprises
    • Blocking of phone numbers and emails
  • General Cybersecurity Best Practices
    • Passwords
      • Strong passwords with at least 10 characters using letters, numbers and symbols
      • Use Password Keeper for different passwords for every application
      • Two-factor authentication
      • Enable auto-lock, device finder, and biometric security (touch, facial ID)
    • Security, Antivirus, Browser, and Software updating
      • Update and perform a security scan
      • Install Antivirus software
    • General Knowledge of Top Cybersecurity Scams
      • Scam website exposure identification

“Tier 2” Cyber Consulting Services are for higher vulnerability situations requiring advanced cybersecurity expertise. “Tier 2” services include additional investigations and would be directly invoiced to Chubb clients.

Tier 2:

  • Desktop, Laptop, and Networking Support
    • Identify incorrection security confirguation
  • Maintain List of Best Practices to be Reviewed by Tier 1 Agent
  • Cybersecurity Product and Software Recommendations
  • Fraud Response After Contacting Authorities
  • Stay Updated with Latest Cybersecurity Alerts, Top Threats, and Zero-day Vulnerabilities
  • Scam Website Visitations and Response
    • Domain hijacking or domain spoofing
    • Main-in-the-Middle attack (MITM) prevention
      • Data interception and injection (ex: sniffing, spoofing, rogue access points)
  • Malware Threat Response
    • Including: Virus, Worm, Trojan, Spyware, Keylogger, Rootkit
  • Ransomware Threat Response
    • Including but not limited to: Bad Rabbit, Cryptolocker, GoldenEye, Jigsaw, Locky, Maze, NotPetya, Petya
  • OS, Software, and Product Security
    • Deprecated software versions and known vulnerabilities
      • Research a vulnerability and appropriate patch of fix
    • Top cyberthreats and latest alerts
    • General knowledge of OWASP (Open Web Application Security Project) top vulnerabilities
  • Securing Home Network including IOT (Internet of Things)
    • Wi-Fi, Bluetooth, and router configuration
    • Remote cameras, locks, and other equipment
    • Mobile phones
    • OS networking and MAC addresses
    • SSL/TLS/HTTPS encrypted traffic and firewall configuration


If there is a breach of a system or a matter of criminal nature our cyber team can conduct additional investigations as requested.

Cybersecurity Proactive Products

  • P@PR (People at Potential Risk) An A.I. monitoring tool designed to proactively monitor and prevent any potential security or safety issues caused by employees, contractors and vendors. It provides an environmental threat intelligence feed and assesses the risk levels that can impact a company’s critical human resources. Receive alerts about any type of deviation in normal behavior by your employees, contractors and vendors (ex: drop in credit score, using a USB drive all of a sudden, accessing systems that they don’t normally access, emailing outside of the company, drop in work ethic, etc.)


  • SureSafe An enterprise social, mobile application for people to learn, manage, and share their surrounding risks in real time with trusted peers (ex: environmental events, civil unrest, planned activities, etc.). It creates a close-knit social community where the group can connect and learn each other’s risk with helpful explanations that could help avoid or mitigate impact. Use of geo-fencing as a method to secure the team or community members and generate security alerts based on members security configuration.


  • SureSafe ID A blockchain-based, secure and dynamic ID verification management system, with access level validation and identity risk. Depending on the client’s needs, the product maintains past verification information for future use and insights (ex: background screenings, clearance, access history, credentials, risk score, etc.). Taking full advantage of blockchain’s immutability and traceability, we enable multi-verifications by the users’ social connections. The blockchain-based verification enhances user’s identity and risk scores in real time that does not exist in traditional background screening.


For more information on these products, please visit us at https://xgcyber.com/

*As an existing Chubb insured, you are eligible to receive a 10% discount on all consulting and investigative services rendered by XG. This offer is made by XG and is available only to Chubb policyholders with a current in-force policy. For services provided, the policyholder and XG would enter into a vendor relationship directly. Chubb will not be involved in the policyholder’s decision to purchase services and has no responsibility for services that may be provided.

About XG

XG Consultants Group (XG) is a New York City-based private investigative firm founded in 2001 by a former FBI Supervisory Special Agent. We are composed of a professionally licensed and fully credentialed team of former Federal, State, and Local Law Enforcement Investigators, Cybersecurity Experts, and Drone Specialists as well as an accredited support staff of Investigative and Media Analysts. Our team is fully engaged on your behalf in the fields of private investigations, background screenings, security assessments and best practices for all types of security concerns.

XG serves clients globally, in over 200 countries and territories. We pride ourselves on growing an international suite of services in addition to our nationwide U.S.-based investigative and security specialties. Our services include everything from pre-employment to due diligence background screenings, from deep dive social media analysis and monitoring to general and complex investigations, to cybersecurity preventative and reactive solutions. We can mobilize the right people, resources, and technical services to carefully assess your needs and present a strategy to meet those needs within your timeframe. Protect your integrity, secure your future!

Why XG Consultants

XG is a leading and trusted provider of background screenings and private investigations. We have the national and international experience to fully recognize the vast needs of our clients and we have the global network and resources to meet those needs. XGCG uses its resources and tools to provide comprehensive reports and information that employers and decision makers across the globe can rely on to make informed business and hiring decisions. XG has the capability to obtain first-hand information from on-site investigators and researchers worldwide and we do not exclusively rely on databases, as many other background-screening providers do. Our clients value our commitment to superior customer service, prompt response time, quality control, and extensive knowledge. We recognize the need to maintain this standard of excellence to meet our clients’ requirements and will continuously strive to lead the industry in these areas.

Global Security & Investigations

Whether you’re concerned with internal employee issues (fraud, family & medical leave act, workers’ compensation, etc.) or external worries (phishing scams, electronic bugging, confirming one’s identity and SSN#, etc), XG has the resources and experience to provide professional analysis and insight. XG has helped clients resolve investigations promptly and discreetly with minimal personal and business disruption. See below for a list of our most active global investigative services, please reach out to us if you do not see a security or investigative service that you need.

  • Active Shooter Training
  • Asset Searches
  • Electronic Counter Measures (Electronic Sweeps)
  • Complex Civil/Criminal Investigations
  • Drone Support (Agriculture, Arts/Photography, Counter Terrorism/National Security-Civil Unrest, Disaster Management/Rescue Operations, Engineering/Construction, Entertainment/Sporting Events, News/Journalism, Policing/Surveillance, Shipping/Delivery, Teaching/Training, Traffic Control/Amber Alert)
  • Due Diligence Investigations (Intellectual Property, Investments, Partnerships, Missing Persons, Insurance Claims)
  • Event Security
  • Executive Protection
  • Home/Business/Travel Security Assessments
  • Litigation Support
  • Physical Surveillance
  • Social Media Research & Monitoring

Pre-Employment Background Checks

XG is FCRA-compliant and PBSA-accredited which allows us to monitor and comply with all federal, state and local legislation while promoting fair practice and ethics in the background screening industry. The requirements for Pre-Employment Background Checks vary in depth and scope based on factors such as industry, position, and residence. XG consults employment factors with each client to determine their specific needs in order to provide the most efficient and effective background checks. Our services can be used in any industry, from private family offices to tech start ups, from reality tv shows to sports events, from government entities to nonprofit organizations. Our goal is to provide a transparent, comprehensive, and accurate representation of your subject so that you can focus on business.

For more information on our security and investigative services, please visit our website at xgconsultantsgroup.com.