Employment & Due Diligence Background Checks

Cybersecurity Consultations & Proactive Products

Global Security & Investigations

XG Consultants Group is a proud Chubb partner and expert service provider for individuals and firms in need of pre-employment background checks, due diligence screenings, cybersecurity consultations and investigative services. From conducting a basic background check on a nanny or personal assistant, to conducting a home security assessment or providing event security, to implementing a cybersecurity monitoring tool to mitigate security issues caused by employees, let XG help protect your integrity and securely walk you through the process from beginning to end.

Chubb logo
XG Consultants Group logo

Employment & Due Diligence Background Checks

XG is FCRA-compliant and PBSA-accredited which allows us to monitor and comply with all federal, state and local legislation while promoting fair practice and ethics in the background screening industry. The requirements for Due Diligence or Pre-Employment Background Checks vary in depth and scope based on factors such as industry, position, and residence. XG consults employment factors with each client to determine their specific needs in order to provide the most efficient and effective background checks. Our goal is to provide a transparent, comprehensive, and accurate representation of your subject so that you can focus on business.

What is included in a Chubb Background Check:

Address History/Alias History

A search to identify prior addresses, aliases, and social security number, to ensure that it verifies the state and year of issuance. The SSN is verified with the Social Security Administration and other databases to provide insight into possible additional counties that might require further investigation.

Please note that Address/Alias history information is not recorded in the final report as it is not considered FCRA compliant material. However, this information is still used by XG to determine all jurisdictions and other aliases necessary to be searched

Civil Court Search - County Upper & Lower*

Based on the subject’s residential history, a civil records search is conducted in each county where the subject resided. Civil record results typically provide the case type, the amount sought, and any disposition found. Civil recordings are typically classified by the amount of money sought by the plaintiff. Civil records typically do not contain a subject’s date of birth or social security number.

*Searches are performed by researchers dispatched to the court unless we are connected directly to the court’s records via the internet. Some records found may not contain complete identifiable information on the subject. Further investigations can be made available upon request to fully identify the subject of the record. Additional charges will apply.

Searches will not be conducted in all specialized local courts in every county that the subject has history in. Such information can be obtained at your written request. Additional charges will apply.

Civil Court Search - Federal*

A Transunion credit report is conducted on the subject with their consent. This search includes civil and bankruptcy records.

*Some records found may not contain complete identifiable information on the subject. Further investigations can be made available upon request to fully identify the subject of the record. Additional charges will apply.

Credit Report*

A Transunion credit report is conducted on the subject with their consent. This search includes credit history, past due amounts, address comparison, and repository remarks.

*Requires acknowledgement, disclosure, and authorization form to be filled out by the subject.

Criminal Court Search - County Upper & Lower*

Based on the subject’s residential history, a felony and misdemeanor search will be conducted in each county where the subject has resided. This search is conducted in the courthouse in “real time”. When a record is found, we will provide full case information including case number, date of offense, level of offense, charge description, dispositions, and identifiers as they appear in the court dockets.

*Searches are performed by researchers dispatched to the court unless we are connected directly to the court’s records via the internet. Some records found may not contain complete identifiable information on the subject. Further investigations can be made available upon request to fully identify the subject of the record. Additional charges will apply

Criminal Court Search - Federal*

A search of Federal records that includes cases where the U.S. government is the plaintiff or where the case crosses state lines. This search includes criminal and bankruptcy records.

*Some records found may not contain complete identifiable information on the subject. Further investigations can be made available upon request to fully identify the subject of the record. Additional charges will apply.

Drug Screening*

10-Panel or 5-Panel (Dependent on location /availability. Cannabinoid tests can be removed.)

5-Paneltest:Amphetamines,Cannabinoids,Cocaine,Opiates,Phencyclidine

10- Panel test: Amphetamines, Cocaine, Cannabinoids, Opiate, PCP, Barbiturate, Benzodiazepine, Methadone, Oxycodone,  Ecstasy.

*Requires acknowledgement, disclosure, and authorization form to be filled out by the subject.

Education Verification*

A verification of a subject’s education history. The search provides confirmation and/or details on dates of attendance, graduation date, degree(s) received, and major areas of study.

*Requires acknowledgement, disclosure, and authorization form to be filled out by the subject.

Employment Verification

A verification of the subject’s employment history. The search provides dates of employment, job title, and reason for leaving. If available, we can also obtain more pertinent job information based on your individual or business needs.

Sex Offender Search

A name search through various National Sex Offender Databases.

DMV Search*

A driver’s license verification with driving history results. This will provide accidents, violations, and/or suspensions. The search scope for DMV history records varies by state.

*NH, PA, PR, and WA require acknowledgement, disclosure, and authorization forms to be filled out by the subject.

Media Search (1-hour search)

Social media findings are located based on the information provided by the subject/entity or client, as well as through targeted keyword searches, algorithms, and public and private database searches. These methods are designed to locate both innocuous information as well as potentially criminal, controversial, or otherwise noteworthy content. Key findings will be highlighted along with links, screenshots, a list of social media profiles, name match results, and a comprehensive report summary. Our media analysts can conduct as little as 1-hour searches to unlimited searches. We can tailor our searches to align with your specific individual or business needs.

Professional Licensing Verification

This search verifies any professional licenses and certifications held by the subject and will provide any sanctions records relating to such licenses. The search will provide records on accuracy of the subject’s license, any disciplinary actions taken, date of issue, expiration dates, and status of license.

Additional fees will apply for additional name searches or verifications. Please contact us for more information.

All searches are limited to one (1) name or one (1) verification per check. Please reach out to us for more information.

Cybersecurity Services & Products

XG Consultants Group can help you mitigate your cybersecurity risk by addressing immediate threats, implementing proactive monitoring tools, and sharing best practices to prevent cyber issues from occurring in the future. We are dedicated to human capital risk management. Our goal is to merge human processes and data intelligence seamlessly. We strive to bring clarity and trust that is much needed in this fast-paced digital era. With us, you’re not just adopting a service, you’re embracing transparency that paves the way for better decision-making.

XG offers “Tier 1” and “Tier 2” Consulting Services. 

“Tier 1” Cyber Consulting Services may include multiple service calls (no
limit) aggregating no more than 2 hours of consulting time.

If more than 2 hours of consulting
time is needed, the service level can advance to “Tier 2” level service, pending additional fees and investigations.

Tier 1

  • General Consultation
    • Information Security related to the privacy and cybersecurity threats (Ex: Risk Assessment, Home/Office Network)
  • General Cybersecurity Best Practices
    • Passwords
      • Strong passwords with at least 10 characters using letters, numbers and symbols
      • Use Password Keeper for different passwords for every application
      • Two-factor authentication
      • Enable auto-lock, device finder, and biometric security (touch, facial ID)
    • Security, Antivirus, Browser, and Software updating
      • Update and perform a security scan
      • Install Antivirus software
    • General Knowledge of Top Cybersecurity Scams
      • Scam website exposure identification

“Tier 2” Cyber Consulting Services are for higher vulnerability situations requiring advanced cybersecurity expertise. “Tier 2” services include additional investigations and would be directly invoiced to Chubb clients.

Tier 2

  • Perform Risk Assessment
    • Informational, incident, or breach identification
      • *Identity theft identification must be routed to CyberScout
      • *Cyberbullying identification must be routed back to Chubb
    • Define the loss or what was revealed
    • Investigate the severity of the compromise
      • Date/Time of occurrence
      • Who, what, when, and where?
      • Traceability of impact:
        • Other people?
        • Other websites, email accounts, etc.?
        • Other computers networked or devices?
        • Software, hardware, and browser versions?
        • Scam websites (FTC reporting)?
    • Reporting agencies and contacts
  • Social Engineering Identification and Prevention
    • Baiting – downloading foreign software
    • Scareware – bombarded with false alarms and fictitious threats
    • Pretexting – obtain sensitive information through carefully crafted lies
    • Phishing (most popular) – email and text messaging campaign to fool the user in revealing personal information
    • Spear Phishing – intentionally targeting individuals or enterprises
    • Blocking of phone numbers and emails
  • Desktop, Laptop, and Networking Support
    • Identify incorrection security confirguation
  • Maintain List of Best Practices to be Reviewed by Tier 1 Agent
  • Cybersecurity Product and Software Recommendations
  • Fraud Response After Contacting Authorities
  • Stay Updated with Latest Cybersecurity Alerts, Top Threats, and Zero-day Vulnerabilities
  • Scam Website Visitations and Response
    • Domain hijacking or domain spoofing
    • Main-in-the-Middle attack (MITM) prevention
      • Data interception and injection (ex: sniffing, spoofing, rogue access points)
  • Malware Threat Response
    • Including: Virus, Worm, Trojan, Spyware, Keylogger, Rootkit
  • Ransomware Threat Response
    • Including but not limited to: Bad Rabbit, Cryptolocker, GoldenEye, Jigsaw, Locky, Maze, NotPetya, Petya
  • OS, Software, and Product Security
    • Deprecated software versions and known vulnerabilities
      • Research a vulnerability and appropriate patch of fix
    • Top cyberthreats and latest alerts
    • General knowledge of OWASP (Open Web Application Security Project) top vulnerabilities
  • Securing Home Network including IOT (Internet of Things)
    • Wi-Fi, Bluetooth, and router configuration
    • Remote cameras, locks, and other equipment
    • Mobile phones
    • OS networking and MAC addresses
    • SSL/TLS/HTTPS encrypted traffic and firewall configuration

 

If there is a breach of a system or a matter of criminal nature our cyber team can conduct additional investigations as requested.

Cybersecurity Proactive Products

P@PR (People at Potential Risk)

P@PR (People at Potential Risk) An A.I. monitoring tool designed to proactively monitor and prevent any potential security or safety issues caused by employees, contractors and vendors. It provides an environmental threat intelligence feed and assesses the risk levels that can impact a company’s critical human resources. Receive alerts about any type of deviation in normal behavior by your employees, contractors and vendors (ex: drop in credit score, using a USB drive all of a sudden, accessing systems that they don’t normally access, emailing outside of the company, drop in work ethic, etc.)

SureSafe

SureSafe An enterprise social, mobile application for people to learn, manage, and share their surrounding risks in real time with trusted peers (ex: environmental events, civil unrest, planned activities, etc.). It creates a close-knit social community where the group can connect and learn each other’s risk with helpful explanations that could help avoid or mitigate impact. Use of geo-fencing as a method to secure the team or community members and generate security alerts based on members security configuration.

SureSafe ID

SureSafe ID A blockchain-based, secure and dynamic ID verification management system, with access level validation and identity risk. Depending on the client’s needs, the product maintains past verification information for future use and insights (ex: background screenings, clearance, access history, credentials, risk score, etc.). Taking full advantage of blockchain’s immutability and traceability, we enable multi-verifications by the users’ social connections. The blockchain-based verification enhances user’s identity and risk scores in real time that does not exist in traditional background screening.

For more information on these products, please visit us at https://xgcyber.com/

Global Security & Investigations

Whether you’re concerned with internal employee issues (fraud, family & medical leave act, workers’ compensation, etc.) or external worries (phishing scams, electronic bugging, confirming one’s identity and SSN, etc.), XG has the resources and experience to provide professional analysis and insight. XG has helped clients resolve investigations promptly and discreetly with minimal personal and business disruption. See below for a list of our most active global investigative services, please reach out to us if you do not see a security or investigative service that you need and we will provide capabilities.

Active Shooter Training

Receive reality-based, hands-on active shooter practice that provides training on emergency and crises procedures as well as live drills to ensure staff, personnel, and civilians are physically and psychologically ready for threats. Tests and evaluations are also conducted to ensure trainees/staff are knowledgeable to develop a higher level of preparedness.

Asset Searches

A complete search of the subject’s assets including verified address, SSN, possible spouse, employment (direct deposits), statewide bank, credit analysis, judgments, liens, and real estate.

Electronic Counter Measures

Technical Surveillance Counter Measures (TSCM), also referred to as Electronic Countermeasures, involves detecting and locating surreptitious surveillance attempts to gain information by technical or electronic means. A countermeasures sweep will be conducted through a physical examination, a frequency spectrum evaluation, and an electronically enhanced physical and electronic inspection as necessary.

Complex Civil/Criminal Investigations

We have the expert personnel and global resources to meticulously address your investigative needs. We specialize in complex criminal and civil investigations including conducting thorough research, interviews, evidence collection, or additional investigative methods to uncover essential records.

Drone Support

Our drone, or Unmanned Aerial Vehicles (UAV), autonomy level’s range from remotely piloted to advanced autonomy, and they can travel varying heights and distances. Drone services and industries include aerial and mapping inspections, agriculture and farming, aerial photography, construction/engineering, counter terrorism/national security, disaster management, entertainment/sporting events, policing/military, rescue operations, shipping/delivery, utility company inspections, traffic control/amber alert, and more.

Due Diligence Investigations

Our team of experts will confirm the facts and details about a business, individual, or matter under consideration to find any hidden liabilities or issues. Due Diligence investigations help ensure you know the benefits and risks of making a crucial business or personal decision – and they don’t require consent from the business or individual. Conduct due diligence investigations for a variety of reasons including for: Investments, Partnerships, Intellectual Property Theft, Regulatory Compliance, Debt & Equity, Missing Persons, Insurance Claims, Reputational Risk, and more.

Event Security

Security and risk protection to ensure the safety of guests, staff, and property at events or activities. Our security personnel consist of mostly retired law enforcement, military, and security personnel who are licensed to carry firearms in all 50 states and in many foreign countries. We create a security strategy based on your specific event details while integrating with cybersecurity solutions (P@PR & SureSafe products) to mitigate internal and externals threats from negatively affecting the event and human capital.

Executive Protection

Security and risk protection to ensure the safety of VIPs or other individuals who may be exposed to personal risk. Our personnel consist of mostly retired law enforcement, military, and security personnel who are licensed to carry firearms in all 50 states and in many foreign countries. We can provide you with the appropriate armed or unarmed agents along with a comprehensive security solution in accordance with your specific circumstances.

Home/Business/Travel Security Assessments

A physical and cyber assessment of the current or prospective security and safety measures within your business property, residence, or travel journey will be conducted. Following the completion of the security assessment, we will provide best practices and recommendations to mitigate internal and external threats from affecting everyday affairs.

Litigation Support

XG can help with all of your litigation needs, from establishing and documenting all facts of a court case to using our highly trained and experienced litigation support investigators. We can help ensure that all evidence, information, documentation, interviews, and connections are pursued so that you can focus on your client. Litigation support areas include family law, employment law, criminal defense, liability defense, tort actions, personal injury, and more.

Physical Surveillance

The ongoing, systematic collection, analysis and interpretation of behavior, activities, or information on an individual, business, or other entity for the purpose of gathering evidence or preventing criminal activity. Our services include various types of surveillance including physical, electronic, computer, social media, financial, and biometric (facial recognition). Drone surveillance and cybersecurity monitoring services are also available.

Social Media Research & Monitoring

Social media findings are located based on the information provided by the subject/entity or client, as well as through targeted keyword searches, algorithms, and public and private database searches. These methods are designed to locate both innocuous information as well as potentially criminal, controversial, or otherwise noteworthy content (including racism, sexism, homophobia, xenophobia, violence, drug use, etc). Key findings will be highlighted along with links, screenshots, a list of social media profiles (perusing over 64 platforms), name match results, and a comprehensive report summary. Our media analysts can conduct as little as 1-hour searches to unlimited searches. We can tailor our searches to align with your specific individual or business needs.

Social Media Monitoring services include one-time, daily, weekly, monthly, yearly or gap monitoring. Report results will be tailored based on your individual or business needs.

About XG

XG Consultants Group is a New York City-based global private investigative firm founded in 2001 by a former FBI Supervisory Special Agent. We are composed of a professionally licensed and fully credentialed team of former Federal, State, and Local Law Enforcement Investigators, Cybersecurity Experts, and Drone Specialists as well as an accredited support staff of Investigative Analysts, Media Analysts, and Court Researchers. Our team is fully engaged on your behalf in the fields of private investigations, background screenings, security assessments and best practices for all types of safety concerns.

XG serves clients globally, in over 200 countries and territories. We pride ourselves on growing an international suite of services in addition to our nationwide U.S.-based investigative and security specialties. Our services include everything from pre-employment to due diligence background screenings, from deep dive social media analysis and monitoring to general and complex criminal/civil investigations, to cybersecurity preventative and reactive solutions. We can mobilize the right people, resources, and technical services to carefully assess your needs and present a strategy to meet those needs within your timeframe.

Protect your integrity, secure your future.

Why XG Consultants

XG is a leading and trusted provider of global background screenings and private investigations. We have the experience to fully recognize the vast needs of our clients, provide comprehensive reports and information that employers and decision makers can rely on to make informed decisions, and we have the global network and resources to meet those needs. XG has the capability to obtain first-hand information from on-site investigators and researchers worldwide and we do not exclusively rely on databases, as many other background-screening providers do. Our clients value our commitment to superior customer service, prompt response times, accuracy, quality control, compliance, resourcefulness, collaboration and extensive knowledge and experience. We recognize the need to maintain this standard of excellence to meet our clients’ requirements and will continuously strive to lead the industry in these areas.

For more information on our security and investigative services, please visit our website at xgconsultantsgroup.com.

As an existing Chubb insured, you are eligible to receive a 10% discount on all consulting and investigative services rendered by XG. This offer is made by XG and is available only to Chubb policyholders with a current in-force policy. For services provided, the policyholder and XG would enter into a vendor relationship directly. Chubb will not be involved in the policyholder’s decision to purchase services and has no responsibility for services that may be provided.

Request a Background Check or Cybersecurity Consultation