Skip to the main content.
About our VOSB Designation


Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

3 min read

The Growing Threat of Flipper Zero: Urgent Call to Strengthen Access Control Security

Flipper Zero website

The Flipper Zero multi-tool has emerged as a popular device among enthusiasts and potential bad actors alike. This palm-sized gadget, capable of testing and exploiting a range of electronic devices and systems, has garnered significant attention with over 20 million views on various YouTube channels showcasing its capabilities.

Its ease of use and powerful functionality in manipulating access control systems have raised substantial concerns within the security community.


Flipper Zero's Capabilities

IMG_8284Flipper Zero is a versatile tool designed for penetration testing and debugging of hardware and wireless protocols. Its features enable users to interact with everything from RFID and NFC technology to radio communications and infrared devices. While marketed as a tool for researchers and hobbyists, the device can potentially be used to exploit vulnerabilities in electronic access systems, posing a serious risk to physical security.

The device's capability to emulate and clone RFID signals, in particular, has significant implications for facilities relying on RFID-based access control systems. By copying authorized RFID tags, individuals could gain unauthorized access to secured areas, leading to potential security breaches and safety concerns.


Impact on Facility Security

The rise in popularity of the Flipper Zero underscores a critical vulnerability in current access control systems, particularly those that have not been updated or assessed for emerging threats. Facilities using outdated or basic RFID and NFC technology are at a heightened risk of being compromised.

The ease with which Flipper Zero can clone access cards should be a wake-up call to review and reinforce security protocols.


Facility Owners and Managers

Given the potential vulnerabilities exposed by tools like Flipper Zero, it is imperative for facility owners and security program managers to take proactive steps to secure their premises. Here are key actions to consider:

  1. Assessment of Current Systems: Conduct thorough audits of your access control systems to identify and address vulnerabilities. This includes evaluating the technology used for entry points, employee access methods, and the overall security infrastructure.

  2. Upgrade Outdated Technology: If your facility relies on older RFID or NFC systems, consider upgrading to more secure technologies such as biometrics or advanced encryption methods that offer tougher resistance against hacking.

  3. Engage Security Experts: Consult with security professionals like those at Theseus Professional Services who can provide expertise in the latest defensive technologies and strategies. This may include penetration testing conducted by ethical hackers to test the robustness of your systems.

  4. Monitor and Respond: Implement monitoring tools to detect unusual access patterns or unauthorized attempts to access the system. A swift response mechanism is crucial to address any security breach effectively.

The increasing accessibility and capabilities of devices like Flipper Zero represent a significant challenge to physical security systems. By understanding the risks associated with these tools and taking decisive action to fortify their security measures, facility owners and security program managers can better protect their assets and ensure a safer environment for all.

Prioritize security enhancements and stay vigilant against the evolving threats posed by such advanced technologies with guidance from Theseus Professional Services. Contact us today.

Theseus dialog bubble-1




We understand the challenges that security professionals face in securing their facilities and creating a safe environment within their budget. We also recognize the difficulty in finding the right resources and expert advice to achieve this mission.

That's why we're excited to announce the release of our considerations guide, designed specifically to help security professionals conduct their own in-house security risk assessment.

This comprehensive guide aims to assist you in identifying any missing or inadequate physical security measures that may compromise the safety and security of your assets, people, property, and critical business functions. While we highly recommend consulting with a third-party expert like Theseus Professional Services in certain cases, this guide will empower you to take a proactive approach to assess and address security risks within your organization.

The findings of a security risk assessment play a vital role in measuring and communicating the level of risk to your organization. By following the guidelines outlined in this guide, you can enhance the overall security of your facility while staying within your budget.

We believe that knowledge is power, and we're committed to providing you with valuable resources to help you achieve your security goals. Download our considerations guide today and take control of your facility's security.

  • Process Evaluation
  • Threats
  • Vulnerability Assessment Highlights
  • Electronic Security Systems Considerations
  • Site Considerations
  • Building Entrances and Exits
  • Common Functional Areas
  • Building Envelope
  • Utilities and Building Services
  • Building Systems

Download here >>