Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Evolution of the Spy Generation Spying as a method of getting ahead in business, was…Kevin D. MurrayNovember 13, 2022
CybersecuritySmartphone Security Lost Smartphone Recovery Tip What happens when you lose your smartphone? Chances are, your lost smartphone screen will look…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage USB Stick Warnings USB Memory Stick News Reports Before we jump into the USB memory security recommendations, a…Kevin D. MurrayNovember 13, 2022
Corporate Security Confidential Paperwork Security PDF version Confidential Paperwork Spills the Secrets Want to know what's happening? Read the…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayNovember 13, 2022
TSCM GSM Audio Bug? What’s That? GSM Bug. Sounds A Bit Scary, Doesn't It? Is it detrimental to your personal health?…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageTSCM Best TSCM Practices for Enterprise Organizations TSCM best practices for enterprise organizations are different than those for single locations. They have…Kevin D. MurrayJuly 2, 2023
Corporate SecurityCybersecurityTSCM Cybersecurity Requirements for Financial Services Companies Cybersecurity Requirements for Financial Services Companies 23 NYCRR 500 This is the title of a…Kevin D. MurrayNovember 13, 2022
DroneTSCMVideo Voyeurism Covert Video Spy Camera Detection | Murray Associates Case History Murray Associates Case History Detecting spy cameras is part of our normal TSCM service. However,…Kevin D. MurraySeptember 26, 2024
Smartphone Security 41 Smartphone Security Tips The Basics The Number One smartphone security tip. Lock your phone with a password. Keep…Kevin D. MurrayNovember 13, 2022
Corporate Security Executive Suite Security Considerations for Information Security and Operational Privacy Executive Suite Security Considerations Boardroom — Executive suite security protects confidential information and conversations, the…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM Corporate Bug Sweep | TSCM Methodology Basic bug sweep methodology in business and government. It reflects the most commonly-used bug sweep…Kevin D. MurraySeptember 21, 2023