Corporate SecurityEspionage Quiz – Would You Make a Good Spy? Find out if you could be a good spy. Test yourself for fun. Learn what…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) The Average IT Data Center Security Precautions Thick concrete walls. Data, comms, and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist A COVID 19-Driven Increase in Telework from Hotels Could Pose a Cyber Security Risk for…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have a saying, “Raise…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (PDF version) (VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is…Kevin D. MurrayNovember 15, 2022
Corporate SecurityPersonal PrivacyRecordingTSCM World’s Smallest Voice Recorder? (PDF version) Is this The World’s Smallest Voice Recorder? Specifications TileRec by ATTO Digital Ultra-small:…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM Hacked USB Charging Cables (pdf version) (VIDEO) What are hacked USB cables? They Appear Normal They Blend In They…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
Corporate SecurityPersonal PrivacyTSCM Home Office Security Tips for Business (PDF version) Home office security vulnerabilities… Home offices lack the considerable security protections afforded by…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part I The following TSCM bug sweep advice is specifically meant for: Private Investigators, Security Directors, Security…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part II The following TSCM inspection advice is specifically meant for: Private Investigators, Security Directors, Security Consultants,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal Privacy Off-Site Meeting Information Security (PDF version) Corporate off-site meetings are prime targets for infiltration and information theft. Resorts and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal Privacy How to Stop Acoustical Leakage Eavesdropping Acoustical Leakage History It's the oldest form of eavesdropping. Defined as: “a back-formation from eavesdropper,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Trade Secret Protection Best Practices Trade secret protection is essential for two reasons. Instituting trade secret protection best practices reduces…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistorical A Cunning Plan to Protect the U.S. from Business Espionage Business Espionage: Headline news for decades now. We are bombarded with news stories and court…Kevin D. MurrayNovember 13, 2022
Corporate Security Shred Bin Security – Yours Stinks – Fix it for Free Shred Bin Security — How to upgrade it... probably for free! If you have a…Kevin D. MurraySeptember 28, 2023
Corporate Security Duty of Care Information Security Laws (pdf version) Duty of Care Information Security Laws May Directly Affect You All these things…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Evolution of the Spy Generation Spying as a method of getting ahead in business, was…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying – Sci-Fi Bugs? (pdf version) Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our…Kevin D. MurrayNovember 13, 2022
Corporate Security TSCM During Construction Projects In the world of business espionage there is a golden time to install bugs, taps,…Kevin D. MurraySeptember 21, 2023
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues are Important — Get to know the spy clues. From businesses to governments,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage USB Stick Warnings USB Memory Stick News Reports Before we jump into the USB memory security recommendations, a…Kevin D. MurrayNovember 13, 2022
Corporate Security Confidential Paperwork Security PDF version Confidential Paperwork Spills the Secrets Want to know what's happening? Read the…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayNovember 13, 2022