Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean TSCM - The Other Covid Deep Clean (.pdf version) Deep Clean sanitization of offices and…Kevin D. MurrayJanuary 10, 2021
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections IT Data Center TSCM Inspections (PDF version) The Average IT Data Center Security Precautions Thick…Kevin D. MurrayDecember 4, 2020
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist The FBI Hotel Wi-Fi Security Checklist A COVID 19-Driven Increase in Telework from Hotels Could…Kevin D. MurrayOctober 9, 2020
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have…Kevin D. MurraySeptember 30, 2020
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables Malicious USB Cables - Definition (PDF version) A malicious cable is any cable (electrical or…Kevin D. MurraySeptember 19, 2020
Corporate SecurityCybersecurityTSCM Hacked USB Charging Cables Hacked USB Charging Cables (pdf version) They Appear Normal They Blend In They Suck Up…Kevin D. MurrayJune 23, 2020
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (USB Spy Cable Detector Instructions PDF) These are key measurements for identifying malicious spy cables.…Kevin D. MurrayJune 21, 2020
Corporate SecurityCybersecurityPersonal Privacy Off-Site Meeting Information Security A Guide to Off-Site Meeting Information Security (PDF version) Corporate off-site meetings are prime…Kevin D. MurrayJuly 16, 2019
CybersecurityPersonal PrivacySmartphone Security 19 Clues Your Smartphone is Infected with Spyware and 15 Prevention Tips Spyware Tips (.pdf version) Cell phones have secret lives. When we are not using them,…Kevin D. MurrayMay 10, 2019
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Information Security v. Spies Evolution & Solution Evolution of the Spy Generation Spying as a…Kevin D. MurrayJanuary 5, 2019
CybersecuritySmartphone Security Lost Smartphone Recovery Tip Chances are, your lost smartphone screen will look like this to whoever finds it. (If…Kevin D. MurraySeptember 12, 2018
Corporate SecurityCybersecurityEspionage USB Stick Warnings Before we jump into the USB memory security recommendations, a little background is in order...…Kevin D. MurrayMay 16, 2018
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Economic espionage,…Kevin D. MurrayMarch 13, 2018
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayMarch 13, 2018
Corporate SecurityCybersecurityTSCM Cybersecurity Requirements for Financial Services Companies Cybersecurity Requirements for Financial Services Companies 23 NYCRR 500 This is the title of a…Kevin D. MurrayFebruary 7, 2018
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT v Security budget battle. Budget War: Holistic Information Security v. IT Security Holistic information…Kevin D. MurrayNovember 15, 2017