Corporate SecurityCybersecurityInternet of ThingsWi-Fi The Knock-Out Punch Used to Disable WiFi Cameras This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras, and other…Kevin D. MurrayMarch 16, 2023
Corporate SecurityCybersecurityTSCM Flipper Zero – Corporate Security Threat What is Flipper Zero? Flipper Zero is a pocket-sized, open-source hardware security device designed for…Kevin D. MurrayMarch 15, 2023
Corporate SecurityCybersecurity How to Spot Counterfeit IT Gear When inspecting IT / MDF / IDF rooms for unauthorized equipment and connections be sure…Kevin D. MurrayJanuary 18, 2023
Corporate SecurityCybersecurityPersonal Privacy Spybuster Tip #823 – Wireless Key Fob Security Never let your wireless key fob out of your control. Wireless key fobs are useful.…Kevin D. MurrayJanuary 17, 2023
Corporate SecurityCybersecurityEspionageTSCM Securing Cryptocurrency Offices from Eavesdropping and Espionage (PDF version) Securing cryptocurrency offices is a hot topic. Electronic surveillance (the spying kind) has…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyTSCM Hearing Aid Eavesdropping – How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean The Other Covid Deep Clean is TSCM (.pdf version) Deep Clean sanitizing of offices and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) The Average IT Data Center Security Precautions Thick concrete walls. Data, comms, and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist A COVID 19-Driven Increase in Telework from Hotels Could Pose a Cyber Security Risk for…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have a saying, “Raise…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (PDF version) (VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityTSCM Hacked USB Charging Cables (pdf version) (VIDEO) What are hacked USB cables? They Appear Normal They Blend In They…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityPersonal Privacy Off-Site Meeting Information Security (PDF version) Corporate off-site meetings are prime targets for infiltration and information theft. Resorts and…Kevin D. MurrayNovember 13, 2022
CybersecurityPersonal PrivacySmartphone Security 19 Clues Your Smartphone is Infected with Spyware and 15 Prevention Tips Spyware Detection Tips (.pdf version) Cell phones have secret lives. When we are not using…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Evolution of the Spy Generation Spying as a method of getting ahead in business, was…Kevin D. MurrayNovember 13, 2022
CybersecuritySmartphone Security Lost Smartphone Recovery Tip What happens when you lose your smartphone? Chances are, your lost smartphone screen will look…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage USB Stick Warnings USB Memory Stick News Reports Before we jump into the USB memory security recommendations, a…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM Cybersecurity Requirements for Financial Services Companies Cybersecurity Requirements for Financial Services Companies 23 NYCRR 500 This is the title of a…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT v Security budget battle. Budget War: Holistic Information Security v. IT Security Holistic information…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM How to Choose a Competent TSCM Consultant How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…Kevin D. MurrayMay 3, 2023