Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist The FBI Hotel Wi-Fi Security Checklist A COVID 19-Driven Increase in Telework from Hotels Could…Kevin D. MurrayOctober 9, 2020
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have…Kevin D. MurraySeptember 30, 2020
EspionagePersonal PrivacyRecordingVideo VoyeurismWeird Weird Spy Stories Weird Spy Stories Who doesn’t like a good spy story? (The audience remains silent.) They…Kevin D. MurrayAugust 18, 2020
GPS TrackingPersonal PrivacyTSCM World’s Smallest GPS Tracker and More World's Smallest GPS Tracker and More (PDF version) A world's smallest GPS tracker can be…Kevin D. MurrayJuly 30, 2020
Corporate SecurityPersonal PrivacyRecordingTSCM World’s Smallest Voice Recorder? (PDF version) Is this The World’s Smallest Voice Recorder? Specifications TileRec by ATTO Digital Ultra-small:…Kevin D. MurrayJuly 22, 2020
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (USB Spy Cable Detector Instructions PDF) These are key measurements for identifying malicious spy cables.…Kevin D. MurrayJune 21, 2020
Corporate SecurityPersonal PrivacyTSCM Home Office Security Tips for Business Home Office Security Tips for Business (PDF version) Home office security vulnerabilities… Home offices lack…Kevin D. MurrayJune 16, 2020
Personal PrivacyTSCMVideo Voyeurism Spy Camera Detectors – Do they work? Spy Camera Detectors How can I find hidden cameras? How do they work? Along with,…Kevin D. MurrayOctober 9, 2019
Corporate SecurityCybersecurityPersonal Privacy Off-Site Meeting Information Security A Guide to Off-Site Meeting Information Security (PDF version) Corporate off-site meetings are prime…Kevin D. MurrayJuly 16, 2019
CybersecurityPersonal PrivacySmartphone Security 19 Clues Your Smartphone is Infected with Spyware and 15 Prevention Tips Spyware Tips (.pdf version) Cell phones have secret lives. When we are not using them,…Kevin D. MurrayMay 10, 2019
Corporate SecurityPersonal Privacy How to Stop Acoustical Leakage Eavesdropping Acoustical Leakage It's the oldest form of eavesdropping. Defined as: “a back-formation from eavesdropper, one…Kevin D. MurrayApril 1, 2019
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Information Security v. Spies Evolution & Solution Evolution of the Spy Generation Spying as a…Kevin D. MurrayJanuary 5, 2019
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues are Important —Get to know the spy clues. From businesses to governments, and…Kevin D. MurrayJune 4, 2018
Personal PrivacySmartphone Security Eavesdropping Snoops – The Average Person’s Guide to Stopping Them Your eavesdropping snoop can be stopped. You don't have to put up with eavesdropping, hidden…Kevin D. MurrayFebruary 15, 2017
Personal PrivacySmartphone Security Is My Cell Phone Bugged – Bonus Information Is My Cell Phone Bugged? "Everything you need to know to know to keep your…Kevin D. MurrayJanuary 1, 2017