Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayNovember 13, 2022
TSCM GSM Audio Bug? What’s That? GSM Bug. Sounds A Bit Scary, Doesn't It? Is it detrimental to your personal health?…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageTSCM Best TSCM Practices for Enterprise Organizations TSCM best practices for enterprise organizations are different than those for single locations. They have…Kevin D. MurrayJuly 2, 2023
Corporate SecurityCybersecurityTSCM Cybersecurity Requirements for Financial Services Companies Cybersecurity Requirements for Financial Services Companies 23 NYCRR 500 This is the title of a…Kevin D. MurrayNovember 13, 2022
DroneTSCMVideo Voyeurism Covert Video Spy Camera Detection | Murray Associates Case History Murray Associates Case History Detecting spy cameras is part of our normal TSCM service. However,…Kevin D. MurrayNovember 13, 2022
Smartphone Security 41 Smartphone Security Tips The Basics The Number One smartphone security tip. Lock your phone with a password. Keep…Kevin D. MurrayNovember 13, 2022
Corporate Security Executive Suite Security Considerations for Information Security and Operational Privacy Executive Suite Security Considerations Boardroom — Executive suite security protects confidential information and conversations, the…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM Corporate Bug Sweep | TSCM Methodology Basic bug sweep methodology in business and government. It reflects the most commonly-used bug sweep…Kevin D. MurraySeptember 21, 2023
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM How to Choose a Competent TSCM Consultant How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…Kevin D. MurrayMay 3, 2023