Who’s Listening?

Who is listening to your communications? Hopefully your radio traffic is not being played back on TikTok! Recent news articles have shown how a ham radio enthusiast on TikTok has been posting recordings of two-way radio traffic he has overheard.

2024-01-08T10:06:47-05:00January 7th, 2024|

Exploding USB drives!

If you didn't know this before, don't plug an unknown USB drive into your computer... ever! Threats hidden in a USB drive can include malware, fried computers, and now explosives. "Flash drive" takes on a new meaning...

2023-03-27T11:12:51-04:00March 27th, 2023|

CISO pleads guilty to sharing confidential discussions.

Loss of control of confidential information is a big deal. It can happen in many ways, deliberate espionage using wiretapping, bugging, and cyber breaches are a few methods that are commonly recognized, but there can be many more serious vulnerabilities. Learn how TSCM helps to protect confidential information.

2023-03-29T10:50:28-04:00March 25th, 2023|

Spy Balloons and TSCM- Do you have a Domain Awareness Gap?

When you first heard of the detection of the spy balloon, did you think “I’m glad this doesn’t affect my security department…”? If so, you may be mistaken. There is clearly a “domain awareness gap” in information security. It is the role of TSCM, Technical Surveillance Countermeasures, to help fill that gap. Click to read more on how TSCM looks carefully and meticulously at the gaps in information security that exist between physical, cyber, and other security areas.

2023-03-09T09:36:18-05:00March 8th, 2023|

Are tech employees leaving and going to competitors?

Keeping loyalty among employees can be a difficult challenge, but may also be critical to survival of your business as well as stopping leaks, spying, and other forms of corporate espionage.  Often requests for our corporate TSCM service come when a well placed employee in a tech position has left the company. Even those without […]

2022-03-13T22:57:44-04:00March 13th, 2022|

When the insider becomes an outsider- Terminated employee destroys company data.

Insider threats are one of the most significant security concerns for all businesses. Many companies do not recognize the dangers that may exist within their own staff. This can quickly become apparent when an employee with a grudge is terminated.  This employee was with the company for just 6 months, but was able to cause over $100,000 in damage within two days of her termination.

2021-08-23T08:14:54-04:00August 23rd, 2021|

Threat watch: “Glowworm” attack using power LEDs

Researchers at Ben Gurion University have demonstrated a new class of TEMPEST attack for intercepting confidential information. Their technique involves recovering sound by analyzing optical emanations from a device’s power indicator LED, specifically in the circuits providing power to various speaker systems. Could your conversations be vulnerable?

2021-08-12T14:44:14-04:00August 12th, 2021|
Go to Top