by Joey Alonso | Oct 19, 2019 | Assessments, In-depth Vulnerability Assessments, Insider Threat Program Management, Insider Threats, Intellectual Property Theft Prevention, Privacy, Uncategorized, Vulnerability Assessments
With the number of incidents happening every month of not only highly-trusted but entry-level employees stealing information from their employers, I’m in awe of the lack of “give a dang” decision-makers have when we chat. It’s happening folks, in every industry...
by Joey Alonso | May 23, 2019 | Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
There is no denying the threats focused on small and medium-sized businesses from intentional and accidental Insiders. I want you to think about what you’re doing to mitigate those threats and that shapes the perception of your company to would be partners, especially...
by Joey Alonso | Aug 31, 2017 | Blog, Insider Threat Program Management, Insider Threats, Legal and ethical policies and procedures, Security Awareness, Vulnerability Assessments
Almost every day, we read about companies acquiring each other or merging with another that complements their current business. However, what is often missed is the threat posed by these actions and the dramatic (or traumatic) impact they’ve made on the acquiring...
by Joey Alonso | Mar 15, 2017 | Assessments, Behavioral and Psychological Analysis, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Security Awareness, Services, Threats, Vulnerability Assessments
With the number of incidents happening every month of not only highly-trusted but entry-level employees stealing information from their employers, I’m in awe of the lack of “give a dang” decision-makers have when we chat. It’s happening folks, in every industry and...
by Joey Alonso | Dec 19, 2016 | Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
There is no denying the threats focused on small and medium-sized businesses from intentional and accidental Insiders. I want you to think about what you’re doing to mitigate those threats and that shapes the perception of your company to would be partners, especially...
by Joey Alonso | Dec 12, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
Quortum recently completed an Insider Threat Vulnerability Assessment (ITVA) on Quest Knight Enterprises (QKE), a Leesburg, Virginia-based SBA-certified HUBZone Defense Contractor. Founded in 2009, QKE provides industry and government clients with mission-critical,...