by Joey Alonso | May 23, 2019 | Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
There is no denying the threats focused on small and medium-sized businesses from intentional and accidental Insiders. I want you to think about what you’re doing to mitigate those threats and that shapes the perception of your company to would be partners, especially...
by Joey Alonso | Dec 19, 2016 | Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
There is no denying the threats focused on small and medium-sized businesses from intentional and accidental Insiders. I want you to think about what you’re doing to mitigate those threats and that shapes the perception of your company to would be partners, especially...
by Joey Alonso | Dec 12, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
Quortum recently completed an Insider Threat Vulnerability Assessment (ITVA) on Quest Knight Enterprises (QKE), a Leesburg, Virginia-based SBA-certified HUBZone Defense Contractor. Founded in 2009, QKE provides industry and government clients with mission-critical,...
by Joey Alonso | Nov 17, 2016 | Assessments, Assessments, Behavioral and Psychological Analysis, Blog, Cyber Forensics, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
I enjoyed this linked article from our friends at Digital Journal, across the pond, and thought I’d share my thoughts on the 3 Organizational Insiders they addressed so well. I spend many days talking about Insider Threats and Economic Espionage with small and...
by Joey Alonso | Oct 24, 2016 | Blog, Cyber Forensics, Foreign Threats, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Mobile Security, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Threats, Trusted Business Partners
I have a little bit of previous insight into the threats posed using foreign designed and built equipment, most of which can’t be shared with the general public. A few months ago, I was interviewed by the Editor of Supply Chain and Demand Executive Magazine, where I...
by Joey Alonso | Oct 24, 2016 | Assessments, Behavioral and Psychological Analysis, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Security Awareness, Services, Threats, Trusted Business Partners, Workplace Violence
Just read another good article that posed a question all us should be thinking about….. “How do you determine when someone becomes malicious?” Statistics show most malicious employees didn’t join their company with the intent of stealing IP, customer data or...