by Joey Alonso | Oct 24, 2016 | Assessments, Behavioral and Psychological Analysis, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Security Awareness, Services, Threats, Trusted Business Partners, Workplace Violence
Just read another good article that posed a question all us should be thinking about….. “How do you determine when someone becomes malicious?” Statistics show most malicious employees didn’t join their company with the intent of stealing IP, customer data or...
by Joey Alonso | Oct 21, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments
At the end of this post is a link to a really good article on the practicality of the requirements imposed on Cleared Defense Contractors to have an Insider Threat Program in-place by November 30, 2016. As the folks in article said, having a program that meets DSS’...
by Joey Alonso | Oct 17, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
I had the pleasure of “Channeling Security” with Lorna Garey (@lornagarey), tech-writing guru at Channel Partners, recently and had a great opportunity to discuss what many aren’t thinking about when trying to stop Insider Threats. IT’S THE PEOPLE! Quortum partners...
by Joey Alonso | Oct 13, 2016 | Blog, Cyber Forensics, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, Mobile Security, Physical Security, Privacy, Security Awareness, Services, Threats
Earlier this year, the CTO over at ObserveIT held a Webinar with an experienced Insider Threat prosecutor who provided a very thorough overview of employee monitoring and privacy concerns. If you are considering adding or upgrading your employee monitoring...
by Joey Alonso | Oct 10, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
The FBI has some great recommendations on how to best protect an organizations Intellectual Property (IP). But when you really look them, they’re pretty common sense. So, that begs the question….. Does the FBI feel organizations aren’t using common sense security...
by organiccommunications | Sep 26, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
Your company, no matter the size or Industry, will benefit from our service Every company or organization has a secret sauce – a technology, a methodology, or other intellectual property that gives the company value. In addition, they have sensitive employee and...