by Joey Alonso | May 23, 2019 | Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
There is no denying the threats focused on small and medium-sized businesses from intentional and accidental Insiders. I want you to think about what you’re doing to mitigate those threats and that shapes the perception of your company to would be partners, especially...
by Joey Alonso | May 14, 2019 | Blog, Human Resources, Information Technology, Insider Threat Program Management, Insider Threats, Legal and ethical policies and procedures, Physical Security, Security Awareness, Trusted Business Partners
Just read another good article that posed a question all of us should be thinking about….. “How do you determine when someone becomes malicious?” Statistics show most malicious employees did not join their company with the intent of stealing IP or customer data, or...
by Joey Alonso | Dec 19, 2016 | Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
There is no denying the threats focused on small and medium-sized businesses from intentional and accidental Insiders. I want you to think about what you’re doing to mitigate those threats and that shapes the perception of your company to would be partners, especially...
by Joey Alonso | Dec 12, 2016 | Assessments, Assessments, Blog, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Interviews, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Security Awareness, Threats, Trusted Business Partners, Vulnerability Assessments
Quortum recently completed an Insider Threat Vulnerability Assessment (ITVA) on Quest Knight Enterprises (QKE), a Leesburg, Virginia-based SBA-certified HUBZone Defense Contractor. Founded in 2009, QKE provides industry and government clients with mission-critical,...
by Joey Alonso | Nov 29, 2016 | Assessments, Behavioral and Psychological Analysis, Blog, Human Resources, In-depth Vulnerability Assessments, Insider Threat Program Management, Insider Threats, Legal and ethical policies and procedures, Physical Security, Security Awareness, Services, Threats, Trusted Business Partners, Workplace Violence
Pardon the “personalness” of this post but I wept when I first learned of the Chattanooga, Tennessee bus driver who, according to initial reporting, intentionally drove off the road with a busload of kids. As the father of a teen and a tween, who ride the bus to/from...
by Joey Alonso | Nov 17, 2016 | Assessments, Assessments, Behavioral and Psychological Analysis, Blog, Cyber Forensics, Human Resources, In-depth Vulnerability Assessments, Information Technology, Insider Threat Program Management, Insider Threats, Intellectual Property Protection, Intellectual Property Theft Prevention, Legal and ethical policies and procedures, NISPOM Change 2 Solutions, Physical Security, Privacy, Security Awareness, Services, Threats, Trusted Business Partners, Vulnerability Assessments, Workplace Violence
I enjoyed this linked article from our friends at Digital Journal, across the pond, and thought I’d share my thoughts on the 3 Organizational Insiders they addressed so well. I spend many days talking about Insider Threats and Economic Espionage with small and...