How NASA Could Have Avoided Getting Hacked

How NASA Could Have Avoided Getting Hacked

When you think of NASA, you think of the cutting edge of science and space exploration. These are the people who were responsible for the moon landing, the Mars missions, and countless technological innovations that have defined the world as we know it today. What you might not think of is inadequate and out-of-date security, […]

Read More +

Corporate Espionage & The Insider Threat:

Effective Risk Management Requires More Than A Strong Cybersecurity Program

With a global cost of $445 billion annually, cybercrime and espionage[1] are a significant risk to an organization’s bottom line. US businesses seeking to effectively manage their risks cannot overlook the threat they pose or their potential financial implications. According to a recent study by Allianz, cybercrime, IT failures, espionage and data breaches are ranked the third most important US business risk[2], preceded in importance only by business interruptions/supply chain risks (ranked 1st) and natural catastrophes (ranked 2nd). Regardless if the threat is foreign or domestic, perpetrated by a company insider or an outsider, a single event can result in damage to brand reputation, lead to an erosion of customer confidence and/or financially devastate the affected company. In today’s digital world, a comprehensive cybersecurity program is a necessity, but relying solely on cybersecurity to address cybercrime and corporate espionage risks simply is not sufficient. J.D. LeaSure, President/CEO of ComSec LLC and a counterespionage expert, provides valuable insight into protecting corporate information from insider threats that corporate cybersecurity programs do not address.

Read More +

The Company Man: Protecting America’s Secrets

Note: The below video is based on an actual FBI case. And, illustrates the necessity to implement a ComSec TSCM Service Option as a crucial component of your companies risk management program. Don’t allow YOUR company to become one of the FBI’s corporate espionage statistics! Contact ComSec today, we can help. ~JDL As part of […]

Read More +

Cybersecurity – A Comprehensive Approach to Balancing Risks & Rewards

Cybersecurity – A Comprehensive Approach to Balancing Risks & Rewards Key Considerations From CEO Prioritization to TSCM / Cyber TSCM Inclusion Ask your CIO or CISO if your company is winning the cybersecurity war, and the reply may not be the confident, positive affirmation the CEO or the Board of Directors wants to hear. Why? […]

Read More +

Cybersecurity – Vulnerabilities Your IT Department Won’t Recognize

Achieving Corporate Cybersecurity Objectives with C-Suite Involvement Developing corporate strategy is one of many C-suite responsibilities. Whether you are the CEO, CFO, COO, CSO, CIO or CISO, you must be a strategic thinker who can ensure corporate objectives are fulfilled. Whether you are responsible for protecting intellectual property, controlling finances or managing brand reputation, input […]

Read More +

Cyber Counterespionage – Cyber TSCM Risk Management

Selecting the services provided by a competent, professional and trust-worthy Technical Surveillance Counter Measures or Cyber TSCM Service Provider can be a difficult decision. But, equipped with the right information, you can be assured to identify the right candidate for your assignment. By J.D. LeaSure, CCISM, President/CEO How can you identify the best TSCM service […]

Read More +

Healthcare Cyber Security – TSCM & Risk Management

Healthcare Cyber Security – TSCM & Risk Management By J. D. LeaSure, President/CEO ComSec LLC Healthcare related cybercrime continues its very remarkable upward trend. Electronic Health Records (EHRs), online healthcare portals, the street value of stolen Protected Health Information (PHI / e-PHI) / Individually Identifiable Health Information (IIHI) and limited cyber security programs have all contributed […]

Read More +

TSCM & Cyber TSCM – A Vital Part of Your Financial Institution’s Cyber Security Program

TSCM & Cyber TSCM –A Vital Part of Your Financial Institution’s Cyber Security Program By J. D. LeaSure, President/CEO ComSec LLC The cybersecurity programs of American businesses need to improve! Ask consumers and they’ll agree. With major data leaks by large retailers and financial institutions, most consumers have been impacted, either directly or indirectly. Regulators […]

Read More +

Mobile Spy & Cellular Bugging: How Can I Tell If My Mobile Phone is Tapped?

Most cell phone owners aren’t fully aware of the fact that their own mobile phones can turn them into misfortunate victims of modern espionage. Nowadays, advanced technology has led to the creation of highly sophisticated spyware programs that can transform your cell phone into an accurate source of information, an open microphone exploited by eavesdroppers […]

Read More +

Industrial Espionage: Five Clues You May be a Target of Competitive Intelligence

Industrial espionage, also listed under the “competitive intelligence” metaphor, is considered a powerful risk factor by millions of influent businessmen who are willing to invest a lot of money in programs, tools and experts allowing them to protect their privacy and their confidential, sensitive information on secret negotiations, important clients, huge business deals, new strategies […]

Read More +