New IoT Devices Pose Spying Risk

New IoT Devices Pose Spying Risk

New IoT Devices Pose Spying Risk New IoT devices are emerging daily. The growth rate is astonishing. According to Juniper Research, the number of IoT devices in 2021 will reach an eye-opening 46 billion. Wow! These new IoT devices often make our lives easier. IoT devices can enhance efficiency, convenience, productivity or the overall quality […]

Read More +

Network Threats: Corporate Mobile Devices & Public Wi-Fi

Network Threats Corporate Mobile Devices Public WiFi

Network Threats : Corporate Mobile Devices & Public Wi-Fi It’s incredible how many people don’t realize that their mobile devices are vulnerable to hackers or electronic eavesdroppers. Countless individuals employed at corporations only think in terms of computers when considering cybersecurity. They only think of viruses and hackers, worming their way into desktops and laptops. […]

Read More +

Mobile Security : Are You Compromising Yours for Convenience?

compromising mobile security for convenience

Do you feel 100% secure in your organization’s mobile security preparations? Mobile security can be a scary thing when you don’t fully understand it. In the “real world,” you can see when a door isn’t locked, or a safe is left open. But in the digital world, it can require specialized training to know when […]

Read More +

Detecting Corporate Data Leak Exposures With OSINT

Data Leak Assessment

Do you want to know one of the biggest cybersecurity risks out there for individuals and organizations? Publicly accessible information. Every other week, you read about some massive organization that had their data hacked and released on the web. Sometimes, this data was out there on the dark web for months and months before anyone […]

Read More +

How NASA Could Have Avoided Getting Hacked

How NASA Could Have Avoided Getting Hacked

When you think of NASA, you think of the cutting edge of science and space exploration. These are the people who were responsible for the moon landing, the Mars missions, and countless technological innovations that have defined the world as we know it today. What you might not think of is inadequate and out-of-date security, […]

Read More +

Corporate Espionage & The Insider Threat:

Effective Risk Management Requires More Than A Strong Cybersecurity Program

With a global cost of $445 billion annually, cybercrime and espionage[1] are a significant risk to an organization’s bottom line. US businesses seeking to effectively manage their risks cannot overlook the threat they pose or their potential financial implications. According to a recent study by Allianz, cybercrime, IT failures, espionage and data breaches are ranked the third most important US business risk[2], preceded in importance only by business interruptions/supply chain risks (ranked 1st) and natural catastrophes (ranked 2nd). Regardless if the threat is foreign or domestic, perpetrated by a company insider or an outsider, a single event can result in damage to brand reputation, lead to an erosion of customer confidence and/or financially devastate the affected company. In today’s digital world, a comprehensive cybersecurity program is a necessity, but relying solely on cybersecurity to address cybercrime and corporate espionage risks simply is not sufficient. J.D. LeaSure, President/CEO of ComSec LLC and a counterespionage expert, provides valuable insight into protecting corporate information from insider threats that corporate cybersecurity programs do not address.

Read More +

Cybersecurity – A Comprehensive Approach to Balancing Risks & Rewards

Cybersecurity – A Comprehensive Approach to Balancing Risks & Rewards Key Considerations From CEO Prioritization to TSCM / Cyber TSCM Inclusion Ask your CIO or CISO if your company is winning the cybersecurity war, and the reply may not be the confident, positive affirmation the CEO or the Board of Directors wants to hear. Why? […]

Read More +

Cybersecurity – Vulnerabilities Your IT Department Won’t Recognize

Achieving Corporate Cybersecurity Objectives with C-Suite Involvement Developing corporate strategy is one of many C-suite responsibilities. Whether you are the CEO, CFO, COO, CSO, CIO or CISO, you must be a strategic thinker who can ensure corporate objectives are fulfilled. Whether you are responsible for protecting intellectual property, controlling finances or managing brand reputation, input […]

Read More +

Cyber Counterespionage – Cyber TSCM Risk Management

Selecting the services provided by a competent, professional and trust-worthy Technical Surveillance Counter Measures or Cyber TSCM Service Provider can be a difficult decision. But, equipped with the right information, you can be assured to identify the right candidate for your assignment. By J.D. LeaSure, CCISM, President/CEO How can you identify the best TSCM service […]

Read More +

Healthcare Cyber Security – TSCM & Risk Management

Healthcare Cyber Security – TSCM & Risk Management By J. D. LeaSure, President/CEO ComSec LLC Healthcare related cybercrime continues its very remarkable upward trend. Electronic Health Records (EHRs), online healthcare portals, the street value of stolen Protected Health Information (PHI / e-PHI) / Individually Identifiable Health Information (IIHI) and limited cyber security programs have all contributed […]

Read More +