|
Volume 4, Issue 4: May 2012 |
Keep Pace with Legal Requirements as Mobile Devices Inundate Offices
With 87% of employees confirming they use personal electronic devices for work, designing a workable "bring-your-own-device" program is probably overdue. The wave of mobile devices has already flooded your offices. It's time to figure out what to do about it. Read More... |
Digital Message Resonance and Its Impact on Economic Advantage
We know that businesses are leaking economic advantage every day through elicitation and social engineering, the exploitation of cyber vulnerabilities, and internal and external theft and sabotage. The new paradigm of leakage uses social media to communicate a message to an exponentially larger audience at the touch of a button. Read More... |
FBI warns travelers to beware attacks via hotel Wi-Fi
Hackers are targeting foreigners' laptops using hotel Wi-Fi, the Internet Crime Complaint Center and FBI have warned. What is your business doing to protect the technology that contains the intellectual property that is your economic advantage? Read More... |
US Cargo Theft - A Five-Year Review
Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. Read More... |
| You Just Can't Make This Up |
Government Files First Criminal Charges In BP Oil Spill
As businesses have evolved and grown, so have the ways we communicate. It is no longer as simple as a letter, meeting, or a phone call. Have you ever stopped to consider how your company would respond to a preservation letter or discovery request covering every communication device in the company? Read More... |
Yahoo chief executive Scott Thompson steps down
Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. This is simply not true. Read More... |
Ask an Expert
Submit your questions on protecting competitive intelligence, background investigations, security systems and technology, training, or anything else related to security and the protection of assets. Questions will be answered by our professionals and posted on our website. Names and identifying information will be kept confidential. Selected questions and answers will also be published in our newsletter. Submit your questions here |