With all the controversy about Russian hacking into the US election process as well as state-to-state incursions as from North Korea, China, and Iran, there’s a lot of buzz about cybersecurity. Every businessperson these days hopefully knows the basics – things like having an up-to-date virus program or being sure not to click on email attachments. But even in the human dimension not every employee understands the difference between phishing and spearphishing, for example. (The former is a broad-based attack to steal credentials including logins and passwords; the latter is a two-step process of attacking the friends and colleagues of a person first and then using those compromised accounts to attack the real target).
It’s complicated. As experts in technical surveillance countermeasures, we work the organizations both large and small to harden their resistance against such chicanery. The human element is key, of course. The staff must be educated to be aware of efforts to penetrate corporate cybersecurity. But other procedures are needed as well. Take the example of an overseas corporate meeting. VIPs might gather from around the globe in London or Brussels to discuss corporate strategy. Assembled in one place, they make an attractive target for competitors, both state and non-state actors. IMG’s programs for Technical Surveillance Countermeasures (TSCM) are based on decades of experience with diplomatic missions and government programs designed to contain the dispersion of sensitive information, and protect against hostile operations. Protecting critical information and the means to communicate it has more than ever become a necessity for organizations of all types and sizes. IMG’s consulting programs for Technical Surveillance Countermeasures (TSCM) are based on decades of experience with diplomatic missions and government programs designed to contain the dispersion of sensitive information, and protect against hostile operations. Our TSCM (Technical Surveillance Countermeasures) consultants can create a risk assessment for your corporation before a breach happens, or we can assist with consulting for eavesdropping detection and risk assessment after an event.
The first step in an engagement is a top-to-bottom security assessment. We look at the whole picture from three hundred and sixty degrees. It’s not just cybersecurity, after all, that’s the vulnerability. It’s the human element, too. It’s security for physical issues such as kidnappings of executives, robberies or other provocations. In today’s world, if you or your corporation have digital assets, you have to see the entire chain of vulnerability from man to machine and back again. A three hundred and sixty degree evaluation of your corporate security needs will involve everything from humans to computers. If you’re interested, contact one of our Technical Surveillance Countermeasure experts today.