Information Security and Technical Surveillance Countermeasures
Our highly trained experts employ the most advanced technical equipment available and can guide you through the security controls that address the risks that affect your organization.
When organizations lose information, the cause can be traced to one – or more – of five risk factors: people, paper documents, information technology systems, other electronic devices, such as tablets or memory sticks, and surveillance devices (bugs).
Our experts can guide you in the selection and implementation of security controls that address these risks; both individually and how they intersect in your organization.
While hackers often grab the headlines, your employees or other insiders really pose the greatest threat to your information. In fact, according to a survey in 2013 of compliance executives in the healthcare industry, nearly two-thirds of data breaches were due to the loss of paper files and portable memory sticks by employees. There are security strategies that you can implement, however, that are often applicable to several risks.
For example, appropriate access controls and need-to-know policies can mitigate risks from people, paper documents and information technology systems. Likewise, enforcing proper disposal/storage methods can help keep paper documents out of the wrong hands. Requiring the use of encrypted portable devices can limit damage if one is lost or stolen.
If you think that all of this electronic surveillance activity is driven by competitors trying to score a market advantage over another, you need to think again. Other strong motivations exist, like personal blackmail, securities or financial fraud, or advocacy group activities. Compounding the threat is that eavesdropping devices are not only becoming incredibly sophisticated, but also readily available at affordable price points. So, chances are very good that at some point – perhaps even now – you will be victimized by some kind of electronic surveillance. In order to counter these threats, Kroll conducts TSCM sweeps on a regular and as-needed basis for many corporations and individual clients at venues and locations around the world. We employ the most advanced technical equipment available and our specialists are highly trained in this discipline, many of whom have a background in intelligence services or as telecommunications specialists. They will carry out discreet sweeps during the daytime, evening, or weekend to minimize disruption to your operations or family life.