Keep your company and facility ready to respond to any possible emergencies Whether it’s the earthquake drill often practiced in elementary schools or the blaring fire alarms alerting an office to head outside, Emergency Action Plans (EAPs) play a significant role in all areas of life and work. And while they might feel tedious or monotonous at times, that is for good reason. Some of the … [Read more...] about Best Practices to Maintain and Enact an Emergency Action Plan
What should you do with classified information during an emergency? For any company that holds a Facility Clearance (FCL) and is thus approved to access classified information, having a Facility Security Officer (FSO) who knows how to protect that material during emergencies is essential. Companies that hold or store classified information are known as possessing facilities. All are required to … [Read more...] about Protecting Classified Information During Emergencies at Your Cleared Facility
Tips on how to protect your PII to keep it out of scammers’ hands Identity theft remains the most common type of fraud in the U.S., and having your identity stolen can come with a hefty price tag or cost you your credit score. There were more than 1.1 million reports of identity theft made to the Federal Trade Commission in 2022. Typically, criminals will attempt to steal your information … [Read more...] about How to Protect Yourself From Identity Theft
Is AI something to fear, or a tool you can learn to use? Artificial Intelligence, or AI, is developing at a breakneck speed. While there are many innocuous uses, like using it to generate the most bizarre art prompts you can think of, it could pose a risk to your company security. At the same time, it could be harnessed to help strengthen your security. AI is evolving at such a rapid pace … [Read more...] about How Will AI Impact the Future of Security?
Know how to prevent insider threat by knowing what to look for Insider threats are a major danger to organizations. In the last two years, the cost of an insider threat incident has risen 44% to $15.38 million per incident on average, according to the 2022 Ponemon Cost of Insider Threats Global Reports. An insider threat can compromise your company’s security, leak proprietary information or … [Read more...] about How Does Someone Become an Insider Threat?
Examples of situations that should be reported to an FSO while you’re traveling abroad Your foreign travel reporting requirements don’t end with letting your Facility Security Officer (FSO) know you’re headed out on vacation. While you’re there, you can’t turn off your security brain completely. You have to remain on the lookout for suspicious behaviors that could put the classified information … [Read more...] about What Situations Should You Report While Traveling?
How you can recognize and respond to elicitation techniques Elicitation is one of the oldest forms of espionage in the world. All it requires is someone who knows how to manipulate a conversation to get information they want without the other person realizing they’re giving up secrets they shouldn’t. When elicitation happens, there are ways to combat it, known as counter-elicitation. What is … [Read more...] about The Ins and Outs of Elicitation and Counter-Elicitation
Why radio frequency shielding is an increasingly important part of SCIF and SAPF security Unintentional emanations have been a security concern since WWII, but in an increasingly technologically dependent and online world, that concern has multiplied. Radio Frequency (RF) shielding is being included in more SCIF and SAPF construction projects to keep adversaries from taking advantage of signals … [Read more...] about An Overview of RF Concerns for SCIFs and SAPFs
As phishing attacks rise, knowledge is the greatest weapon to combat them There was a 76% increase in direct financial loss as a result of phishing attacks from 2021 to 2022 according to Proofpoint’s 2022 State of the Phish report. As phishing attacks increase, scammers find new techniques and tools to trick people into giving up information or sending money. Arming personnel with knowledge of … [Read more...] about Phishing Technique Trends You Need to Know and How to Spot Them