Why reading this long document matters and tips on how to be better informed on security policies The NISPOM (National Industrial Security Program Operating Manual), or 32 CFR Part 117, NISPOM, is the foundational cornerstone that enables Facility Security Officers (FSOs) to do their jobs well. It outlines a variety of protocols including how to maintain facility clearances (FCLs), what to do … [Read more...] about The Importance of Understanding the NISPOM
How Does Someone Become an Insider Threat?
Know how to prevent insider threat by knowing what to look for Insider threats are a major danger to organizations. In the last two years, the cost of an insider threat incident has risen 44% to $15.38 million per incident on average, according to the 2022 Ponemon Cost of Insider Threats Global Reports. An insider threat can compromise your company’s security, leak proprietary information or … [Read more...] about How Does Someone Become an Insider Threat?
How Does Acoustic Testing Work for SCIFs?
An overview of E366 testing and more for SCIFs and SAPFs When you’re discussing classified information, you can’t risk it being overheard. Because of this, acoustic protection is a crucial part of security for a SCIF or SAPF. Depending on where your facility is built, your Certified TEMPEST Technical Authority (CTTA) or Accrediting Official (AO) will determine what risk you face and what … [Read more...] about How Does Acoustic Testing Work for SCIFs?
What Situations Should You Report While Traveling?
Examples of situations that should be reported to an FSO while you’re traveling abroad Your foreign travel reporting requirements don’t end with letting your Facility Security Officer (FSO) know you’re headed out on vacation. While you’re there, you can’t turn off your security brain completely. You have to remain on the lookout for suspicious behaviors that could put the classified information … [Read more...] about What Situations Should You Report While Traveling?
The Ins and Outs of Elicitation and Counter-Elicitation
How you can recognize and respond to elicitation techniques Elicitation is one of the oldest forms of espionage in the world. All it requires is someone who knows how to manipulate a conversation to get information they want without the other person realizing they’re giving up secrets they shouldn’t. When elicitation happens, there are ways to combat it, known as counter-elicitation. What is … [Read more...] about The Ins and Outs of Elicitation and Counter-Elicitation
Common Security Mistakes and How to Address Them
Don't let small security mistakes cause big issues for your company When working in a secure space or anywhere that is concerned about company security, there are some security procedures employees often don’t follow. While these mistakes may seem insignificant, they create vulnerabilities in company security, and the more vulnerabilities there are, the more an adversary can take advantage … [Read more...] about Common Security Mistakes and How to Address Them
An Overview of RF Concerns for SCIFs and SAPFs
Why radio frequency shielding is an increasingly important part of SCIF and SAPF security Unintentional emanations have been a security concern since WWII, but in an increasingly technologically dependent and online world, that concern has multiplied. Radio Frequency (RF) shielding is being included in more SCIF and SAPF construction projects to keep adversaries from taking advantage of signals … [Read more...] about An Overview of RF Concerns for SCIFs and SAPFs
How to Sponsor an FCL for Another Company
The process for a cleared company to sponsor a Facility Clearance for a subcontractor When working on a contract for a government agency that requires access to classified information, you company may run into a situation in which they need to subcontract a portion of the work. This could be someone building walls on a construction project or filling a niche cybersecurity need for data you’re … [Read more...] about How to Sponsor an FCL for Another Company
Phishing Technique Trends You Need to Know and How to Spot Them
As phishing attacks rise, knowledge is the greatest weapon to combat them There was a 76% increase in direct financial loss as a result of phishing attacks from 2021 to 2022 according to Proofpoint’s 2022 State of the Phish report. As phishing attacks increase, scammers find new techniques and tools to trick people into giving up information or sending money. Arming personnel with knowledge of … [Read more...] about Phishing Technique Trends You Need to Know and How to Spot Them