13 Sneaky Ways FBI Agents Protect Their Homes

2019-03-26T16:04:40-07:00April 18th, 2018|

Who better to get advice on home protection than FBI agents who have studied and observed the minds of criminals? Even better? These home security tips are totally doable!

“Oftentimes, crime can be discouraged by the mere presence of an alert neighbor,” says Douglas Kane, president of Risk Control Strategies and a 27-year veteran of the […]

The New NIST Guidelines: We Had it All Wrong Before

2019-03-26T16:04:40-07:00January 8th, 2018|

Passwords are an essential part of online security measures. The push in recent years was to make passwords more complex with added characters and numbers, and had been lauded first as a crucial, and then became an oft-required layer of security.

Those guidelines were issued by The National Institute of Standards […]

Why Don’t More Companies Use Multi-Factor Authentication?

2019-03-26T16:04:40-07:00November 6th, 2017|

The world is a lot smaller these days, with an ever-increasing interconnectedness. With this ease of connection, digital sharing, and online transactions, more and more sensitive data is exchanged. Yet, with the prevalence of data breaches in the news lately, it’s surprising that many companies are complacent about the level of security afforded […]

The Ever-Rising Risk of Security Breaches

2023-06-13T10:29:02-07:00October 16th, 2017|

About mid-August this year, the hospitality sector throughout Europe and the Middle East was subjected to a cyber security threat by cyber espionage group known as advanced persistent threat group number 28 (APT28).

Beginning in early July 2017, a spearfishing hack victimized travelers in these areas via email with an attachment document sent to targeted hotels. […]

It’s not always what it appears to be!

2017-02-06T10:14:31-08:00February 6th, 2017|

RCS professionals continue to keep you advised of the latest eavesdropping devices as they are identified. A member of our TSCM Team recently brought to my attention the item depicted below which was discovered on the internet. This is a self-contained video and audio recording system. The DVR, housed within the disguised transformer, will operate […]

How often should we have a TSCM Inspection and IT Audit performed?

2019-03-26T16:04:40-07:00January 20th, 2017|

Over the last year several of our clients have been the victim of illegal electronic eavesdropping. These discoveries have occurred during TSCM Inspections by observing electronic anomalies or through our physical search process, done in conjunction with each inspection. We continually witness the changes in technology which allow for eavesdropping devices to resemble almost any […]

Load More Posts
Go to Top