Two decades of counter surveillance expertise, providing innovative solutions that protect what businesses values most – their information
About davidThis author has not yet filled in any details.
So far david has created 6 blog entries.
There are many types of listening devices available including hard wired, radio frequency, acoustic audio and optical bugs. Here we examine some of the most frequently used listening devices in the corporate espionage arena.
As the physical security in most organisations becomes increasingly impenetrable, criminals are turning to social engineering in an effort to circumvent these tough security regimes.
It is difficult to estimate how many organisations and individuals are victims of espionage. However, in reality, any person or company with information is at risk and a proactive TSCM Strategy can help mitigate the threat.
Corporate espionage or information gathering is big business. Recent news stories demonstrate just how common covert activity has become and highlights that today's threats do not come solely from competitors or overseas countries.
Esoteric is proud to announce that after a rigorous evaluation of its information security processes we have been granted ISO 27001 Certification by British Standards Institution (BSI)