30DISC – Day 0 Welcome to the first day of the 30 Day Information Security Challenge. Strictly speaking, it will be a 31 Day Challenge because of our...
Practice what you preach! Over the past twelve months I have become increasingly aware that most non-tech people have very little understanding of even the most basic information...
USB Drives – the biggest security threat to organisations today? As you’ll note, the heading is a question. And it isn’t necessarily a rhetorical one. I’d be very happy for someone to offer a...
Spring in the air, porn in the workplace ‘Tis the season of love, and apparently for some, that includes stoking the embers whilst on the clock. Over the past two months we’ve...
What is Geospatial Searching. And why you should do it! “Keywords are King.” This is the mantra of the online world. If you want to find something, or you want to be found, it...
Increasing the value of physical surveillance through social media targeting intelligence One of the use cases we’ve been exploring with our clients has been employing targeting intelligence from social media to derive better value from...
What is pretexting? And why you don’t do it. Pretexting is an art. Well, done correctly, it is an art. So what is it, and if it’s so good, why shouldn’t I do...
How will your secretary handle cross-examination? Part III Finishing off this trilogy of posts (previous entries here and here), there is another important factor to consider when you tell your secretary to...
How will your secretary handle cross-examination? Part II In this post last week I discussed a meeting between myself and a client who asked why they would pay SMEE to collect social...
How will your secretary handle cross-examination? Part I During a recent pre-engagement meeting with a client, the Partner carrying the matter asked a pertinent but blunt question: “Why would I pay you...