Chesley Brown's highly trained experts employ the most advanced technical equipment available to guide you through designing, upgrading and implementing electronic security countermeasures.
We'll even help with reviewing and comparing vendor proposals to ensure you are getting the best and most appropriate solutions for your organization. Sometimes, the biggest, most damaging threats to your business and personal life can’t be seen. Covert surveillance devices may be small and hard to find, but what they capture can have a huge impact. Let Chesley Brown help you detect and prevent these intrusions.
When organizations lose information, the cause can be traced to one — or more — of five risk factors: people, documents, IT systems, other electronic devices, such as tablets or memory sticks, and surveillance devices (bugs). Our experts can guide you in the selection and implementation of security controls that address these risks; both individually and how they intersect in your organization.
While hackers often grab the headlines, your employees or other insiders really pose the greatest threat to your information. In fact, according to a survey in 2013 of compliance executives in the healthcare industry, nearly two-thirds of data breaches were due to the loss of paper files and portable memory sticks by employees. There are security strategies that you can implement, however, that are often applicable to several risks. For example, appropriate access controls and need-to-know policies can mitigate risks from people, paper documents and information technology systems. Likewise, enforcing proper disposal/storage methods can help keep paper documents out of the wrong hands. Requiring the use of encrypted portable devices can limit damage if one is lost or stolen. Designing, upgrading and implementing electronic security countermeasures such as access control systems, emergency call stations, and CCTV systems can be a daunting task. Only Chesley Brown has the tools, experience and know-how to fully insulate your organization from the many risks information loss can pose.
Technical surveillance countermeasures (TSCM)
Not all electronic surveillance activity is caused by competitors trying to score a market advantage. There are many motivations for stealing information including securities and financial fraud, blackmail, advocacy groups, and self-interest.
Compounding the threat is that eavesdropping devices are not only becoming incredibly sophisticated, but also readily available at affordable price points. So, chances are very good that at some point — perhaps even now — you will be victimized by some kind of electronic surveillance.
In order to counter these threats, Chesley Brown conducts TSCM sweeps on a regular and as-needed basis for many corporations and individual clients at venues and locations around the world. We employ the most advanced technical equipment available and our specialists are highly trained in this discipline, many of whom have a background in intelligence services or as telecommunications specialists. They will carry out discreet sweeps during the daytime, evening, or weekend to minimize disruption to your operations or family life.
Please contact us for more information on our approach as well as the equipment we use.
Additional Security Consulting Capabilities
Clients that rely on Chesley Brown Security Consulting and Management services often request additional services including: