Additional Posts

Human Resources team conducting internal investigations with current employees

Aug 10 2022

Blog

The First Steps for Conducting Internal Investigations

Written by: James Hart When the call finally came, Raquel Henderson lunged for the phone on her desk.  Henderson was less than three months into her job as the HR director for a midsize family business in a rural part of the state. The company was the community’s largest employer ...
Read More
theft of trade secrets: A business man with his head in his hands dispairingnover the loss of his trade secrets. Theft of trade secrets is big problem for businesses.

Aug 2 2022

Blog

Theft of Trade Secrets: How to Prevent the Loss of Key Intellectual Property

Written by: James Hart The names have been changed, but the following story is a compilation of real situations faced by real businesses. Doug Medford had never considered himself paranoid. But there were too many coincidences to merely be coincidental.  Medford, the CEO of a small Midwestern manufacturer, learned that ...
Read More

Apr 6 2022

Blog

How to Prepare for a Cyberattack

Written by: Dell Spry At Chesley Brown, nothing is more sacrosanct than the safety and security of our clients. It is our intention to keep you educated, updated, and informed as world events continue to unfold and keep you aware of what the potential consequences of those events to your ...
Read More
Picture of the Empire State Building in the foreground on September 11th with the buring World Trade Towers in the background

Sep 2 2021

Blog

How the Events of September 11th Have Impacted National Security

How Has National Security Evolved Since September 11th, 2001? Written by: Dell Spry As I sit and write this paper, Afghanistan is collapsing.  It is not my intention to point the finger at anyone and make politics a central theme of this paper, but it would be hypocritically pointless to ...
Read More
The Colonial Pipeline Attack revealed how underprepared our nation's critical infrastructure is to outside threats.

May 20 2021

Blog

A Nation Under Attack: The Colonial Pipeline Attack

Written by: Dell Spry Introduction: Before the Colonial Pipeline Attack In earlier centuries wars were fought between nation states to acquire water and fertile land. Then came the quest for natural resources; gold, silver, oil. These wars were fought utilizing large armies requiring massive supplies to achieve their goal of ...
Read More
security risk firm at a A office tower

Feb 2 2021

Blog

Reasons to Hire an Outside Security Risk Firm

The security services industry is one of the fastest growing industries in America today. With so many disruptive technologies, emerging threats, and the growing frequency of natural disasters, its easy to understand why -- It can be exceedingly difficult to keep up with the myriad risks facing your organization. So ...
Read More
preventing economic espionage, trade secret theft and intellectual property theft

Jan 26 2021

Blog

The Ultimate Guide for Small Businesses to Combat Economic Espionage

For decades, the US has been a victim of economic espionage — a foe that is now costing American companies billions of dollars in lost revenue. From hacking government websites to infiltrating research institutions with spies, competitors and foreign governments are pulling out all the stops to steal trade secrets. ...
Read More
Protestors storming the captiol in an act of civil unrest, insurection

Jan 19 2021

Blog

Preventing Civil Unrest

We’ve all recoiled in disbelief and horror as we watched scenes of violence stream across our TVs. The violent insurrection we saw in the U.S. capitol was unprecedented. That is to say nothing of the  collapse in security measures and barriers that allowed rioters to breach our nation’s capitol. Deservedly ...
Read More
Vulnerability assessments and management in the new risk landscape. Threat assessment

Jan 12 2021

Blog

What Achilles can Teach us About Threat Management

By: Dell Spry There are numerous similar, seemingly inconsequential, soft targets scattered across our country unprotected by a single surveillance camera or even a strand of barbed wire. Is this issue getting the attention it deserves? Just whose responsibility is it to make that determination? Have you included threat planning ...
Read More
The solarwinds supply chain hack represented by 6 locks, one of which is a different color

Jan 5 2021

Blog

The SolarWinds Supply Chain Attack: What Businesses Need to Know

What is the SolarWinds Supply Chain Attack? SolarWinds, the Austin-based cybersecurity firm, found itself in the middle of a catastrophe due to internal security lapses. The firm recently earned headlines for making it to the list of unsuspecting service providers targeted for its elite supply chain. A week ago, the ...
Read More