How is a counterespionage strategy created?
Murray Associates counterespionage strategies are based on: evaluation, remediation and vigilance.
Our initial visit to your location includes: an interview to learn about your organization's culture and concerns; a technical evaluation to discover illegal electronic surveillance activities and potential vulnerabilities; and a pro-active information-security evaluation.
Your receive written reports containing cost-effective recommendations based on our observations. Implementing our recommendations makes your organization a less attractive target. (You can trust our recommendations have your best interests in mind. We do not sell security products, nor do we accept any vendor benefits for mentioning them.)
The business landscape is ever-changing. Periodic return visits (usually quarterly) assure new attempts at electronic surveillance are caught quickly; before harm is done. New loopholes are discovered before advantage is taken of them. Security measures in place are tested to assure continued effectiveness, and/or to document corrective actions you take.