TSCM for Office Renovations, Construction, and Cleaning

In the News
Published:
August 28, 2020

Renovations, Construction, and Cleaning—Do the Costs Include the Loss of Privacy?

With the onset of COVID-19, offices have become ghost towns and most people are working from home. Companies who have needed an empty C-Suite to complete upgrades, renovations, or “deep cleaning,” have taken advantage of the time. Company executives and high net worth individuals who may have secondary home sites are also taking advantage of this time to “change their scenery” while renovating their home offices.That said, there are some inherent risks associated with renovation and construction that you need to be aware of lest you put you, your family, or your company at risk.Most people and companies opt not to do background checks on those individuals performing home or office renovations.

There is typically no time or budget for that and since the “boss” is away, there is no obvious threat to him or her from the workers, which creates the intention to simply let them do their work.However, the technology that exists today is not only remarkable, but readily available—Drop Cam, Nanny Cam, and the list goes on – for any individual to access. For those just looking to get “an inside scoop” on the C-Suite, deploying any of these basic devices during a project would be easy.Still skeptical about this? Do not be. It happens. The success of a business first starts with an idea. That idea is then verbalized and discussed. Those discussions are then turned into an actionable plan. But what if your competitor intercepted the information while it was verbalized.

That new and innovative idea that you absolutely know is going to make its mark on your industry just got hijacked by your competitor.It is essential that companies and executives take a proactive approach to these potential landmines. Protective countermeasures should be a staple within your organization’s C-Suite as well as executive home offices when the inner sanctum has been “disturbed.”Technical Security Counter Measures (TSCM) should be part of every Security Operations Plan (SOP).

The technicians who perform these counter measures should be highly skilled and experienced. Your SOP should contain a TSCM sweep EVERY time an outside vendor works in or around an area that penetrates the “inner sanctum.” That area of your office where privileged conversation, phone calls, and meetings are held.The costs by some can be considered steep when pricing out TSCM. The equipment and skill set it takes to perform this type of work is unique and technical. You must ask yourself, however, as an office manager, estate manager, executive assistant, or security manager, what the costs would be if the privileged conversations or images being conducted by your executives were not so privileged anymore.

Let us use the current COVID-19 vaccine as an example.  Numerous companies are vying for development of the vaccine.  Your scientific team has worked on, developed, and are close to succeeding in bringing this vaccine to market.  Your C-Suite assembles in the newly renovated conference room under strict physical security to hear from the team and watch a power point. How devastating would it be to the company if your executives and scientific team really were not the only ones in the room? Contact Red5 to learn more about how we can help with your TSCM needs.

Red Five Communications

Subscribe for Cutting-Edge Security Insights!

Get the latest news, expert insights, and exclusive updates right in your inbox.

By clicking Sign Up you're confirming that you agree with our Terms and Conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Related Posts

Giving Tuesday: How to Give Back Thoughtfully This Holiday Season

It is important to give back thoughtfully. Learn what to look for this Giving Tuesday.
November 23, 2022

Technical Surveillance Countermeasures Live Monitoring: Who Needs It and Why?

Technical Surveillance Countermeasures (TSCM) is one of those highly sophisticated tools within the security practitioner’s toolbox. For most, it is that “odd-sized” tool that you would find toward the bottom of the box, just below the tools you use all the time.
March 30, 2021
Cyber Security

A Threat No One Can Ignore: The Threat of Ransomware Expands to Include Small and Medium Size Businesses

You likely heard about, and may have been affected by, the Colonial Pipeline Company ransomware attack in May 2021, but you probably are unaware of the ransomware attack that targeted Lincoln College later that year, forcing the institution to close in May 2022.
May 31, 2023

Let's discuss your security.

Partner with Red5 for unmatched intelligence and analysis expertise tailored to your needs.