The Hunter Becomes The Hunted

Ever get the feeling that you are being watched? Has that sensation become even more pronounced as you have transitioned into the digital age? How about if roles were reversed? Have you ever used software or available technology to keep an eye on children or colleagues or others in your world? Because the software is out there, and it extends beyond simply finding friends with your iPhone. Does the availability of such options make you feel safer or more vulnerable?

These are all great questions, and some of the questions that are being asked by the customers of mSpy, a purveyor of spy software, in light of the recent breaches that left more than 2 million records exposed. According to a recent Gizmodo report, the software was purchased in many cases to stalk victims, despite user agreement disclaimers that the software cannot be used for illegal purposes.

Antisocial Engineering

You put a lot of time into the development and cultivation of your applications and data. Your organization’s strength correlates directly to your staff’s ability to leverage that data and those applications to move your enterprise forward. What happens if someone uses one of your applications for purposes far beyond what you had ever imagined? What’s the recovery plan from such an invasion? The same is true for your data. Do you have a plan in place that enables you to recover from such a breach?

ICS asks these questions of clients every day, and we work hard to provide the answers where possible. At the very least, you should be asking these questions. Call today and let’s start a conversation.

ISO 9001 2015Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor