Cyber Security

Security convergence is the consolidation of traditionally disparate risk management spheres of influence, Physical Security, Information Security and Compliance into a unified view of risk. Find Out More.

Compliance

We maintain extensive partnerships with regional accounting and audit firms. Find Out More.

NESP_Color

New England Safety Partners helps small and medium sized business with comprehensive Risk Management services in cyber securityphysical security and compliance management.

Please contact us for details. 

****

Proud Sponsor of the Boston Chapter of InfraGard

ig_logo

NESP consultants had a very thorough understanding of the PCI-DSS requirement. (The word ‘encyclopedic’ comes to mind.) This was very helpful in areas where the written standard leaves room for interpretation. In those situations, they helped us to assess our risk and to develop practical solutions.

They brought strong operating systems and networking expertise. They quickly earned the respect of, and collaborated effectively with, our technical staff. Consistently their recommendations were technically sound.

Information Security Staff Member, Large University

Working with technology and people can be messy and a sometimes befuddling proposition. NESP exercised effective people skills in balance with deep understanding of project technical issues to yield positive results for ITG.

CEO, Interactice Tactical Group

NESP was a strong business partner on information security issues particularly as they related to our employees, data security, data access and data controls. They were instrumental in putting a robust information security program in place for the organization, and for educating senior management on the criticality of security awareness. They demonstrated strong technical expertise, but also had the ability to align with business demands/appetite.

VP HR, Property and Casualty Insurance Company

Why Is Your Location Data No Longer Private?

The past month has seen one blockbuster revelation after another about how our mobile phone and broadband providers have been leaking highly sensitive customer information, including real-time location data and customer account details. In the wake of these consumer privacy debacles, many are left wondering who’s responsible for policing these industries? How exactly did we get to this point? What prospects are there for changes to address this national privacy crisis at the legislative and regulatory levels? These are some of the questions we’ll explore in this article.

read more

3 Charged In Fatal Kansas ‘Swatting’ Attack

Federal prosecutors have charged three men with carrying out a deadly hoax known as “swatting,” in which perpetrators call or message a target’s local 911 operators claiming a fake hostage situation or a bomb threat in progress at the target’s address — with the expectation that local police may respond to the scene with deadly force. While only one of the three men is accused of making the phony call to police that got an innocent man shot and killed, investigators say the other two men’s efforts to taunt and deceive one another ultimately helped point the gun.

read more

Your Hump Day Reading List for May 23, 2018

I have no witty introduction this week, just a hand-curated assortment of articles that are worth your time to read. And a plug for my PDN show at the end (don’t miss it!)
 
A look at how to hold a revolver
I cover proper grasp in depth in my Threat-Centered Revolver course, because I believe it to be the single most important step to shooting a revolver well. The ideal revolver grasp is also different than the ideal …

The post Your Hump Day Reading List for May 23, 2018 appeared first on www.GrantCunningham.com.

read more

Mobile Giants: Please Don’t Share the Where

Your mobile phone is giving away your approximate location all day long. This isn’t exactly a secret: It has to share this data with your mobile provider constantly to provide better call quality and to route any emergency 911 calls straight to your location. But now, the major mobile providers in the United States — AT&T, Sprint, T-Mobile and Verizon — are selling this location information to third party companies — in real time — without your consent or a court order, and with apparently zero accountability for how this data will be used, stored, shared or protected.

It may be tough to put a price on one’s location privacy, but here’s something of which you can be sure: The mobile carriers are selling data about where you are at any time, without your consent, to third-parties for probably far less than you might be willing to pay to secure it.

read more

A new way of looking at likelihood and plausbility

A couple of decades back I started to talk to my defensive shooting students about the likelihood of being attacked and needing to use their firearm to defend themselves. It seemed to me that some people, based on their lifestyle and habits, were more likely to need to use lethal force than others.
It also seemed to me that, even when the defensive firearm was actually needed, the mode of employment varied greatly; sometimes the sight of the gun …

The post A new way of looking at likelihood and plausbility appeared first on www.GrantCunningham.com.

read more

A new way of looking at likelihood and plausbility

A couple of decades back I started to talk to my defensive shooting students about the likelihood of being attacked and needing to use their firearm to defend themselves. It seemed to me that some people, based on their lifestyle and habits, were more likely to need to use lethal force than others.
It also seemed to me that, even when the defensive firearm was actually needed, the mode of employment varied greatly; sometimes the sight of the gun …

The post A new way of looking at likelihood and plausbility appeared first on www.GrantCunningham.com.

read more

T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account

T-Mobile is investigating a retail store employee who allegedly made unauthorized changes to a subscriber’s account in an elaborate scheme to steal the customer’s three-letter Instagram username. The modifications, which could have let the rogue employee empty bank accounts associated with the targeted T-Mobile subscriber, were made even though the victim customer already had taken steps recommended by the mobile carrier to help minimize the risks of account takeover. Here’s what happened, and some tips on how you can protect yourself from a similar fate.

read more

Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers Without Consent in Real Time Via Its Web Site

LocationSmart, a U.S. based company that acts as an aggregator of real-time data about the precise location of mobile phone devices, has been leaking this information to anyone via a buggy component of its Web site — without the need for any password or other form of authentication or authorization — KrebsOnSecurity has learned. The company took the vulnerable service offline early this afternoon after being contacted by KrebsOnSecurity, which verified that it could be used to reveal the location of any AT&T, Sprint, T-Mobile or Verizon phone in the United States to an accuracy of within a few hundred yards.

read more

Your Hump Day Reading List for May 16, 2018

Is it Wednesday again already? How time flies when I’m collecting articles to share with you!
 
Credit card thieves are amazingly enterprising
Krebs on Security posted this article about credit card skimmers — but this time there’s a new wrinkle: they were placed on card scanners at the checkout lines of grocery stores, right under the noses of the clerks. He even ahs video of one being placed — watch how quickly it happens! Skimmers are everywhere, and …

The post Your Hump Day Reading List for May 16, 2018 appeared first on www.GrantCunningham.com.

read more

Detecting Cloned Cards at the ATM, Register

Much of the fraud involving counterfeit credit, ATM debit and retail gift cards relies on the ability of thieves to use cheap, widely available hardware to encode stolen data onto any card’s magnetic stripe. But new research suggests retailers and ATM operators could reliably detect counterfeit cards using a simple technology that flags cards which appear to have been altered by such tools.

read more