classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Watching your back: countering industrial espionage the intelligent way
October 2002, News

To many companies security badges, sign-in sheets, video cameras and other physical surveillance methods create a wall of protection against information theft. However, with most penetrations and information loss coming from within an organisation, these measures alone cannot adequately protect a company.

"Most penetrations and compromises are perpetrated by the target's own employees, by electronic or cyber intrusion, surveillance or photography," said Howard Griffiths, managing director of Griffiths & Associates. "In addition, significant amounts of company strategy are often given away in company websites, publicity material and at trade fairs, all unwittingly," he said.

"The official FBI statistics in the US are that at any one given period in time, that bureau has nearly 1000 open investigations into extremely serious cases of economic espionage of trade secret thefts," Griffiths said. "The only way to counteract activity on this scale is for companies to implement both reactive and preventative counter intelligence programs."

These programs should include employee training, site surveys, inspections and investigations. The company should also develop and maintain files on alleged, reported, and actual attempts at penetration. "Every company must have a counter intelligence manual outlining procedures for the protection of sensitive information, including how to handle incidents that occur," said Griffiths. These manuals should then be made available to personnel within responsible offices so that any incident can be dealt with promptly and consistently.

Overall strategy

The first step in developing such an overall strategy must be the conducting of a vulnerability assessment. The following checklist of important issues is an example of the type of information to be collected in this assessment:

* Employee names, titles, and position, for employees in sensitive positions.

* Responsibilities and types of access to sensitive data.

* Identification of those with whom each employee is authorised to share sensitive information.

* Audit trails and records kept relative to individuals who have been given access to proprietary data.

* Activities where employers could be approached by intelligence gatherers, such as seminars and workshops. Employees should be asked to describe any contacts initiated by other persons seeking any type of corporate data.

* Any gratuities offered or received from providing any type of corporate data. Employees should be asked to identify all types of corporate data being elicited and what responses were given and any ensuing conversation with the person asking for the information.

"The information gathered from this checklist and the general assessment will indicate strengths and weaknesses in the company's protective posture," said Griffiths. It will help security personnel determine which of the company's operations might be likely targets of business intelligence efforts and, just as importantly, allow the company to determine which counter intelligence strategies to put into place."

For more information contact Howard Griffiths, Griffiths & Associates, 011 786 8556, howard@griffithsonline.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Habitual awareness
    August 2018, Technews Publishing, News
    Habits are very good things that allow us to carry out the many repetitive tasks we do every day. Our brains automatically form habits to make these repetitive tasks easier and allow us to do them ‘without ...
  • Is anyone paying attention?
    August 2018, Technews Publishing, News
    As we finish the August issue, including the local manufacturing feature, the latest unemployment numbers have just come out and make for pretty dismal, yet not unexpected reading. The manufacturing sector ...
  • CathexisVision wins Benchmark Innovation Awards 2018
    August 2018, Cathexis Technologies, News
    CathexisVision, the Video Surveillance Management Software Suite from Cathexis Technologies has taken top honours for the Benchmark Innovation Awards 2018 and been announced the overall winner in the Video Surveillance Software category.
  • On display at the ESDA Namibia Expo 2018
    August 2018, ESDA (Electronic Security Distributors Association, Conferences & Events, News
    The Electronic Security Distributors’ Association (ESDA) will be holding a one-day expo at the Windhoek Country Club in Namibia on 22 August 2018.
  • Affordable quality surveillance solutions
    August 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, News
    Longse Distribution hits the local market with quality surveillance solutions at affordable prices, along with a 3-year swap-out warranty.
  • PSiRA launches mobile app
    August 2018, News, Security Services & Risk Management
    PSiRA (The Private Security Industry Regulatory Authority) has launched a mobile app for the Android and Apple platforms to make is easier and more convenient for registered private security companies and the public to interact and obtain information from the organisation.
  • Input invited for SADC engineering study
    August 2018, News
    In 2011, the SADC (Southern African Development Community) ministers of science and technology endorsed an engineering needs and numbers study, to get a better understanding of the actual numbers of engineers, ...
  • News in brief
    August 2018, News
    A round-up of some of the news happenings of the past month.
  • Secutel launches workforce management app
    August 2018, Secutel Technologies, News, Security Services & Risk Management
    The SecuTraq app allows security companies the option of tracking their workforce through a mobile app that can be downloaded and installed for the security workforce, on their smartphones.
  • Logistics with drones
    August 2018, News
    New black entrant logistics company creating a niche through innovation with the help of drones and enterprise funding from Chevron South Africa.
  • Introducing CardzGroup Africa
    August 2018, CardzGroup, News, Access Control & Identity Management
    CardzGroup Africa provides off the shelf and bespoke card solutions alike, for a number of diverse businesses in every vertical segment.
  • Afrika Tikkun hosts it’s first ICT academy
    August 2018, Training & Education, News
    On Friday, 20 July 2018 Afrika Tikkun hosted its first Information Communication Technology (ICT) Academy launch in partnership with Think Tank under the theme ‘let’s tackle the ICT skills shortage’.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.