classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Watching your back: countering industrial espionage the intelligent way
October 2002, News

To many companies security badges, sign-in sheets, video cameras and other physical surveillance methods create a wall of protection against information theft. However, with most penetrations and information loss coming from within an organisation, these measures alone cannot adequately protect a company.

"Most penetrations and compromises are perpetrated by the target's own employees, by electronic or cyber intrusion, surveillance or photography," said Howard Griffiths, managing director of Griffiths & Associates. "In addition, significant amounts of company strategy are often given away in company websites, publicity material and at trade fairs, all unwittingly," he said.

"The official FBI statistics in the US are that at any one given period in time, that bureau has nearly 1000 open investigations into extremely serious cases of economic espionage of trade secret thefts," Griffiths said. "The only way to counteract activity on this scale is for companies to implement both reactive and preventative counter intelligence programs."

These programs should include employee training, site surveys, inspections and investigations. The company should also develop and maintain files on alleged, reported, and actual attempts at penetration. "Every company must have a counter intelligence manual outlining procedures for the protection of sensitive information, including how to handle incidents that occur," said Griffiths. These manuals should then be made available to personnel within responsible offices so that any incident can be dealt with promptly and consistently.

Overall strategy

The first step in developing such an overall strategy must be the conducting of a vulnerability assessment. The following checklist of important issues is an example of the type of information to be collected in this assessment:

* Employee names, titles, and position, for employees in sensitive positions.

* Responsibilities and types of access to sensitive data.

* Identification of those with whom each employee is authorised to share sensitive information.

* Audit trails and records kept relative to individuals who have been given access to proprietary data.

* Activities where employers could be approached by intelligence gatherers, such as seminars and workshops. Employees should be asked to describe any contacts initiated by other persons seeking any type of corporate data.

* Any gratuities offered or received from providing any type of corporate data. Employees should be asked to identify all types of corporate data being elicited and what responses were given and any ensuing conversation with the person asking for the information.

"The information gathered from this checklist and the general assessment will indicate strengths and weaknesses in the company's protective posture," said Griffiths. It will help security personnel determine which of the company's operations might be likely targets of business intelligence efforts and, just as importantly, allow the company to determine which counter intelligence strategies to put into place."

For more information contact Howard Griffiths, Griffiths & Associates, 011 786 8556, howard@griffithsonline.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • From the editor’s desk: Integrate or fail
    October 2018, Technews Publishing, News
    The news earlier this month was that Bloomberg Businessweek published a story about Chinese cyber spies (well, with our media it has to be them or the Russians). Apparently, these devious spies had corrupted ...
  • Digital banking crime statistics
    October 2018, This Week's Editor's Pick, News
    The South African Banking Risk Information Centre (SABRIC) has released its inaugural digital banking crime statistics.
  • News in brief
    October 2018, News
    A round-up of some of the news happenings of the past month.
  • CyberGym launches South African arena
    October 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, News, Training & Education
    Wolfpack recently introduced a new cybersecurity training service to South Africa. CyberGym is an Israeli company that specialises in real-life cyber training, teaching students with real world simulations.
  • ESDA golfs for the poor
    October 2018, ESDA (Electronic Security Distributors Association, News, Conferences & Events, Associations, Training & Education
    The ESDA charity golf day was held at the Benoni Country Club on 20 September 2018 in aid of AMCARE.
  • Cam Era launches security franchise
    October 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, News
    New security franchise available in South Africa based on visual verification technology. Franchisor says no technical skills required.
  • West Africa gets secure
    October 2018, Training & Education, News, Conferences & Events
    Securex West Africa is the exhibition and conference shaping the Nigerian security, fire and safety industry.
  • Stallion’s acquisition of MASC promises growth
    October 2018, Technews Publishing, News, Integrated Solutions
    In March this year, Stallion Security acquired MASC Solutions as a continuation of its efforts to expand beyond its established strengths and take advantage of new market opportunities.
  • Open Security & Safety Alliance launched
    October 2018, News, Associations
    Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco by Schneider Electric and VIVOTEK are founding members supporting the launch of The Open Security & Safety Alliance.
  • GreyEnergy group targeting critical infrastructure
    October 2018, Cyber Security, News
    ESET researchers reveal a successor to the feared BlackEnergy APT group - in the footsteps of a feared threat actor, with a new arsenal of tools.
  • J2 offers enterprise-grade security for SMEs
    October 2018, J2 Software, Cyber Security, News
    Rising levels of cybercrime, and its increasing sophistication, threaten businesses of all sizes but SMEs are particularly vulnerable.
  • New Panasonic appointment
    October 2018, Panasonic South Africa, News
    Natalie Winkworth has been appointed as sales and marketing admin manager at Panasonic SA.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.