classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Watching your back: countering industrial espionage the intelligent way
October 2002, News

To many companies security badges, sign-in sheets, video cameras and other physical surveillance methods create a wall of protection against information theft. However, with most penetrations and information loss coming from within an organisation, these measures alone cannot adequately protect a company.

"Most penetrations and compromises are perpetrated by the target's own employees, by electronic or cyber intrusion, surveillance or photography," said Howard Griffiths, managing director of Griffiths & Associates. "In addition, significant amounts of company strategy are often given away in company websites, publicity material and at trade fairs, all unwittingly," he said.

"The official FBI statistics in the US are that at any one given period in time, that bureau has nearly 1000 open investigations into extremely serious cases of economic espionage of trade secret thefts," Griffiths said. "The only way to counteract activity on this scale is for companies to implement both reactive and preventative counter intelligence programs."

These programs should include employee training, site surveys, inspections and investigations. The company should also develop and maintain files on alleged, reported, and actual attempts at penetration. "Every company must have a counter intelligence manual outlining procedures for the protection of sensitive information, including how to handle incidents that occur," said Griffiths. These manuals should then be made available to personnel within responsible offices so that any incident can be dealt with promptly and consistently.

Overall strategy

The first step in developing such an overall strategy must be the conducting of a vulnerability assessment. The following checklist of important issues is an example of the type of information to be collected in this assessment:

* Employee names, titles, and position, for employees in sensitive positions.

* Responsibilities and types of access to sensitive data.

* Identification of those with whom each employee is authorised to share sensitive information.

* Audit trails and records kept relative to individuals who have been given access to proprietary data.

* Activities where employers could be approached by intelligence gatherers, such as seminars and workshops. Employees should be asked to describe any contacts initiated by other persons seeking any type of corporate data.

* Any gratuities offered or received from providing any type of corporate data. Employees should be asked to identify all types of corporate data being elicited and what responses were given and any ensuing conversation with the person asking for the information.

"The information gathered from this checklist and the general assessment will indicate strengths and weaknesses in the company's protective posture," said Griffiths. It will help security personnel determine which of the company's operations might be likely targets of business intelligence efforts and, just as importantly, allow the company to determine which counter intelligence strategies to put into place."

For more information contact Howard Griffiths, Griffiths & Associates, 011 786 8556, howard@griffithsonline.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Cybersecurity is not hype
    June 2018, Technews Publishing, News
    Regular readers of Hi-Tech Security Solutions will know that we have upped the amount of content we have about cybersecurity, whether it is aimed at the physical security market or not. This is not some ...
  • Phangela set to upgrade security industry
    June 2018, News, Security Services & Risk Management
    Phangela Security is on an expansion drive, taking a new data-driven approach to the security market countrywide.
  • Afribiz Invest partners with RSS Security Services
    June 2018, News, Security Services & Risk Management, Retail (Industry)
    New security company RSS Commercial will give South African businesses and government departments fresh options, including the ability to maximise cost efficiency.
  • Arecont Vision changes in MEA team
    June 2018, Arecont Vision, News
    Arecont Vision has promoted Johan Crause to regional director – Middle East and Africa.
  • Carol Mazibuko presses F5
    June 2018, Westcon-Comstor Southern Africa, News
    Carol Mazibuko has been promoted to product manager of F5 Networks at Westcon-Comstor.
  • Milestone successfully expanding in Africa
    June 2018, Milestone Systems, This Week's Editor's Pick, News
    Milestone Systems reorganises to support strong interest from customer and partners in the African region.
  • ONVIF celebrates 10th anniversary
    June 2018, This Week's Editor's Pick, News
    ONVIF is celebrating its 10th anniversary, capping off a decade of growth and rising influence as a provider of interoperability standards to the physical security market.
  • LiDAR specialist appoints first SA distributor
    June 2018, Duxbury Networking, News, CCTV, Surveillance & Remote Monitoring
    Duxbury Networking has signed a distribution agreement with US specialist vendor Quanergy Systems, a provider of next-generation 3D LiDAR (Light Detection and Ranging) sensors and perception software.
  • ESDA Charity Golf Day 2018
    June 2018, ESDA (Electronic Security Distributors Association, News, Conferences & Events
    The Electronic Security Distributors’ Association (ESDA) will be holding its annual Golf Day in aid of charity on 20 September 2018 at the Benoni Country Club. The charity being supported this year is AMCARE.
  • SMS emergency service for the deaf
    June 2018, This Week's Editor's Pick, News
    Vodacom has announced the launch of South Africa’s first SMS emergency service for deaf, hearing and speech impaired customers.
  • RDC and TPA collaboration with Sentian
    June 2018, Radio Data Communications, News, Perimeter Security, Alarms & Intruder Detection
    Radio Data Communications (RDC) and TPA Distributors held a launch event at the Randpark Golf Club on 12 April 2018, to announce their partnership and their collaboration with Sentian Lifestyle Automation.
  • Vulnerabilities in industrial protocol
    June 2018, Kaspersky Lab, News, Cyber Security
    Kaspersky Lab discovers critical vulnerabilities in popular industrial protocol, affecting products from multiple vendors.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.