classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

Watching your back: countering industrial espionage the intelligent way
October 2002, News

To many companies security badges, sign-in sheets, video cameras and other physical surveillance methods create a wall of protection against information theft. However, with most penetrations and information loss coming from within an organisation, these measures alone cannot adequately protect a company.

"Most penetrations and compromises are perpetrated by the target's own employees, by electronic or cyber intrusion, surveillance or photography," said Howard Griffiths, managing director of Griffiths & Associates. "In addition, significant amounts of company strategy are often given away in company websites, publicity material and at trade fairs, all unwittingly," he said.

"The official FBI statistics in the US are that at any one given period in time, that bureau has nearly 1000 open investigations into extremely serious cases of economic espionage of trade secret thefts," Griffiths said. "The only way to counteract activity on this scale is for companies to implement both reactive and preventative counter intelligence programs."

These programs should include employee training, site surveys, inspections and investigations. The company should also develop and maintain files on alleged, reported, and actual attempts at penetration. "Every company must have a counter intelligence manual outlining procedures for the protection of sensitive information, including how to handle incidents that occur," said Griffiths. These manuals should then be made available to personnel within responsible offices so that any incident can be dealt with promptly and consistently.

Overall strategy

The first step in developing such an overall strategy must be the conducting of a vulnerability assessment. The following checklist of important issues is an example of the type of information to be collected in this assessment:

* Employee names, titles, and position, for employees in sensitive positions.

* Responsibilities and types of access to sensitive data.

* Identification of those with whom each employee is authorised to share sensitive information.

* Audit trails and records kept relative to individuals who have been given access to proprietary data.

* Activities where employers could be approached by intelligence gatherers, such as seminars and workshops. Employees should be asked to describe any contacts initiated by other persons seeking any type of corporate data.

* Any gratuities offered or received from providing any type of corporate data. Employees should be asked to identify all types of corporate data being elicited and what responses were given and any ensuing conversation with the person asking for the information.

"The information gathered from this checklist and the general assessment will indicate strengths and weaknesses in the company's protective posture," said Griffiths. It will help security personnel determine which of the company's operations might be likely targets of business intelligence efforts and, just as importantly, allow the company to determine which counter intelligence strategies to put into place."

For more information contact Howard Griffiths, Griffiths & Associates, 011 786 8556,

  Share via Twitter   Share via LinkedIn      

Further reading:

  • Someone’s doing business
    March 2018, Technews Publishing, News
    It’s hard to say if 2017 was a good or bad year for the security industry. For some companies it was a booming year, but for many it was one of just making it through to the end. Recent research from ...
  • ContinuityMauritius opens new facility
    March 2018, ContinuitySA, News, Security Services & Risk Management
    ContinuityMauritius has been delivering business continuity services to the island of Mauritius for the past decade and has announced the inauguration of new improved and larger recovery facilities.
  • NUUO exclusive from Forbatt SA
    March 2018, Forbatt SA, News, CCTV, Surveillance & Remote Monitoring
    Forbatt SA is now the exclusive supplier of NUUO products throughout the country via its network of nationwide distributors.
  • Africa’s security event of the year
    March 2018, Specialised Exhibitions Montgomery, News
    Visitor registration for Securex South Africa 2018 has gone live on and security operatives and others responsible for security and risk management are encouraged to sign up to ensure their free attendance.
  • Bosch Security Systems to become Bosch Building Technologies
    March 2018, Bosch Security and Safety Systems, News, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Fire & Safety, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    Effective March 1, 2018, Bosch Security Systems will be known as Bosch Building Technologies, while also merging its video, intrusion detection, access control and management software business units into a single unit.
  • Supporting local start-ups
    March 2018, Sparks & Ellis, This Week's Editor's Pick, News
    Sparks & Ellis helps build and sustain small businesses and create jobs in local communities through its CSI (corporate social investment) programme.
  • IDEMIA buys Otono Networks
    March 2018, News, Access Control & Identity Management
    IDEMIA (previously Morpho), has announced the acquisition of Otono Networks and its eSIM orchestration technology.
  • Are you ready?
    March 2018, South African Institute of Security (SAIS), This Week's Editor's Pick, News, Conferences & Events, Training & Education
    The South African Institute of Security (SAIS) held its first briefing of the year at the Garden Court Hotel in Kempton Park. The theme of the event was ‘2018… are you ready?’
  • Cathexis EU appoints new business development manager
    March 2018, Cathexis Technologies, News
    Cathexis Europe, an international division of Cathexis Technologies has announced the appointment of Colin Harding as the new business development manager for this region.
  • New faces at UTC SA
    March 2018, UTC Fire & Security, News
    A number of new people have joined the Johannesburg office of UTC Southern Africa over the past few weeks.
  • Saaiman joins ZKTeco
    March 2018, ZKTeco, News
    In February 2018, Brent J. Saaiman joined ZKTeco South Africa as a sub-Saharan Africa projects manager.
  • Paxton announces scholarship recipients
    March 2018, Paxton Access, This Week's Editor's Pick, Access Control & Identity Management, News
    Paxton has announced the first recipients of its new scholarship programme in conjunction with the University of Brighton.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.