classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Watching your back: countering industrial espionage the intelligent way
October 2002, News

To many companies security badges, sign-in sheets, video cameras and other physical surveillance methods create a wall of protection against information theft. However, with most penetrations and information loss coming from within an organisation, these measures alone cannot adequately protect a company.

"Most penetrations and compromises are perpetrated by the target's own employees, by electronic or cyber intrusion, surveillance or photography," said Howard Griffiths, managing director of Griffiths & Associates. "In addition, significant amounts of company strategy are often given away in company websites, publicity material and at trade fairs, all unwittingly," he said.

"The official FBI statistics in the US are that at any one given period in time, that bureau has nearly 1000 open investigations into extremely serious cases of economic espionage of trade secret thefts," Griffiths said. "The only way to counteract activity on this scale is for companies to implement both reactive and preventative counter intelligence programs."

These programs should include employee training, site surveys, inspections and investigations. The company should also develop and maintain files on alleged, reported, and actual attempts at penetration. "Every company must have a counter intelligence manual outlining procedures for the protection of sensitive information, including how to handle incidents that occur," said Griffiths. These manuals should then be made available to personnel within responsible offices so that any incident can be dealt with promptly and consistently.

Overall strategy

The first step in developing such an overall strategy must be the conducting of a vulnerability assessment. The following checklist of important issues is an example of the type of information to be collected in this assessment:

* Employee names, titles, and position, for employees in sensitive positions.

* Responsibilities and types of access to sensitive data.

* Identification of those with whom each employee is authorised to share sensitive information.

* Audit trails and records kept relative to individuals who have been given access to proprietary data.

* Activities where employers could be approached by intelligence gatherers, such as seminars and workshops. Employees should be asked to describe any contacts initiated by other persons seeking any type of corporate data.

* Any gratuities offered or received from providing any type of corporate data. Employees should be asked to identify all types of corporate data being elicited and what responses were given and any ensuing conversation with the person asking for the information.

"The information gathered from this checklist and the general assessment will indicate strengths and weaknesses in the company's protective posture," said Griffiths. It will help security personnel determine which of the company's operations might be likely targets of business intelligence efforts and, just as importantly, allow the company to determine which counter intelligence strategies to put into place."

For more information contact Howard Griffiths, Griffiths & Associates, 011 786 8556, howard@griffithsonline.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • From the editor’s desk: IoT is you
    March 2019, Technews Publishing, News
    A search on the Internet for articles and comments on the convergence of physical and digital security shows that the topic was quite popular a few years ago, but then tapered off. Lately it has reared ...
  • SAIDSA celebrates 50-year anniversary
    March 2019, SAIDSA (SA Intruder Detection Services Association, Associations, News
    Fifty years ago, the association was formed as an employer’s organisation, with the vision of providing a pension fund to its members and to investigate improving the standards of an ever-growing industry.
  • UTC to separate into three companies
    March 2019, UTC Fire & Security SSA, News
    United Technologies Corporation announced the company’s intention to separate its commercial businesses into three companies.
  • Changing the security landscape
    March 2019, Technews Publishing, This Week's Editor's Pick, News, Security Services & Risk Management
    Using smart technology and an intelligent platform, Aura has a vision to reduce crime in South Africa by 50% by 2025.
  • New cybersecurity pavilion for Securex 2019
    March 2019, Securex South Africa , This Week's Editor's Pick, Cyber Security, News, Conferences & Events, Training & Education
    Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...
  • ISDS focuses on distribution
    March 2019, ISDS, News, Integrated Solutions
    David Heenan, MD of ISDS, told Hi-Tech Security Solutions that the company has restructured and will now focus on distribution and supporting its channel partners.
  • Ewers appointed as director at ZYTEQ
    March 2019, ZYTEQ Fire, News, Fire & Safety
    ZYTEQ Fire has announced the appointment of Terence Ewers as sales director responsible for sales and business development.
  • MST focuses on projects and skills
    March 2019, Mustek Security Technologies, Technews Publishing, Integrated Solutions, News
    Mustek Security Technologies is a systems integrator doing project work for National Key Points and other clients.
  • MIPS EMEA 2019
    March 2019, Milestone Systems, News, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Milestone Systems will kick off Community Days 2019 (MIPS) in Copenhagen, with more than 1500 participants and input from leading industry professionals.
  • Secutel partners with Matrix Comsec
    March 2019, Secutel Technologies, News, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management
    Secutel Technologies announced it is the exclusive distributor of Matrix Comsec access control products and IP video management software in South Africa. Established in 1991, around 40% of Matrix’s ...
  • Cathexis appoints European BDM
    March 2019, Cathexis Technologies, News, CCTV, Surveillance & Remote Monitoring
    Rene Reinhardt has recently joined Cathexis EU as European business development manager.
  • Why did RDC go on a mission to find ice in Africa?
    March 2019, Radio Data Communications, News
    RDC was recently on an urgent mission to find ice in Africa. Why? RDC insists that they were not mad and were not looking for the type of ice you get from the local garage or the stuff that De Beers wants. ...

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.