![]() These manuals should then be made available to personnel within responsible offices so that any incident can be dealt with promptly and consistently. "Every company must have a counter intelligence manual outlining procedures for the protection of sensitive information, including how to handle incidents that occur," said Griffiths. The company should also develop and maintain files on alleged, reported, and actual attempts at penetration. These programs should include employee training, site surveys, inspections and investigations. "The only way to counteract activity on this scale is for companies to implement both reactive and preventative counter intelligence programs." "The official FBI statistics in the US are that at any one given period in time, that bureau has nearly 1000 open investigations into extremely serious cases of economic espionage of trade secret thefts," Griffiths said. "In addition, significant amounts of company strategy are often given away in company websites, publicity material and at trade fairs, all unwittingly," he said. "Most penetrations and compromises are perpetrated by the target's own employees, by electronic or cyber intrusion, surveillance or photography," said Howard Griffiths, managing director of Griffiths & Associates. ![]() However, with most penetrations and information loss coming from within an organisation, these measures alone cannot adequately protect a company. ![]() To many companies security badges, sign-in sheets, video cameras and other physical surveillance methods create a wall of protection against information theft.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |