Beware: IP Theft Is Often an Inside Job

NO RATINGS
View comments: newest first | oldest first | threaded
Page 1 of 2   Next >   Last >>
The Source
User Rank
Blogger
Re: weakest link in any security system is...
The Source   11/13/2012 11:27:12 AM
NO RATINGS

Dear Anna, Ariella & Wale,

It's always good to be vigilant with regard to implementing practices and procedures that will protect sensitive data, especially since the electronics supply chain expands into Asia, Europe and other parts of the world where it's arguably more difficult to secure critical data.

Thanks for your insightful comments.

Nicole


Anna young
User Rank
Blogger
Re: weakest link in any security system is...
Anna young   11/12/2012 7:08:21 PM
NO RATINGS

Hi Ariella & Wale,

I agree with you both. Nicole's article did point out that,

'There is no silver bullet that can guarantee protection against IP theft. The diversity, complexity, and ingenuity of tactics preclude a one-size-fits-all solution'.

Like you said Ariella, it's important to remain alert.

Ariella
User Rank
Supply Network Guru
Re: weakest link in any security system is...
Ariella   11/12/2012 10:49:40 AM
NO RATINGS

@Wale good point. It's important to remain vigilant and not let your guard down.

Eldredge
User Rank
Supply Network Guru
Re: Beware: IP Theft Is Often an Inside Job
Eldredge   11/11/2012 8:04:39 PM
NO RATINGS

@ t.alex - I would expect this (resigning employee theft) to be one of the primary issues. Opportunity and motive would both be present.

Wale Bakare
User Rank
Supply Network Guru
Re: weakest link in any security system is...
Wale Bakare   11/11/2012 7:56:39 AM
NO RATINGS

Yes, i agree with that but it also has to be a periodically conducted exercise. After sometimes management of most organizations do relax on this until intranet or their local network systems get compromised.

Wale Bakare
User Rank
Supply Network Guru
Indispensable Employees The Biggest Threat
Wale Bakare   11/11/2012 6:48:39 AM
NO RATINGS

It's such a difficult thing to achieve but the article pin-pointed one good measure to do this. There should be level of involvement for every employee in organizations - who and who should have access privilege rights to some organizations' data. Even though, organization would still be worried about some self -acclaimed indispensable employees.

t.alex
User Rank
Supply Network Guru
Re: weakest link in any security system is...
t.alex   11/10/2012 9:11:30 PM
NO RATINGS

I think so too, human factor plays a role in all these thefts. Staff have to be trained on the risks if they involve in any of these activities and protection measure to take.

Cryptoman
User Rank
Blogger
weakest link in any security system is...
Cryptoman   11/10/2012 4:35:52 PM
NO RATINGS

...the human factor of course.

No matter what type of cryptographic algorithms and security systems are in place, the weakest link of any security system in the world is the human beings who are targets of social engineering attacks. The bigger the incentive of attacking a system, the more creative and hence more successful such social attacks can become.

Stealing IP can be a very profitable attack for thieves. Therefore, the human factor that has any involvement with such IP matters should be trained and regularly updated to be aware of new types of potential threats. It will also be useful if ethical hacking methods and penetration tests are applied randomly to test how well the people are defending the system based on th training they receive.

 

The Source
User Rank
Blogger
Re: What for?
The Source   11/10/2012 7:20:45 AM
NO RATINGS

Dear Barbara,

No, the report did not say how the attackers who succeeded at intellectual property theft used the information, or if there was a monetary gain for them. 

The report did say that the most compromised areas of an enterprise are the databases and file servers, which is where most organizations store internal data and knowledge.

The report went on to say that "This serves as a reminder that when we lock down file servers storing IP, we can't neglect to lock file drawers too."  I'm sure this is good advice.

Thanks for reading my article. 

Nicole


t.alex
User Rank
Supply Network Guru
Re: Beware: IP Theft Is Often an Inside Job
t.alex   11/10/2012 1:14:27 AM
NO RATINGS

Sometimes a resigning staff may copy out some important stuff and bring it over to the new company. I know some japanese companies even adopt laptops without storage, that is everything is from the company cloud server. Plugging in an unauthorised thumbdrive will be rejected.

Page 1 of 2   Next >   Last >>


More Blogs from At the Source
The electronics supply chain now understands that a green stance is good for the environment and for business.
An Ernst & Young survey shows that, when CFOs and supply chain leaders form a closer business partnership within a company, they report better results in a number of areas, including the company's financial position.
Could sophisticated software have helped supply chain managers reverse the declining fortunes of companies like BlackBerry and Nokia?
Indonesian tin use undermines electronics supply chain's claim to social responsibility.
Patent assertion entities are the bane of the electronics industry. It's time for the supply chain to use its influence to demand an end to the unfair business environment they create.

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
Latest Poll
EBN Dialogue / LIVE CHAT
EBN Dialogue enables you to participate in live chats with notable leaders and luminaries. Open to the entire EBN community of electronics supply chain experts, these conversations see ideas shared, comments made, and questions asked and answered in real time. Listed below are upcoming and archived chats. Stay tuned and join in!
Archived Dialogues
Live Chat 4/3: Business Networks Emerge as Procurement's Future
Rachel Spasser, SVP and CMO at Ariba, discusses the key elements of a strong business community.
Live Chat 3/27: Finding the Procurement and Technology Sweet Spot
Increasingly, choosing the right software and technology tools is critical to empowering procurement to realize strategic advantages.
The Velocity Report Archive
Click here to see our newsletter archive.
EBN Newswire
THIEF RIVER FALLS, MN   4/15/2014
Digi-Key Debuts Innovative Mobile App for Freescale
SANTA MONICA, CA   4/9/2014
Master Electronics Acquires Electro Sonic
Twitter Feed
EBN Online Twitter Feed