Beware: IP Theft Is Often an Inside Job

NO RATINGS
View comments: newest first | oldest first | threaded
Page 1 of 2   Next >   Last >>
The Source
User Rank
Blogger
Re: weakest link in any security system is...
The Source   11/13/2012 11:27:12 AM
NO RATINGS

Dear Anna, Ariella & Wale,

It's always good to be vigilant with regard to implementing practices and procedures that will protect sensitive data, especially since the electronics supply chain expands into Asia, Europe and other parts of the world where it's arguably more difficult to secure critical data.

Thanks for your insightful comments.

Nicole


Anna young
User Rank
Blogger
Re: weakest link in any security system is...
Anna young   11/12/2012 7:08:21 PM
NO RATINGS

Hi Ariella & Wale,

I agree with you both. Nicole's article did point out that,

'There is no silver bullet that can guarantee protection against IP theft. The diversity, complexity, and ingenuity of tactics preclude a one-size-fits-all solution'.

Like you said Ariella, it's important to remain alert.

Ariella
User Rank
Supply Network Guru
Re: weakest link in any security system is...
Ariella   11/12/2012 10:49:40 AM
NO RATINGS

@Wale good point. It's important to remain vigilant and not let your guard down.

Eldredge
User Rank
Supply Network Guru
Re: Beware: IP Theft Is Often an Inside Job
Eldredge   11/11/2012 8:04:39 PM
NO RATINGS

@ t.alex - I would expect this (resigning employee theft) to be one of the primary issues. Opportunity and motive would both be present.

Wale Bakare
User Rank
Supply Network Guru
Re: weakest link in any security system is...
Wale Bakare   11/11/2012 7:56:39 AM
NO RATINGS

Yes, i agree with that but it also has to be a periodically conducted exercise. After sometimes management of most organizations do relax on this until intranet or their local network systems get compromised.

Wale Bakare
User Rank
Supply Network Guru
Indispensable Employees The Biggest Threat
Wale Bakare   11/11/2012 6:48:39 AM
NO RATINGS

It's such a difficult thing to achieve but the article pin-pointed one good measure to do this. There should be level of involvement for every employee in organizations - who and who should have access privilege rights to some organizations' data. Even though, organization would still be worried about some self -acclaimed indispensable employees.

t.alex
User Rank
Supply Network Guru
Re: weakest link in any security system is...
t.alex   11/10/2012 9:11:30 PM
NO RATINGS

I think so too, human factor plays a role in all these thefts. Staff have to be trained on the risks if they involve in any of these activities and protection measure to take.

Cryptoman
User Rank
Blogger
weakest link in any security system is...
Cryptoman   11/10/2012 4:35:52 PM
NO RATINGS

...the human factor of course.

No matter what type of cryptographic algorithms and security systems are in place, the weakest link of any security system in the world is the human beings who are targets of social engineering attacks. The bigger the incentive of attacking a system, the more creative and hence more successful such social attacks can become.

Stealing IP can be a very profitable attack for thieves. Therefore, the human factor that has any involvement with such IP matters should be trained and regularly updated to be aware of new types of potential threats. It will also be useful if ethical hacking methods and penetration tests are applied randomly to test how well the people are defending the system based on th training they receive.

 

The Source
User Rank
Blogger
Re: What for?
The Source   11/10/2012 7:20:45 AM
NO RATINGS

Dear Barbara,

No, the report did not say how the attackers who succeeded at intellectual property theft used the information, or if there was a monetary gain for them. 

The report did say that the most compromised areas of an enterprise are the databases and file servers, which is where most organizations store internal data and knowledge.

The report went on to say that "This serves as a reminder that when we lock down file servers storing IP, we can't neglect to lock file drawers too."  I'm sure this is good advice.

Thanks for reading my article. 

Nicole


t.alex
User Rank
Supply Network Guru
Re: Beware: IP Theft Is Often an Inside Job
t.alex   11/10/2012 1:14:27 AM
NO RATINGS

Sometimes a resigning staff may copy out some important stuff and bring it over to the new company. I know some japanese companies even adopt laptops without storage, that is everything is from the company cloud server. Plugging in an unauthorised thumbdrive will be rejected.

Page 1 of 2   Next >   Last >>


More Blogs from At the Source
Tax support, credit products, and investment funding sources all read like plays from the capitalist West's playbook.
Increasingly, purchasing is becoming an even more strategic part of supply chain activities. It can make the profession challenging, but the potential benefits are clear.
The US has China in its sights over the issue of cyber espionage. Smart supply chain execs need to keep their attention on this evolving issue, which could impact product demand.
The smart watches of the near future promise to push the boundaries beyond simple time and data delivery as they move toward being true health trackers.
The pool of CNC operators is scarce, and demand is on the rise. It's time for industry and educators to team up and fill the gap.

Datasheets.com Parts Search

185 million searchable parts
(please enter a part number or hit search to begin)
EBN Dialogue / LIVE CHAT
EBN Dialogue enables you to participate in live chats with notable leaders and luminaries. Open to the entire EBN community of electronics supply chain experts, these conversations see ideas shared, comments made, and questions asked and answered in real time. Listed below are upcoming and archived chats. Stay tuned and join in!
Archived Dialogues
Live Chat 8/20: Supply Chain Trends to Watch for the Rest of 2014
The supply chain hasn't quite reached the complexity of global phenomena like weather. So we've asked Jim O'Reilly to predict trends while answering your questions.
Live Chat 7/24: Effective Channel Management
Joe Alphonse and Tom Howell of Revitas discuss how to implement an effective channel management strategy.
Latest Poll
The Velocity Report Archive
Click here to see our newsletter archive.
EBN Newswire
VÉLIZY-VILLACOUBLAY, FRANCE   7/24/2014
Dassault Systèmes to Acquire Quintiq
THIEF RIVER FALLS, MN   6/26/2014
Digi-Key Employees Advance Education & Employment ...
Twitter Feed
EBN Online Twitter Feed