Printer Friendly

Global warning.

American businesses are no longer surprised by the discovery that their proprietary information is under attack by both friend and foe. The problem has been identified, but the solution hasn't.

A new report - protecting America's Corporate Secrets in the Global Economy: A Risk Assessment of the New Threats to US Business Information - may help. It gives business managers and security professionals an overview of the new threats to proprietary information and suggests ways to guard against the loss of valuable corporate secrets.

The report is published by the American Institute for Business Research (AIBR) in affiliation with the National Security Institute (NSI).

It pointed at foreign intelligence agencies as perhaps the most serious threat. They are using a combination of traditional spy techniques and sophisticated electronics to acquire information which is then turned over to corporations in their own countries.

Because senior managers in many US corporations fail to take this threat seriously, noted the report, sensitive information lies unprotected. As a result, billions of dollars per year are lost to overseas competitors.

The report pointed out that computer systems, which house information, are increasingly under attack, yet corporate America is rushing to downsize its computer systems from large mainframe computers to local area networks (LANS). LANS often link hundreds, and even thousands, of PCs. And this rapid adoption of new technologies has outpaced the capacity of most companies to secure their networks against attack.

The report detailed the ways a company can protect its computer systems against intrusion, ranging from setting up audit trails to physically isolating the computer system and limiting access to it. But according to the report, no single solution exists; it takes a combination of methods to create a fail-safe system.

Today's world is living proof that knowledge is power. Information - how it is gathered, stored, protected, and distributed - has become a competitive weapon, a strategic tool, and the currency of business. Ironically, in the process of acquiring information technology, companies are putting their proprietary information at risk. This report is a good first weapon in the long battle to come.
COPYRIGHT 1992 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 1992 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:technique for the prevention of corporate espionage
Publication:Security Management
Date:Jul 1, 1992
Words:346
Previous Article:No biometric is an island.
Next Article:Nobody's perfect.
Topics:


Related Articles
SPI versus spy.
Who will spy?
Countering the threat of espionage.
FBI program expands.
New call for espionage law.
The spy who came to work.
The Economic Espionage Act of 1996: are we finally taking corporate spies seriously?
Industrial Espionage Becoming 'Big Business'.
With friends like these ...: Ed Blanche reports on allegations of Israeli espionage on its closest ally, the United States. (Current Affairs).

Terms of use | Copyright © 2016 Farlex, Inc. | Feedback | For webmasters