Business Espionage: Risks, Threats, and Countermeasures by Bruce Wimmer CPP

By Bruce Wimmer CPP

Business Espionage: hazard, Threats, and Countermeasures provides the easiest practices had to defend a company's so much delicate details. It takes a proactive procedure, explaining the measures and countermeasures that may be enacted to spot either threats and weaknesses. The textual content totally explains the risk panorama, displaying not just how spies function, yet how they are often detected.

Drawn from the author’s forty years of expertise, this very important source will supply readers a real realizing of the specter of company spying and what companies can do to guard themselves. it truly is excellent to be used as a device to coach employees at the seriousness of the specter of company espionage.

  • Shows how one can determine a company’s threats, weaknesses, and most important assets
  • Provides confirmed and useful countermeasures that any enterprise can hire to guard their so much delicate resources from either inner and exterior threats
  • Uses real-life case reports and examples to assist the reader know how to use the strategies discussed

Show description

Read Online or Download Business Espionage: Risks, Threats, and Countermeasures PDF

Similar information management books

Offshore Software Development: Making It Work

Offering a hands-on govt device package, Offshore software program improvement: Making It paintings attracts on genuine lifestyles examples and explores the teachings realized from organizations corresponding to Verizon, Citigroup, JP Morgan Stanley, and participants skilled in offshore outsourcing. every one bankruptcy introduces a key set of suggestions and illustrates them with a true international enterprise case established upon a member of the curiosity workforce.

Technical Support Essentials: Advice to Succeed in Technical Support (Beginner to Intermediate)

Technical help necessities is a booklet in regards to the many elements of technical aid. It makes an attempt to supply a wide range of subject matters to function issues of development, dialogue, or just themes that you simply will need to study. the subjects variety from stable paintings conduct to the best way technical help teams determine their very own type of paintings.

Cases on Information Technology and Organizational Politics & Culture (Cases on Information Technology Series)

Situations on details know-how and Organizational Politics & tradition records real-life instances describing matters, demanding situations, and options concerning info know-how, and the way it impacts organizational politics and tradition. The situations incorporated during this ebook conceal a wide selection of subject matters, akin to: an built-in on-line library assets automation undertaking, IT inside a central authority business enterprise, the politics of knowledge administration, and so on.

Knowledge Work and Knowledge-Intensive Firms

This booklet addresses the idea that of data, and its use within the contexts of labor and enterprises. It offers a serious realizing of present techniques to wisdom administration, association and the 'knowledge economy'. the writer describes a few circumstances of 'knowledge in depth firms', together with IT organisations, administration consultancy businesses, ads firms and existence technology businesses.

Additional resources for Business Espionage: Risks, Threats, and Countermeasures

Sample text

The company let their guard down and ethnic Chinese employees in their Singapore office were ultimately found to be providing information to Chinese competitors. The employees maintained, when confronted, that they had been pressured by their “bretheren” in China to help the Chinese people. A similar activity occurred in another company I helped in Singapore when targeted by an Indian competitor. The Indian competitor used ethnic loyalty to convince the Singapore employees of Indian ethnicity to provide information.

The security manager (an expatriate known as the “asset control” manager) went down to the basement of the high rise to talk with the janitorial services staff. He was not expected and as he walked from the garage to the trash room on the same level, he found hundreds of documents pulled out of the trash, separated and laid out on the floor. When some of the cleaning staff noticed him standing at the door they told him that the reason they were pulling the documents out was because there was a separate paper recycling service that paid them to do that.

We pursued this in enough detail to establish that there was truth in the rumor. The investigation confirmed how easy it is to elicit information from workers and how frequent nonbusiness travel to high-threat countries can mean there is a problem. It also shows that even within greater China there is military, political, and business spying taking place amongst entities like the People’s Republic of China and Taiwan—both business espionage centers who spy on many businesses from around the world but that also spy on each other.

Download PDF sample

Rated 4.27 of 5 – based on 45 votes