Countermeasures to industrial espionage

Industrial espionage can cost companies millions and can negate all the hard work done in a year. An ideal security system is one that is monolithic in structure and has many overlapping layers of security. Below are a few countermeasures that can be implemented against industrial espionage:

Legal Compliance: – laws are there for a reason. There are a number of laws that protects products of research and development such as patent rights and intellectual property. The Economic Espionage Act of 1996 (EEA) and Electronic Communications and Transactions Act 2002 are laws that protect companies against industrial espionage. Therefore it would be wise that companies are away of the rights and regulations so that they are fully aware of how to protect themselves. Unfortunately many companies do not take information security-related law seriously

Public-Private Partnerships: – Public-Private Partnerships (PPPs) is the formal co-operation between the public and private sector. This is beneficial because companies can utilise government defense-grade resources and the government can be updated quickly with the latest threats and increase security awareness and advance national security interest.

Vetting: – many data breaches are due to carelessness from employees therefore it is extremely important for companies to ensure security-sensitive information is entrusted to the right people. Vetting is an on-going process starting before an employee is hired and continues throughout employment period. The on-going training of employees is also very important.

Compartmentalisation: – Dividing the operational area into departments in which each sector is responsible for developing one part of the product or process and barred from accessing other segments. This prevents products being leaked by one person because any leakage is incomplete and useless. This can be done with access control too.

Physical Security: – physical measures constructed to regulate movement of people. This is to control access to facilities, information systems and production operations.

For full article go to: