Wednesday, April 09, 2008

Spying at Work -- espionage, who, how, why, how to stop it

Spying at work, industrial espionage, how data is stolen, data leakage, discovery before patent protection, intellectual capital theft, client data losses, blackmail of banks after penetration of data security systems, databases and confidential information. Why attacks are common. Methods used to attack corporations. Why greatest security risks are your own employees: own staff leaving or leaking information while still in your corporation. Bugging devices detection, remote listening devices. Big Brother is watching you. MI5, CIA, KGB have powers to intercept phone calls, e-mail, video, fax and data transmissions to prevent crime, terrorism and subversive activity, and similar technology can be used to target legitimate business. Data protection and confidentiality. Steps business leaders need to take to improve own security and manage risk. Rule Number 1 is be aware that greatest risks are usually internal. Video by keynote conference speaker Dr Patrick Dixon, Futurist and author of 12 books on global trends including Futurewise and Building a Better Business.
Security, data loss, intellectual capital, patents, theft, industrial espionage, threat, risk, corporations, databases,, intercept, listening devices, bugging detection, spying corporations, protection information

Labels: , , ,

0 Comments:

Post a Comment

<< Home