Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the hcaptcha-for-forms-and-more domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the hcaptcha-for-forms-and-more domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114
How To Protect Your Intellectual Property From State-Sponsored Hackers And Insiders
Tuesday, December 24, 2024

Trending Topics

HomeTechnologyHow To Protect Your Intellectual Property From State-Sponsored Hackers And Insiders

How To Protect Your Intellectual Property From State-Sponsored Hackers And Insiders

spot_img

Innovation How To Protect Your Intellectual Property From State-Sponsored Hackers And Insiders Saryu Nayyar Forbes Councils Member Forbes Technology Council COUNCIL POST Expertise from Forbes Councils members, operated under license. Opinions expressed are those of the author. | Membership (fee-based) Jun 15, 2022, 06:30am EDT | Share to Facebook Share to Twitter Share to Linkedin Saryu Nayyar is CEO of Gurucul , a provider of behavioral security analytics technology and a recognized expert in cyber risk management.

getty Intellectual property (IP) theft is a hot topic and ongoing concern. You may have heard about the 2018 case of Hongjin Tan, a scientist who worked in R&D for Phillips 66 on new battery technology. Using a simple flash drive, Tan stole IP worth $1 billion from the petroleum company.

Fortunately, in this case, the FBI was able to discover the theft and bring Tan to justice. One In Five Companies Admits To Suffering IP Theft Unfortunately, many, perhaps most, IP thefts never get reported or discovered until it’s too late, and the problem is more prevalent than one might think. In 2019, 20% of the companies on the CNBC Global CFO Council said China had stolen their IP within the past year .

According to the United States Trade Representative, Chinese theft of American IP currently costs between $225 billion and $600 billion annually . Although China is a leader in state-sponsored theft of IP, it’s not the only one. Russia, Iran and North Korea also are known for theft in this area.

There’s domestic IP theft as well, as companies seek any advantage in competitive markets. What are they after? Covid-19 vaccine secrets, software/source code, military and weaponry plans, engineering plans, manufacturing methods, know-how and business ideas from nearly every industry are just some of the targets. Once this IP is obtained, it can be sold for profit or used in-house as a competitive advantage.

Whether it’s product designs, inventions or trade secrets, the loss of a company’s intangible assets can be devastating. A competitor can bring a similar product to market first. The victim company can suffer the loss of customers and market share as well as decreased business growth.

It can result in serious financial damage to a company that’s made large investments in its IP. MORE FOR YOU Google Issues Warning For 2 Billion Chrome Users Forget The MacBook Pro, Apple Has Bigger Plans Google Discounts Pixel 6, Nest & Pixel Buds In Limited-Time Sale Event The theft of intellectual assets has been going on for decades, but today’s digitalization of everything makes the problem worse. It’s easy for a malicious insider to copy, download, transfer or email assets in the blink of an eye.

Theft can occur from the other side of the world with little effort. For example, a cyberattack involving ransomware may not only encrypt a company’s files but also steal them for competitive interests. IP can easily go out the door (or off the network) without a company even knowing the theft has occurred—that is, until the receiving organization starts using the information in some way.

By then, it’s too late, especially if the attack is sponsored by a nation-state that doesn’t observe U. S. protections for IP.

This was a key sticking point in the Trump administration’s trade war with China . Basic Steps To Create Safeguards It’s important for companies with business or industrial trade secrets to anticipate that they may be a target and implement risk mitigation tactics. Here are some basic steps every company should take.

• Catalog all critical data assets, including IP. For manufacturers, this includes data on the operational side as well as the business side. (This is a compliance requirement for NERC CIP for critical infrastructure businesses.

) • Know who’s authorized to access that data/information. Eliminate excessive or unnecessary access. • Consider putting sensitive information in a zero-trust environment where it’s hidden from all unauthorized users.

Even authorized users must be continuously authenticated for access. • Have a robust data security policy and make sure every worker knows the policy. It helps to require an official signature from every employee annually to remind them of the policy.

• Educate/train employees on social engineering tactics and other means for them to become unwitting vectors for data theft. • Implement comprehensive data security solutions that can prevent or at least detect intrusions that can lead to data theft. It’s especially important to consider insider attacks.

Typical tools include data loss prevention (DLP), analytics-driven security information and event management (SIEM), endpoint protection and user and entity behavior analytics (UEBA). Monitoring User Behavior Can Prevent Losses UEBA is especially well suited to prevent IP theft because it watches what people are doing rather than wrapping protection around data. This type of solution creates a baseline of typical behavior for every person and entity (such as an IoT device) on the network.

In addition, the behavior of each person or entity is compared to the behavior of others in a peer group. Anomalous behavior is then risk-ranked, and if it appears suspect, it can trigger an alert or an automated response, such as disconnecting the person/entity from the network until further investigation can be done. IP theft costs North American industries hundreds of billions of dollars each year.

It can mean multimillion-dollar losses for individual companies. Make sure your company deploys the strategies and tactics that will protect its intellectual assets and preserve the business’ well-being. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives.

Do I qualify? Follow me on LinkedIn . Check out my website . Saryu Nayyar Editorial Standards Print Reprints & Permissions.


From: forbes
URL: https://www.forbes.com/sites/forbestechcouncil/2022/06/15/how-to-protect-your-intellectual-property-from-state-sponsored-hackers-and-insiders/

DTN
DTN
Dubai Tech News is the leading source of information for people working in the technology industry. We provide daily news coverage, keeping you abreast of the latest trends and developments in this exciting and rapidly growing sector.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

spot_img

Must Read

Related News