📜 ⬆️ ⬇️

How corporate-secret becomes publicly explicit

According to a survey conducted on the portal "Professionals.ru" this spring, about 2/3 of the employees cause confidential information leakage . Probably, in most cases, the leakage occurs unintentionally: it would seem that he took the work home or fell ill and asked that the documents be sent to you, and now the intellectual property left the limits allowed to it. However, this is probably the most innocuous scenario, events can develop many times more tragic. Imagine that a personal laptop / phone / smartphone or other kind of device was lost due to carelessness, and now two types of property were freely available.
The same can be said about phones. Being busy people, we all prefer to leave access to their accounts open. No wonder, because the authorization procedure takes so much power, and why is it on your own electronic device? Particularly forgetful even allocate a special folder in the inbox, into which passwords are collected for everything and everything. All this provides unhindered access to information, the harm from the use of which can be enormous.

Another scourge of modern times is social networks. who played with many a cruel joke. Believing the name and goal-setting of these resources, we see in them, first of all, platforms for companionship in leisure hours. However, somehow it turns out by itself that half of our list of "friends" are colleagues, including managers, most of the pages we are subscribed to are about work, and absolutely everything can be viewed by our profile and activity. Thus, the information about each of us turns out to be a blue saucer lying in the center with a white branding inscription.

Industrial espionage penetrates socially and slowly. network, using the intrusion of all available methods: from spam bots and sending messages with malicious links to hacking account.
The trend of the last time is blocking access to social networks from workplaces. (According to Superjob , the number of locks in our country has reached 63%, which is higher than the "average world" figure of 56% (according to ClearSwift )). However, there are more liberal solutions to the problem, for example, sets of rules for the safe use of social resources for IT services , written by software developers .
')
Nevertheless, as practice shows, social networks still find ways to disrupt the steady flow of corporate life. The Wall Street Journal states: the shortest and cheapest way to company secrets is through them. For example, the vice-president of a corporation talked about the impending bankruptcy of the company in correspondence with the “virtual spy” on Facebook. An information security specialist, who loved social networks and graphic images, declassified his trip to Interpol by posting photos of nearby places on twitter. And these are the “hard” risks associated with disclosing financial statements and strategic plans. And the image component? Reputational risks? How to regulate this channel of information?

Gartner proposes a set of corporate rules governing social behavior that promote "rules of good taste and common sense, as well as the norms of behavior adopted by the company" when communicating in social networks. So, IBM introduced its guidelines for covering the company's activities on blogs back in 2005 . But, as they say, “you cannot sew your head on” - companies can only rely on the very “common sense” of their employees.

Source: https://habr.com/ru/post/133184/


All Articles