Until recently, most commercial security representatives asked about buying reliable locks, doors and windows, installing a video surveillance system, and also tried to be confident in the conscientious work of the reception staff who would not leave secret documents in the copier. But in fact, it turns out that hacks of computer systems, whether by business competitors, political activists, criminal organizations or foreign governments, can have more serious consequences and are more difficult to deal with than with force.
At the moment, information technology is a hole in government circles. A month earlier, the FBI announced it had uncovered a scheme by which hackers infiltrated the computers of three firms that distribute corporate messages to the media. The data was successfully traded in a volatile market before the hack was made public.
Many companies use a “network security assessment” to see how strong their protection is, both in the virtual and in the real world. This method helps them to identify the occurrence of an unexpected failure before anyone does their own damage. Once one gap is closed, hackers will start looking for another option.
Therefore, managers need to be prepared for various spy tricks.
The first lesson from super spies is that sometimes you have to give up the always convenient and accessible online experience. The most experienced intelligence officers do not use computers in their work, but mechanical typewriters and carbon paper. Service information can be stored in a special piece of data, closed from public access. Companies can also employ enhanced security techniques to prevent malicious attacks from e-cyber intruders.
Often, hacker attacks are provoked by the carelessness of people. But the right incentives and a measure of responsibility contribute to the acquisition of high-quality computer protection.
The second lesson from counterintelligence is the use of stealth. The best way to find out if the hack was to offer a tempting target. The traps are fictional, but the convincing presence of computers, information networks and files attracts the attention of hackers, and at this time they become available to silent onlookers. For example, one American bank placed a series of fake profiles of non-existent employees on their internal information network, including postal addresses. Whenever a transfer request was made to a fictitious address, it became clear that a fraudster was at work.
There are solutions, in case you know who wants to hack you and why. You can involve law enforcement. Hacking into someone’s information network is a crime in many areas of jurisdiction. But this may be useless if the attacker is from a country that does not obey the law. You can try to collect more information about the hacker, understand his goals and capabilities. If he is trying to, say, steal your designs, make sure he gets bogus documents that will mislead him.