Site Search

Course Navigation


Home| Course Catalog| Career Planning

FREE online courses on Corporate Espionage - What can be done about it - Communications Related Countermeasures

Monitoring Internet Activity

  • Systems (hardware/software, vulnerabilities)
  • Codes can be cracked
  • Email provide subtle hints as to future strategy, policies and products.
  • Regular browsing can tell you a lot about how others see your company: much of the information can be traced back to the company itself!
  • You also get to see which employees are surfing too much.

Monitoring Technical Vulnerabilities

Technical vulnerabilities are best combated by operations procedures:

  • Known vulnerabilities allow hackers to steal crores of rupees worth of information every year.
  • Yet, updating for (1) vulnerabilities (as they crop up) and (2) better system configurations, would have deterred many a hijacker.
  • Establish regular maintenance procedures, screen for new vulnerabilities and plug them.
  • Subscribe to Internet advisories e.g., Best-of-security's mailing lists, which provided updated lists of system vulnerabilities as compiled by actual users. This allows concerted action, and may even invoke help from software producers themselves.

Off-PABX Direct Phone Line Limit Talks

  • A few direct phone lines should be kept for sensitive subjects, as huge information losses can occur via PABX/ phone taps/ bugs.
  • Keep talks brief and to the point
  • Use predetermined code, wherever possible. Don't use people's names, use predetermined nicknames

Minimize Use of Cellular Cordless Phones

Anything you say on cellular/ cordless phones can be heard by anyone with right equipment. Use a pay phone for sensitive calls. Besides, you can give your location away to anyone with the right access to the cell net provider.

Don't Talk About Work Outside the Office

 

Though it's natural to talk about work after office hours, actively discourage this trait. The walls have ears, and news-hounds/ reporters are always hanging out in 5-star hotel coffee shops or lobbies for scoops. Revenue intelligence and surveillance is always highest at such places. Sensitive issues like large Indian corporates and MNCs funding ULFA ‘protection' rackets, first leaked out through the rumor grapevine.

Our Network Of Sites:
Apply 4 Admissions.com              | A2ZColleges.com  | OpenLearningWorld.com  | Totaram.com
Anatomy Colleges.com                | Anesthesiology Schools.com  | Architecture Colleges.com | Audiology Schools.com
Cardiology Colleges.com            | Computer Science Colleges.com| Computer Science Schools.com| Dermatology Schools.com
Epidemiology Schools.com         | Gastroenterology Schools.com  | Hematology Schools.com     | Immunology Schools.com
IT Colleges.com                | Kinesiology Schools.com  | Language Colleges.com  | Music Colleges.com
Nephrology Schools.com             | Neurology Schools.com  | Neurosurgery Schools.com | Obstetrics Schools.com
Oncology Schools.com    | Ophthalmology Schools.com | Orthopedics Schools.com       | Osteopathy Schools.com
Otolaryngology Schools.com| Pathology Schools.com  | Pediatrics Schools.com  | Physical Therapy Colleges.com
Plastic Surgery Schools.com| Podiatry Schools.com  | Psychiatry Schools.com   | Pulmonary Schools.com 
Radiology Schools.com| Sports Medicine Schools.com| Surgery Schools.com | Toxicology Schools.com
US Law Colleges.com| US Med Schools.com | US Dental Schools.com

About Us Terms of Use | Contact Us | Partner with Us | Press Release | Sitemap | Disclaimer | Privacy Policy


©1999-2011 OpenLearningWorld . com - All Rights Reserved