Friday, September 04, 2009

Tighten up your security


To maintain data and IT security, risk managers must recruit a different type of employee and search for talent in 'dark pools'

Picture the scene. A UK-based engineering group finds that its markets in Asia have suddenly been flooded with counterfeit versions of its products. What’s worse, they’re very good counterfeits.

In fact, a little too good. When the company gets hold of these products and examines them, it can see that they are based on its own genuine designs. The truth dawns: organised criminals have penetrated its core corporate systems, and stolen the intellectual property that underpins its business.

See full Article.