Counterfeit products make up five to seven percent of world trade, and have cost an estimated 2.5 million jobs worldwide, with 750,000 jobs lost in the U.S. alone. It’s an issue that Brad Minnis, Senior Director, Corporate Safety and Security for Juniper Networks, spends much time and effort to mitigate.
Traveling abroad with technology brings with it certain risks and may subject you to government surveillance in ways that are different from domestic travel. According to the FBI, you shouldn’t expect privacy in most countries outside the United States. Your data is less secure when you travel.
Commercial use of drones for tasks like surveillance and aerial photography/videography creates business efficiencies and new opportunities, but it’s important to understand drones’ inherent security risks and their potential impact on a company.
The internet is a dangerous place, right? Not only is the internet full of hackers trying to steal your corporate information, but they’re also targeting your website and company database to steal credit cards, private health information and other sensitive data to resell on the Dark Web.
Employees need to get their work done without oppressive security protocols, but they need to do so safely. If the team erects too many barriers, employees will find workarounds that jeopardize security.
Over the last several years, it has become commonplace for the media to publish information based on electronic materials that have been removed or copied either by organizational insiders and/or external people or groups. The publication of this type of material has impacted individuals, public and private organizations and various government agencies. While it is important for a free society to have the benefits of a free press serving as one of the checks and balances to protect citizens from abusive practices, we may have reached a point where we should re-examine how this is practiced. Are our criminal and civil statues effective on these issues?
Data security used to be relatively simple. Office buildings and areas within them presented clear “perimeters” that companies could protect with locks, alarms, and if necessary, searches of belongings.