Information lethal
Be careful about 30 details, minutes from your company this is a commercial era of 1%, 2%, and a message can be lost. This information is a fidelity in his hand, in the opponent's hand is a bomb. Such important information, maybe in the brain of the boss, in the company, a manuscript, even in a garbage basket. It is possible to leak at any time. The result of leakage makes the company suffer losses and destroys the company. What do you want? information security? "Isn't it just installing anti-virus software, set a password on your computer?" When you think so, you have an estimate like 95% of the world, and it is estimated that the information on the company's fatal impact; good in the world is 5%, like "China Wealth", fear, shock I have an influence of information on information on commercial world explosive. Who is it - Nokia, Microsoft, McGraw-Hill Company, and Coca-Cola (CoCa-Co rather than Technical issues. LA) ... Who is the five percent? When you read this article, there are 2 companies in the world that have closed down due to information security issues, and 11 companies have caused more than 8 million direct economic losses because information security issues. China Wealth summarizes 30 fatal details through the surveys of 100 managers, so you can quickly become information security experts in 5 minutes. 1, printer - 10 second latency brings information vulnerability Even a laser printer, there are more than 10 seconds or more, if you are not at the 9th second, the first person who sees the file may not be you. Most modern companies use common printers, and put printers, copiers, etc., in a relatively independent space. As a result, the confidential document between the sectors can start from the equipment room, spread in other sectors, and there is no secret between the sectors, the company has no secret. 2, the back of the printing paper - the big loss of good habits is saving paper is a good habit of many companies, and employees tend to print paper with the back. In fact, it will have such a "waste paper" of this habit, you will find that printing, copied waste paper contains company secrets, even, even the executive deputy will feel sweat, because the waste paper records the company Comprehensive content than his work diary. 3, computer easy-to-hand tutor we believe that all professional managers have such experiences: If you are new to a company, roaming in your own computer is the best channel for new companies. . In a state of approximately "peeping", the company has happened to the company, and from the company's previous customer records, rewards and punishments, and even you have a fortunate resignation. If it is the computer of other departments, there is also another fun. 4, Sharing - Doing a good job of documentation The sharing in the LAN is the last channel of the company's internal confidentiality. Some companies stipulate that all people will be canceled immediately after sharing. In fact, the more, the greater the risks of the company through the sharing of leaks. Because when people do this, they will use the sharing mode to spread information. The way people habits are the colleagues in the open office, "I am in a sharing, you come Take it - "Yes, there will be someone to take it, but it is often not just what you expect. 5, the index comparison - smart reforigures between the traditional production enterprises, often to speculate on the number of sales of competitors and the number of production. Thus, in order to hide their actual quantity, the index of statistics is introduced, protecting their confidential information by weighting the actual number. The only unfortunately, the simple base period usually taken is usually learned by the other party's real quantity in a few years, and all real numbers appear on the work desk in the competitors.
6. Training - Information Defense War has passed the passive new employee to the company, and most companies will come to see the new employees. Starting from the first day of training, new employees have exposed to the company's core customers from the company to key technologies from the company's core customers from the company's core customers from the company's core customers from the company's core customers. But in fact, there are always more than one-fifth employee who will leave the company after three months. At the same time, most of them have not left the industry that is engaged in the present, and may be a grazing of your company. 7, fax machine - you always get it to you after half an hour, there is always a "no one to receive", you must not receive important faxes every week; people always "surprised" Discover that the last page of our fax paper is the beginning of others, and how you start can't find it. 8. Public equipment - does not equal public information in small companies or an independent department, people often use a U disk, floppy disk or laptop. If you have the opportunity to lend the U disk to the company's new accounting, it is possible to easily get the company's profit and loss table when the other party is returned. 9. The camera-waving bidding opportunity headquarters in Shanghai, a domestic large-scale advertising company in Shanghai, leaked the information leaked in March 2004, led to the day before the bidding, the advertising creative was stealing, the reason is the main creation The person's OICQ installed video, waving, and the discharge may not just a chance to cooperate. 10, Product Traces - Relying on "Traces" to understand your future in the market survey, analyze product traces to infer the marketing effect and marketing strategy is a general method. Product transportation, warehousing, abandoned packaging, can appear in the survey report purchased by competitors, because "trace analysis" is already a regular means of business intelligence collections.
11, Compression Software - Software ZIP for information security threats, RAR is the largest software that threatens the company's information. The storage space of the 3-inch floppy is 1.4m, and the compression software allows large Word files to be easily deposited in a floppy disk, and easily bring all the information to the company. 12, CD Burn - Data Dreaming in the backup process If you want to take the company's information, the best way is to apply for a disc backup, make the file into a specific format, hand over the network administrator backup, and then claim that you can't open it normally , Require re-backup, most case, "waste tray" in the optical drive can bring out the company after get off work. 13. Mailbox-Information Stealing Transit Station Using Email Transfer Stealing Company Information accounts for more than 80% of all information stealing. Many companies do not install floppy drives, optical drives, USB interfaces, but there is no way to avoid employees to steal information through email, in contrast, the above method seems to be a childish and comic. 14, hidden partition - long-term stealing company information necessary techniques for a long time to collect information in the company, used to sell or retain, always dangerous things. Your own computer should not be used by others, I found that there should be something in the computer. So hidden in the hard disk partition is the best choice. There are three virtual partitions of C, D, and E, which can hide E, only you can access. Of course, if you encounter your hipster, a total of all the total spaces of all disks can be stuffed. 15. Private computers - a large number of stolen information common means of compression software is limited, if you get your laptop, connect to a local area network, as long as half an hour, there is a G file or easy go. 16. Conference Record - The neglected company secretary secretary often sees the meeting records very common. They don't know what a high-level meeting record means that the competitors mean. The company can often see someone to record the meeting record as waste paper. Lose, let the company's latest strategic information appears in any corner of the company. 17. Organizations that have not been adopted - give up is also a choice planner who knows that the adopted plan is company confidential. It is often not known that the abandoned plan is also the company secret. Sometimes it will talk to the customer or media, and the competitors can easily judge: You don't do this, you must choose to do those! 18. Customer - Your confidentiality is just all of the allies. It is often possible to see the famous consulting firm's customer proposal. These carefully produced PPTs, condense the sweat of the consulting company team and countless sleepless night, in some credit Poor customers may just talk about some freezes. 19. Recruitment activities - Your company actually recruits director? During the recruitment process, mature companies will not use people's units in an advertisement, because it is tallless to tell your competitors: just happened to shock and lack of manpower. 20. Two minutes before the bidding - the final price is always "released" if the bottom price of the bid is open, the bigger the risk of leaks, two minutes before the bidding, facing the participants related to the mobile phone Can publish the reserve price! 21. Half an hour after dismissal - don't give him the last chance to get this news if the employee being fired is today, then, don't let him return to his computer. Half an hour, just allowed him to pack his supplies, and the old colleague made a short bid, there is no banquet in the world, enough for half an hour, in order to leave the employee, more information security. 22. After the entry, the information collected in the first week is 5 times the usual. On this week, he is ready to leave, he is at the mad copy and transfer status, beware of you New employees, no matter how much you appreciate him.
23. Half a month after cooperation - the usual way of competitors stealing information is: fake customers in half a month in the initial cooperation, you can only indicate the rigor of information, you can win most of the customer's understanding Dear. Unless he is your competitors. 24. 30 days after leaving - Danger from the company, one for employees who have served more than half a year of the company, and will maintain frequent links with the company within 30 days after leaving the company, and the company's information and status performance Extreme enthusiasm. If it is departed by the limited time, then the possibility of stealing the company's information through the old colleagues within 30 days. 25. Clearing the principle of foreign proposal - If you don't leave something, you will not give it a manuscript, you can use the e-book without the universal format. 26. Secure Agreement - Regardless of the size of the role, and the employee signing the clear confidentiality agreement or the necessary no rules are not square, it is clear what is right, people can force the wrong. The more detailed the content of the confidential agreement, the better, if the other party is tremendous, naturally, will consent. 27. Responsibility Decomposition - Clarify that everyone's security responsibility for each person's safety responsibility can be disclosed, and can find responsible people according to the regulations, and investigate the secondary, mutual supervision and prevention is the ultimate goal of responsibility decomposition. 28. Establishing information level - Level partitioning for company confidential documents such as contracts, customer exchange, shareholders are listed as level, determine the scope of confidential communication, let everyone understand the communication boundary of information, avoid not understanding information Information security incidents. 29, save in different places - Don't put the eggs all backup materials in the same basket try to be stored in different places, avoiding a fatal blow to corporate information because of major accidents (such as fire, earthquake, war, etc.). 30. I think my own business is invulnerable in information security. -----------------
This article is an article on returning the NetEase, saying that although it is a small detail, but it is really important for corporate information. Fortress is still easier to attack from the interior.