Social media threats and risks: corporate espionage
-
Upload
hhsome -
Category
Technology
-
view
756 -
download
4
description
Transcript of Social media threats and risks: corporate espionage
![Page 1: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/1.jpg)
CORPORATE
ESPIONAGE
By Maria Thanbichler
Social Media in Marketing
MAR8PO067-2
![Page 2: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/2.jpg)
AGENDA
1. General definition
2. Areas of espionage
3. Way to access information
4. How avoid/prevent / overcome
5. Conclusion
![Page 3: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/3.jpg)
GENERAL DEFINITION OF CORPORATE ESPIONAGE
Corporate espionage is the process of illegally and unethically obtaining confidential information from other companies to be able to gain a competitive advantage
It is most commonly associated with technology-heavy industries, biotechnology, aerospace, telecommunications, transportation and engine technology, automobiles, energy
![Page 4: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/4.jpg)
AREAS OF ESPIONAGE
The espionage take place in the following areas of a company:
Ideas (products) Techniques (software, hardware) Processes Recipes Formulas
![Page 5: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/5.jpg)
AREAS OF ESPIONAGE
The espionage take place in the following areas of a company:
Customer datasets Pricing Sales Marketing Strategies
![Page 6: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/6.jpg)
WAYS TO ACCESS INFORMATION FROM OTHER COMPANIES
Hacking systems
Social engineering (tricking of a person into revealing their password or other valuable corporate information)
Dumpster Diving (refers to using various methods to get information about a technology user; it involves searching through trash or garbage looking for something useful)
Whacking (wireless hacking)
Phone Ease Dropping (listen secretly to the private conversation of others)
Observe/espionage the employees
![Page 7: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/7.jpg)
HOW TO AVOID / PREVENT / OVERCOME CORPORATE ESPIONAGE
Encrypting data/emails/hard desk Use a firewall Installation of anti-virus and password
security software Catch up on new or possible
employees Workshops for employees how to deal
with critical data at work/ in home office / at a business travel
![Page 8: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/8.jpg)
CONCLUSION
The protection of data in social media networks of a company should be ranked on the first, because otherwise competitors / other nations can steal the ideas. That could lead to a large loss of profit. But on the other hand, nowadays it is important to present your company in social media networks to be available for a lot of people.
![Page 9: Social media threats and risks: corporate espionage](https://reader036.fdocuments.us/reader036/viewer/2022082511/5455a367af7959d2368b7dd0/html5/thumbnails/9.jpg)
SOURCES
http://lexicon.ft.com/Term?term=industrial-espionage
http://faculty.usfsp.edu/gkearns/Articles_Fraud/corporate%20espionage.pdf