Connect with us

Hi, what are you looking for?

Web

Cyber Security: Is Your Intellectual Property Protected?

Given the amount of intellectual property and data theft occurring recently, a lot of questions have been raised regarding the security models that most companies have been using for the past decade.

The Trend That Portends

Analysts of both data and intellectual property theft have noticed that the criminals trying to steal information are no longer just looking for credit card and social security numbers. Instead, they are often stealing information to utilize it or have others utilize it to gain competitive advantage in legitimate businesses.

Because their strategy has changed, it means that company owners and management should take a hard look at where they are keeping their intellectual property data and take appropriate steps. It actually has become the case that hundreds of firms, both large and small have moved their data storage offsite to data center facilities to take advantage of the sophisticated security and lower cost hardware maintenance. And while even data centers have been breached by hackers, most would point out that if criminals can somehow manage to pull off a data heist at a provider, think about what they would do to your firm if they targeted it. The odds of a successful breach go down significantly at an enterprise level data center.

Patent Trolls Under The Bridge

A California vintner would agree. After developing a revolutionary new wine type and filing for patent protection, a group of patent trolls learned of the process via the press release. Within a short amount of time, the vintner’s company internet connection was hacked at the router level at public research facilities, giving the trolls control of all e-mail and online passwords. The vintner also later learned that their offices were bugged and their phone conversations tapped. Investors in the vintner’s firm called to make the vintner aware that a ‘group’ of men were searching the world to find where their patent was filed. Were the trolls able to get control of the process information beyond what was published so that they could attack the patent and reverse engineer their own formula? Not as of right now. The vintner was smart to file the patent in an undisclosed country, forcing competitors to search the entire world to find their data. Similarly, the group of competitors was exposed as being criminal by the investors, making it difficult for them to pull off their attempted heist. Although the vintner’s e-mail and online passwords were compromised, their data center solutions that were employed allowed them to store their wine process documents at the data center in an encrypted format that was never breached.

Now 2.0: Even The Best Are Getting Rolled

Tasked with ensuring that all members and former members of the United States military had both a secure and very functional digital health record experience, the California company working on the project spent years and millions of government dollars to create a system that worked well. The built-in security and data integrity checks meant that there was no possible way for unauthorized personnel to breach the system. Everything went smoothly until 2011, when a trend towards boutique data theft caught them flat-footed. An employee left the backup tapes for the entire project in a car in Texas. Predictably, the tapes were stolen and now every member and former member of the military potentially have their entire medical history exposed to criminals- while the company is out the intellectual property it developed in the form of supposedly unbreakable encryption.

Staying Ahead Of Those At The Walls

A look at the commonalities in terms of type of attack that many firms are experiencing shows that thieves are targeting mobile users with actual data carried on them much more often than companies would surmise. Everything from phone prototypes to movie copies have been taken. Therefore, in addition to considering storing data offsite at a data center, firms should also consider limiting access offsite to products and services that are still in development.

Written By

Molly Henshaw is a freelance writer living in the DC metro area, she is also a contributing author for the Atlanta SEO firm of Everspark Interactive. Let their experts take care of your site branding and exposure, so that you can focus on handling the increase in customers that comes with a successful interactive marketing campaign!

4 Comments

4 Comments

  1. Melissa

    July 8, 2012 at 1:07 pm

    Well, probably I can’t say for sure that my intellectual property is protected, but i understand that I should think it over

  2. Julia Spenser

    July 8, 2012 at 1:20 pm

    All the arguments you wrote are really true and can be useful for everyone. We all should think about our safety and security, even if to talk about intellectual property

  3. TracyAnn0312

    July 10, 2012 at 7:30 am

    Based on my observation I must say that my intellectual property is well protected.We all wanted to know our security essential because it is a way where we can surf freely on the Internet. Thanks for sharing it.

  4. tale

    July 14, 2012 at 9:56 am

    bad peoples will learn more ways to explore they target, so… maybe we must anticipate to protect our intellectual property with good methods.
    hope you will share to us!

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You May Also Like

Computer

Data centers are crucial to modern technology. Some data centers provide IT support to external clients, but many organizations also decide to maintain their...

Business

Did you know that a huge percentage of the government’s electricity usage comes from data centers? In fact, as high as 10% of the...

Web

Uptime is critical for any business to succeed, especially if your customers depend on your data infrastructure to be available 100% of the time....

Web

These days we spend an exorbitant amount of time online or in some form of cloud configuration. These virtual spaces are where we connect...