© 2017 by CounterAction Consultants. Proudly created with Wix.com

How do the breaches occur? Not by breaking down walls or security barriers. The key sources of intelligence in all companies are your customers, your business partners, your advisors, ex staff and your current staff. However much you would like to think these groups would never divulge sensitive information to investigators working on behalf of competitors, the fact is they do. They do it not out of malice or incompetence but because they fall victim to skilled professionals who know precisely how to extract information without even seeming to be looking for it. As far as your own company is concerned the weak points are the telephones that sit on staff desks, the conferences your staff visit, the neighbourhood restaurants in which staff congregate, the aircraft on which they travel. All of these and many more are exploited ruthlessly by those seeking intelligence.

SOURCES OF INTELLIGENCE LEAKS

This site was designed with the
.com
website builder. Create your website today.
Start Now