According to The New York Times, their reporters can even obtain the location data of people through the data set. These people could be an executive, shareholder, employee, or contractor of a company. Thus, surveillance is now considered as an enterprise risk. In order to isolate teams working on new mission-critical innovation, a lot of companies now are using compartmentalized facilities and technology.
Even though the code names, specific non-disclosure agreements, and strict third-party contracts are able to ensure the secrets are kept during the projects, the location on data can still provide competitive insights about the companies.
Here are some examples: The competitor could identify which companies you are meeting with for acquisition based on where your employees are traveling to. According to the companies your company is meeting with, the competitors may be able to predict what new piece of hardware with specific functionality your company is developing.
Anti-surveillance tools are usually adopted by end-users in order to make their jobs easier. In terms of BYOD (Bring-Your-Own-Device), it is important to consider the balance between personal usage as well as ownership of a mobile device and storing enterprise data on that device. Because of the large amount of location data available as well as the large degree of which data can tie to specific individuals, CISOs should start to think about the protection for non-corporate-owned devices. In addition, the leak of location data may do harm to physical security as kidnapping or other physical security threats may happen during business trips.
As of 2020 starts, CISOs should continue research for implementing anti-surveillance techniques into the tools as well as procedures. So that the companies can protect the privacy and security of their employees.
Dangers of BYOD and How to Mitigate Them:
The way organizations conduct business is continuously evolving. One relatively new method organizations are adopting to boost productivity is bring-your-own-device (BYOD) policy. The term refers to an organization’s policy to allow employees to bring their personally owned devices such as laptops, tablets, mobile devices, to their workplace.
In this technical guide, you will learn:
- How BYOD policy affects positively in employees’ job performance
- Security threats in implementing BYOD policy
- Preventative measures to mitigate the chances of breaches
Image by Photo Mix