Minimizing IP Theft and Insider Threats During Times of Layoffs

Page 2 of 2

Minimizing IP Theft and Insider Threats During Times of Layoffs

In 2022, the tech industry experienced a 649% increase in layoffs. Even before the close of the first quarter of 2023, more than 100,000 employees at US technology companies have been let go. If layoffs persist, particularly in the tech sector, organizations could be at an increased risk of theft of intellectual property (IP).

Employees that perpetrate these risks can have a range of motivations, including a feeling of specific ownership over a piece of IP they worked on and wanting to keep it for their files to replicate at a future job, revenge, or financial motives such as selling the IP to rival companies or foreign countries.

In addition to serious financial repercussions, misappropriation of an organization's work can lead to reputational damage, loss of competitive edge, and business disruption. Furthermore, during heightened geopolitical disarray, the ability of a group or individual to acquire intellectual property and trade secrets can have ramifications on the economy and potentially national security.

With the current uncertainty of the future economic outlook, it's worth discussing ways companies can minimize insider threat risks.

Involving Security Teams Early

Proactivity is key. Workforce reductions don't happen in a vacuum. While they may seem sudden, they are often the result of lengthy planning processes among stakeholder groups from across the organization. Security teams should be included in these discussions from the beginning. Still, security teams are often not included or brought into the conversation so late that they cannot help with mitigation strategies. Involving security in preliminary plans allows them to monitor for behavior that may not raise alarms during "normal" times but may be unusual in the context of job cuts.

Earlier discussions with a security element also allow for proactive planning, data-sharing, strategy creation, and investigations, if necessary, to mitigate threats proactively. Collaboration between critical departments like security and HR is vital to producing a thorough plan which will ultimately help teams to see around corners and address any blind spots.

Physical security teams might need to be more familiar with particularly sensitive projects that other groups have insight into. IP theft mitigation should involve identifying information vital to the enterprise's future and pre-planning exercises on what happens if it is stolen or misappropriated.

Connecting Cyber and Physical Teams

When we think of traditional physical security, we usually think of the 3Gs: guns, gates, and guards. In protecting against IP theft, security professionals must shift their mindset to the organization's current needs and consider the 4th G: Gigabytes.

IP theft is traditionally considered a "cyber" issue. However, data sharing and collaboration between physical and cyber teams can provide critical intel into potential IP theft and help proactively identify signals. With the sophistication of today's threat actors, companies can't only defend with a "cyber only" approach. In a recent report, 35% of respondents said because of an inability to successfully collect, collate and share information across physical security, human resources, cybersecurity, IT, and legal and compliance departments, insider abuse authorized cyber access led to property theft or supply chain damage.

Building out cross-functional collaboration between cyber and physical security teams will create a more unified approach, where a common language is established to better understand each department's key priorities and processes. Doing so ensures there is collective monitoring of identified risk groups or individuals. It also ensures that any information is shared across security departments, ultimately assisting in communicating any threats or risks promptly and consistently. During times of turmoil at a company, such as when a layoff occurs, the ability to act proactively and collaboratively is more crucial than ever.

The Protection of Culture

As you know, collaborative, proactive cultures that foster close working relationships between departments are essential to managing a company during times of uncertainty. But those relationships must be built before storm clouds form on the horizon.

Security teams can have a role to play in developing company culture by creating and fostering a proactive mindset that safeguards people, company data, and assets. They can be advocates for robust services that ensure a soft landing for impacted employees.

But a robust protection culture can, and should, be further leveraged with technology that organizes data from across the institution, creating a shared understanding of risks. From logging incidents and tracking cases to researching threats, a technology-enhanced risk strategy will create an 'always on' intelligence mantra that supports identifying insider threats and IP thefts.

During times of uncertainty, enacting proper security measures to identify risks proactively can help to minimize the number of incidents of IP theft and insider threats.

About the Author

Chuck Randolph is the Chief Security Officer at Ontic and is also responsible for Ontic’s Center for Protective Intelligence, which provides thought leadership and strategic consulting to security leaders, advising how to modernize their security programs, streamline initiatives and keep their people and assets safe.

Featured

  • Wisconsin Shooting Likely a 'Combination of Factors'

    Following the deaths of a teacher and student at Abundant Life Christian School in, Madison, Wisc., police chief Shon Barnes indicated that the motive appears to be a “combination of factors” for a 15-year-old female student’s attack on a study hall. Read Now

    • Active Shooter
    • Incident Response
  • Louisville Muhammad Ali International Airport Transforms Operations Using Data Insights

    Genetec Inc., provider of enterprise physical security software, recently announced that Louisville Muhammad Ali International Airport (SDF), a civil and military airport in Kentucky, USA is using Genetec Security Center to drive operational improvements to enhance efficiency and security while improving customer experience. Read Now

  • Two Killed During Shooting at Wisconsin Christian School

    Two people were killed and five injured during a shooting at the Abundant Life Christian School in Madison, Wis. on Monday. Read Now

  • Security Industry Association Unveils First-Ever U.S. Economic Impact Study

    The Security Industry Association (SIA) has unveiled the first-ever national economic impact study on the security industry, highlighting the positive impact the security industry has on jobs, wages and federal and state revenue in the United States. The study, conducted by Florida-based John Dunham & Associates, uses the most current methodology and data available from 2024. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3