Carefully Destroy 30 Details Of An Enterprise
Be careful of the 30 details. They will destroy your company in a minute.
This is a commercial era with 1% or 2% wins. A message can control the success or failure of an enterprise.
1. printer - 10 seconds delay brings information loopholes. Even laser printers, there are more than 10 seconds of delay. If you don't stand next to the printer in ninth seconds, the first person to see the file may not be you.
Most modern companies use public printers and put printers, photocopiers and other equipment in a relatively independent space.
As a result, confidential documents between departments can start from the equipment room and spread in other departments. When there is no secret between departments, the company will have no secrets.
On the back of the 2. printing paper, the great loss of good habits, the saving of paper is a good habit of many companies. Employees often use the back printing paper to be proud.
As a matter of fact, the "waste paper" collected by the company will be gathered together. You will find that the company secrets of the waste paper produced by printing and photocopying are so comprehensive that even the executive vice president will feel ashamed because the waste paper records the company's overall internal capacity.
3. computers change hands, the new employee's real mentor. We believe that all professional managers have had such an experience: if they are new to a company, roaming in their former computers is the best way to understand the new company.
In a state of "snooping", everything that happened in the company "has a panoramic view", from past customer records, rewards and punishments system, and even your lucky enough to read the resignation of your predecessor.
If it is the computers of other departments, it is also a pleasure.
Sharing the 4. share of the document: notifying the users of the documents and sharing them in the LAN is the last access to the internal secrets of the company.
In order to eliminate the leakage of internal network, some companies require that everyone should cancel immediately after sharing.
In fact, the greater the risk, the greater the risk of sharing secrets.
Because when people do this, they will use the sharing way to disseminate information without any concern. The way people are used to shouting in the open office is to their colleagues on the other side: "I put it in the share, you can take it."
Yes, someone will take it, but not just the person you expect.
The comparison between the 5. index of smart companies is that smart, smart and misleading businesses often have to guess the number of competitors and the number of production in traditional production enterprises.
Therefore, in order to hide their actual number, people introduce the index in statistics, and protect their confidential information by weighting the actual number.
The only thing that is regrettable is that the simple base period weighting is usually adopted. If the other person knows the true number of any month in a few years, all the real numbers will appear on the desk of the competitor.
6. training, information security, from passive to new employees to enter the company, most of the enterprises will be honest with new employees.
Starting from the first day of training, the new employees, in the name of "faster integration into the team", are exposed to all the operations except finance, from company strategy to tactical tactics, from core customers to key technologies.
But in fact, more than 1/5 of employees will leave the company after three months.
At the same time, most of them do not leave the industry they are engaged in, and may be describing your company with every detail of your competitors.
7. fax machine - you always get the fax sent to you in half an hour. There is always a fax saying "no one gets it". Every Monday someone will not receive important fax.
People are always surprised to find that the last page of their fax paper is someone else's beginning, but you can't find your beginning.
8. public devices, not equal to public information, are often used in a small company or in an independent department. People often use a U disk, a floppy disk, or a laptop.
If you have the opportunity to lend the U disk to the new accounting of the company, you may easily get the company's profit and loss statement this month when the other party returns.
The 9. camera, which is a lost bidding opportunity between the waving hands, has emerged from a large domestic advertising agency in Shanghai in March 2004, which led to information leakage on the day before the competition, which resulted in the advertising competition being stolen by competitors. The reason was that the video of the OICQ was installed.
10. product traces - "trace" to understand your future. In the field of market research, analyzing product traces to infer competitor marketing effect and marketing strategy is a general method.
The pportation, storage and discarded packaging of products can be found in the research reports purchased by competitors, because "trace analysis" is the conventional means of business intelligence collection.
11. compression software, the biggest threat to information security, ZIP and RAR are the biggest threats to enterprise information security.
The storage space of the 3 inch floppy disk is 1.4M, and the compressed software allows large WORD files to be easily stored in a floppy disk and easily bring all kinds of data out of the company.
If you want to take away the company's information, the best way is to apply for CD backup, make the file in a specific format, give it back to the network administrator, then claim that it can not be opened normally, and ask for a backup. In most cases, the "discs" left in the CD-ROM can be taken out of the company in large squares after work.
The 13. mailbox, the information pfer station, uses the e-mail to pfer and steal company information, accounting for more than 80% of all information theft.
Many enterprises do not install floppy drives, CD-ROM, USB interface, but there is no way to avoid employees stealing information through e-mail. By contrast, the above methods seem childish and ridiculous.
14. hidden areas: the long way to steal company information is necessary. Long term collection of information in the company for sale or reservation is always a dangerous thing.
Your computer is always used by others, and it is found that there are some things that should not be in the computer.
So hiding in the hard disk partition has become the best choice. Originally there are three virtual partitions, C, D and E, which can hide E and only have access to it.
Of course, if you meet a connoisseur, the total space of all disks can be summed up.
15. personal computers, the most commonly used means of stealing data, the role of compression software is limited. If you bring your laptop to a unit and connect to a LAN, it will take 1 G files to take away in half an hour.
16. minutes of meetings: neglected company secrets, secretaries and secretaries often see minutes of meetings. They do not know what a high-level meeting record means to their competitors. Companies often see people throw away the minutes as waste paper, leaving the company's latest strategic information in any corner of the enterprise.
The 17. plan that has not been adopted is abandonment. It is also a choice. The planners know that the plan adopted is a company secret, and they often do not know that the plan being abandoned is also a company secret.
Sometimes it will talk to customers or media, and competitors can easily judge: if you did not do this, you would have chosen to do those things.
18. customers -- your secret is just an ally's conversation fund. You can often see the customer's proposals of the famous consulting companies on the Internet. These elaborate PPT have condensed the sweat of the consulting company team and countless sleepless nights. In some poor credit customers, they can only talk freely.
19. recruitment activities: your company is recruiting director?
In the recruitment process, mature enterprises will not put their employers in an advertisement, because it tells your competitors: just now, there has been manpower shortage and manpower shortage.
20. minutes before tendering two minutes, the final bottom price is always in the final stage. If the bottom price of the bid is released earlier, the greater the risk of leakage, the two minutes before the start of the tender, the bottom price can be announced for the participants who turn off the cell phone.
21. half an hour after the dismissal - don't give him the last chance. If the fired staff get the news today, don't let him go back to his computer.
For half an hour, he could just pick up his things and make a brief farewell to his old colleagues. There was no end to the banquet. Half an hour was enough.
22. weeks after the entry of the new recruits, the information collected by the newcomers in the first week is 5 times that of normal. Only during this week, he is always ready to leave. He is always in a crazy copy and pmission state. Watch out for your new staff, no matter how much you appreciate him.
23. months after the first half of the first half of the first half of the first half of the first half of the first half of the first half of the first half of the first half of the first half of the first half of the first half of the month, your caution in information security can only show that the business is rigorous and can win the understanding and respect of most of the customers.
Unless he is your competitor.
24. days after leaving, 30 days after the departure, the risk is from outside the company. Generally speaking, a employee who has served for more than half a year will maintain frequent contact with the company's employees within 30 days after leaving office and show extreme enthusiasm for the company's information and status.
If it is time to leave, then it will be more likely to steal company information from old colleagues within 30 days of leaving.
The 25. principle is to make clear the principle of external proposal. If you can keep something, you will not print the manuscript. You can print the manuscript without giving the electronic file. You can use the e-book instead of the general format. The 26. confidentiality agreement -- no matter the size of the action, the signing of a clear confidentiality agreement with the employees, or the necessity of not having any rules or regulations, Cheng Fangyuan is clear about what is right.
The more detailed the content of the confidentiality agreement is, the better. If the other party is honest, they will readily agree.
The 27. is the responsibility decomposition. It is clear that everyone is responsible for the safety of related information. If all the classified documents are leaked, the responsible person can be found according to the regulations, and the investigation is secondary. Mutual supervision and prevention is the ultimate goal of responsibility decomposition.
28., set up the information level - level classification of confidential documents of the company, such as contracts, customer contacts and shareholders' status as a level, determine the scope of confidential communication so that everyone can understand the boundaries of information pmission and avoid information security incidents caused by ignorance of information.
Save 29. different places. Do not put eggs in the same basket. All backup information should be kept as far away as possible. Avoid serious accidents such as fire, earthquake, war and so on, which will bring a fatal blow to enterprise information.
30. believes that their enterprises are unassailable in information security.
- Related reading
- Fashion shoes | Yeezy 500 Shoes New "Stone" Color Sale Details Released, Rich Upper Level
- Fashion brand | Mei Chao NOAH 2019 Renewable Nylon Series Released, The Patchwork Design Is Very Attractive.
- Company news | The Originality Of Chinese Fiber -- Sheng Hong Group Uses "Chi Chuang Green" To Decorate The Future.
- neust fashion | Needles Brings The Latest Autumn And Winter Tracksuits Suit!
- neust fashion | PUMA Joint Korean Chao Brand Shoes Will Be On Sale This Saturday.
- Instant news | The Past European Tide Brand Has Now Become A Three Line Brand.
- Instant news | Original Research: People Feel A Sense Of Awakening By Designing Their Own Works.
- Instant news | Double Eleven Jingdong, Many Gods Sink
- Expert commentary | Polyester Filament: "Silver Ten" Should Be Cool.
- Daily headlines | The Twelfth China (Jiang Jiang) Home Textile Painting Fair Was Held In Tongzhou To Promote The New 1+3 Pattern Of Home Textile Industry.
- How Does The "Frozen" Chain Move Again?
- Zhang Ruimin: The Only Thing That Can Stop Us Is Ourselves.
- 41 Manifestations Of Poor Corporate Management
- 8+10 Death Method Of Chinese Private Enterprises
- Olympic Athletes Should Be Careful When They Speak For Enterprises.
- Six Essential Features Of A Good Company
- Consumer Perspective Of Celebrity Endorsement
- Improving Customer Satisfaction -- Winning The Strategy Of Bottled Water
- "Shadow" Enterprise -- Inspiration From Nike'S Success
- The Simple Rule Of Management: The Heart Is Not Grass.