Sie sind auf Seite 1von 5

1.

Create a policy that prevents prevent workplace violence in the


harassment. higher levels of your facility.

Be sure to involve each level of the


facility, such as the managers, 4. Establish a “Zero-tolerance”
employees, and executives and keep code of conduct.
them informed about the new policy.
Distribute the policy as wide as Be sure to check that all employees
possible and be sure to know that are aware of your facility’s code of
every employee understands it. conduct. This helps to show your
Complaints can be handled well with company’s commitment to preventing
a set of procedures that take care of a violent intruder.
them quickly and privately.

5. Encourage your employees to


2. Create an effective line of accept individual differences.
communication.
Help your teams to understand that
Communication is a key factor in the differences between each
preventing workplace violence. member are a vital factor in team
Violent intruders thrive on silence strength. Activities can help the
from the victims and any witnesses. teams get to know each other and
Encourage your team members to recognize individual’s strengths and
communicate by having regular team weaknesses.
meetings. These meetings will help
defuse tensions and
misunderstandings while ultimately 6. Prevent conflicts from turning
defusing any possibility of violence. into harassment or violence.

Monitor your teams and how they


3. Training sessions and work together. Some team situations
awareness is a key factor in can cause tensions and if these
helping to prevent violence. tensions are not relieved, they can
fester and grow into a negative
Take the time to have training workplace causing violence and
sessions and provide awareness of a harassment. Resolve these conflicts
violent intruder. Emergency quickly as soon as they begin.
Response Plans should be drawn up
and Emergency Response and
Preparedness Training should be 7. Show that the quality of the
provided as well. Emergency relationships between each
Management Training will help to members of a team is important to
you and everyone else on that the risk of this by keeping the
team. amounts of the assets to a minimum,
use electronic pay systems to reduce
Be sure to encourage each person to assets that are available, and install
be open-minded to team members a locked drop safe.
and give each of them an important
role showing that their work is
meaningful. Be fair and respectful to
every member, showing that when
OR DAYA
they treat you and everyone else with
Conduct a risk assessment.
respect, they in return will be shown
respect.
What corporate data is the most
valuable for your company?
8. Communicate with each level of
Find potential targets. You need to know
your facility the unacceptable what trade secrets and other valuable
behavior and the consequences of data your company possesses and how
threatening any other employee or much they’re worth. You can evaluate
committing any violent acts. your trade secrets by comparing them
with products already available on the
Define these unacceptable behaviors market or with known assets of your
clearly and precisely and give clear competitors.
examples. State your facility’s view of
workplace violence and its Once you identify your most valuable
commitment of a safe workplace. data, you can guess who may want it.
Once you know possible threats and
potential attack vectors, you can detect
vulnerabilities in your own defenses.
9. Encourage everyone to report
any and all violent incidents. Risk assessment is key to a risk-based
approach to security, which should be
Ensure your employees of the part of the security strategy of every
confidentiality in which they can organization. You should also work out
report incidents and assure each that an incident response plan. It will help
no retaliation will be made against you respond in case of a data breach
those that report acts of violence. and minimize its impact on your
business.

10. Reduce the risk involved in Establish an effective security policy


handling the assets of your
company. Do all your employees follow your
security policy?
Robbery is a large factor in
workplace violence. You can reduce
All security rules should be formalized in Establish a secure perimeter around
a clearly written security policy. This your company network. Conventional
policy should include rules prohibiting corporate cybersecurity software, such
password sharing and employees as firewalls and antivirus software, is
bringing their own devices to work, your first line of defense.
among other things. Make sure all your
employees are aware of it, starting with Make sure to separate your valuable
upper management. data from your corporate network and
limit access to it. Protect your border
Maintain an efficient data access routers and establish screen subnets. A
policy secure perimeter with a layered
approach is the best way to protect
Who can access critical data? Do they yourself from industrial and economic
really need to? espionage through hacking and
malware.
Many companies provide access to
critical data and infrastructure by Educate employees
default. While it may be more
convenient, this policy is not secure. Do your employees understand how
they contribute to the company’s
Your company should follow cybersecurity and why they should do?
the principle of least privilege and
prohibit access to all data unless The best way to prevent your
necessary. employees from inadvertently helping
the enemy is to educate them. Tell them
Applying the so-called “need to know” about potential threats your company
principle means that you provide access faces.
only to employees who really need
information. If unauthorized employees Make employees aware of the role they
occasionally need to work with play in the security of your organization.
confidential information, they can do it Teach them about simple security
under the supervision of authorized practices to use in their daily workflow.
staff. This will help protect your staff from
social engineering and will prevent
By limiting the number of people with simple security mistakes, such
access to critical data, you strongly limit as sticking with default passwords.
the risks of your competitors obtaining
this data.

Secure your infrastructure

Are you protected by a perimeter with a


multi-layered approach?
You’ll never know whether your
employees are acting maliciously,
intentionally, or inadvertently unless you
monitor their online presence.

Conduct background checks It’s especially important to keep an eye


on privileged users, such as system
Do you know who works for you? administrators and upper management.
They can easily gather intelligence while
Before hiring someone, the HR performing their normal tasks and
department usually conducts explain any abnormal behavior as a
a background check. mistake.
This minimizes risks of finding a mole in
your organization. Employee monitoring makes all
employees’ actions fully visible and
It can be helpful to repeat these checks allows you to detect data theft and take
once in a while – especially for measures in a timely manner. In case
employees with privileged access – to an incident happens, you can use the
ensure that they don’t become spies. A records for your investigation.
sudden surge in standards of living,
unexpected trips, or paying off debt are Moreover, monitoring employees can
among potential causes for concern. deter opportunistic employees from
stealing data, as they know their actions
Create a proper termination are recorded.
procedure
Read also:How to Build an Insider Threat
Are you sure your ex-employees won’t Program
access your company’s data?

In many cases, company espionage is Ekran System – A


performed in the last couple weeks of
work. Employees’ credentials are often monitoring solution for
still active after termination, so they can preventing industrial
still access sensitive data for malicious
purposes. espionage
Create and implement a proper
termination procedure to protect your Ekran System is a universal employee
company from potential acts of industrial activity monitoring solution specifically
espionage by former employees. designed to combat insider threats,
including industrial espionage.
Monitor employee activity
It can monitor the actions of every user
What are your employees doing online regardless of their level of privilege,
during their work time? allowing you to control the actions of
system administrators and users with activity to detect unusual behavior. The
access to trade secrets and financial UEBA module will help you prevent data
information. breaches long before they happen.

Particularly, Ekran System provides you  Actionable alert system. In addition to


with the following features for detecting an impressive collection of alert
and preventing industrial espionage: templates, you can set custom alert rules
based on any suspicious events like
Manage access and audit user opened URLs, process names, or
activity connected USB devices. When the
system identifies a suspicious event, your
 The PASM solution in Ekran System security team receives a notification so
helps you implement the principle of they can act immediately.
least privilege. It provides access
management for privileged and general  Automated incident response. An
user accounts. You can specify endpoints automated response guards your data
that particular users can access, limit the even before the security team reacts. You
time of their sessions, and provide can assign a risk level and choose
temporary and permanent credentials. between blocking a user, terminating an
application (or process), blocking a
Monitor and investigate connected USB device, displaying
warning messages, and other options.
 Screen video recording. You can watch
all kinds of account sessions in a
convenient YouTube-like player and
filter them by username and IP. Videos
are indexed with layers of text metadata,
including visited URLs, typed
keystrokes, and names of opened apps.

 Ekran can record input and output


audio streams on user
endpoints. Recorded audio can be
exported for further analysis.

 Key episode search. Advanced session


analysis allows investigators to search
episodes by various parameters within
the current session and across all
recorded sessions.

Respond to threats in real time

 User and entity behavior analytics


(UEBA) is an artificial intelligence-
powered module that analyzes user

Das könnte Ihnen auch gefallen