Skip to main content

5 Tips to Start Protecting IP and Trade Secrets

by Mark Stevens on Tuesday March 21, 2017

Contact Us
Free Demo
Chat

When the Justice Department issued indictments to five Chinese military officers on Monday it only reinforced the importance the Obama administration has placed on cyber security.

He was, after all, the first US President to mention cyber security in a State of the Union Address in 2013. The indictments focus on stopping the cyber theft of intellectual property (IP) and trade secrets and this is an issue we have been watching at our company for more than a decade. In fact, we work with some of the world’s top patent holders to ensure their IP is never compromised. When news like this breaks it reminds us to share some of the top tips we’ve used over the years to help enterprises focus on data protection.

Prioritize IP & Trade Secret Protection

This may seem like a no-brainer, but despite all of the chatter in the C-Suite about cyber security, very few companies have meaningful data protection programs in place today. They often cite the need to preserve the free flow of information as to not impede worker productivity. But, the truth is, there are valuable data protection solutions on the market today that balance the need to protect data with the need to drive rapid innovation. IP & trade secret protection has to be an executive priority or it won’t get done.

Identify Your Most Valuable Data Assets

Organizations must have knowledge of their IP and trade secrets if they want to prevent them from being stolen. We have seen too many organizations that have no idea where this valuable data is stored and who has access to it. Simply identifying the crown jewels can feel like a daunting task, but it doesn’t have to be - you don’t have to boil the ocean. Start with your most critical IP - the stuff you know the hackers are after. For example, manufacturers would do well to start protecting engineering and R&D documents like design files. Get that identified first and then move to the next organizational function.

Protect Those Data Assets

This is going to sound very basic, but once sensitive data is identified, label it! Literally mark all critical assets as “internal only” or “confidential”. Whether the document is digital or paper-based, this is the quickest and easiest protection method. It provides employees a visual cue to treat the document with care, and those employees are often hacker targets. There are much more sophisticated approaches and technology that ensure your trade secrets stay that way. From encryption to digital rights management and persistent document tagging, to policy-driven data protection, there are numerous solutions on the market that can be used to ensure data flows freely, but only on a need-to-know basis.

Think Like The Cyber Criminals

Take a look at all of your business processes to determine where data theft might occur. Assess your data from an outsider’s standpoint – what would you want to steal and how would you do it? And, go about the work to plug those holes. The security pros call it “threat modeling” and there are numerous companies and consultancies that can help you do this.

Improve Employee Awareness

The weakest link in data defense is the employee – from the C-level executive to the front office. Add data protection to manuals and employment agreements and train all employees on your policies regarding the use of confidential data. It also helps to perform regular security awareness training and invite your contractors, vendors and partners to participate, as they should be subject to your data protection policies as well.

Bonus Tip – Be Prepared if Your IP is Stolen

Have an incident response plan at the ready. Even the organizations that do data protection very well can still become victims of breaches. Today, cyber criminals are more nimble and financially motivated than ever before.

Tags:  IP Protection

Recommended Resources

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention

All the essential information you need about DLP in one eBook.

6 Cybersecurity Thought Leaders on Data Protection
6 Cybersecurity Thought Leaders on Data Protection

Expert views on the challenges of today & tomorrow.

Digital Guardian Technical Overview
Digital Guardian Technical Overview

The details on our platform architecture, how it works, and your deployment options.