Fishing for Sensitive Info
Let's play a game. It's like Truth-or-Dare, or Never-Have-I-Ever, but with your company's info rather than what you did during Spring Break. The idea is to... maybe... politely not tell people proprietary information, but not be an accusatory jerk... maybe... about it (even if you know damned well that the person interrogating you is asking for info they aren't really entitled to). Bonus points for figuring out what they'll do with that info.
Innocent-sounding questions from people you don't know are often someone performing reconnaissance on your company for... reasons.
"Hey, I want to sell you an infosec product. What SIEM are you using?"
"Can I have a copy of your SOC2 report?"
"Who are your investors?"
"Can you give me your CEO's name, email and phone number?"
领英推荐
"Who are your customers?"
"What cool new technologies are in your patent pipeline?"
"What will your sales be this quarter?"
If you're detecting a theme here, you win! Keep your proprietary information secret, sharing only with people who have a good reason to know and under circumstances in which you have legal protection (like that NDA). Or, to paraphrase: "Anything you say can and will be used against you in the marketplace."
In all seriousness, innocent-sounding questions from people you don't know are often someone performing reconnaissance on your company for... reasons. All of the above questions are things that in most cases aren't public information (and are actually protected by law in most jurisdictions) unless and until the company's officers have made the decision to go public with that info. And unless you're authorized by your company to actually sign an NDA yourself, it's a bad idea to make the decision about whether an NDA is required if there's any doubt at all.
And on a side note... you have no idea how hard it was to limit the answers to something that wouldn't get me in trouble with H.R. Have some hashtags instead. #infosecurity #tradesecrets #industrialespionage #socialengineering #confidentiality