What is it about cyber security, information management and trade secrets and why should I bother?
…also stated as:
Don’t believe for one second a data breach will not happen.
When there is a data breach:
This is now an essential (and existential!) area of consideration for all businesses and all areas of business.
On average most companies take six months to work out they have been hacked, and this means the external hacker (thief) has 6 months start to utilise what they have gained from your business; this could be your launch plans, pricing, remuneration, strategy, inventions, secret code and algorithms etc.
SEC rules now require public companies to report how they are managing risks connected to the loss of any asset that, if stolen, could have a material impact on future earnings.?
Most companies will talk about cyber resilience, insurance, technical support, MSPs, and ISO standards. These are all good to an extent but not enough!?
When it comes to a data breach: ‘Your single biggest weakness is your people’
What most businesses do not realise is that the majority of data breaches are now caused by insiders, yes, your own colleagues or partners! This is the Insider Risk.?
When it comes to a data breach: the largest single area of damage is to Reputation (and Brand). What will happen to customer, investor, supplier perceptions of your business in the event of a data breach? How will you manage the narrative??
This sensitive data breach risk is very real and potentially very costly, but what can you do immediately?
Let me start by asking you a question: ‘Would you ask a third party to tell you where you have hidden your treasure’? You likely replied that this is nonsensical, but think for a minute, because do you actually have an up to date list of all the sensitive data items in your business grouped by value?
Without this how do you know what you are protecting and how do you know the value of what has been stolen?
领英推荐
The next key question to concerns your people. Do your colleagues all understand what they can and can’t do with your information? What is and is not sensitive? Why confidential information, knowledge and trade secrets are important?
Without this how can they be expected to defend and protect your sensitive information?
?Why not get started today with a free consultation?
Best wishes,
John Pryor
+44 7587 885 131
Follow on Linkedin https://www.dhirubhai.net/in/john-pryor-gb
WEBSITE: https://exaltip.com ?
To book a meeting: https://calendly.com/john-ip/30min
?
?
I am John Pryor, a full-time strategy consultant focussed on intellectual property and dedicated to supporting people and business to make the best use of all available IP to compete and win in the marketplace.
My aims are to maximise people’s understanding and to help develop their skills, so that they can deploy IP in their business successfully and cost effectively, to help achieve a higher valuation.
In these articles I explain some of the most important aspects of intellectual property in ways that make it relevant and accessible to business people.
?
#intellectualproperty #JohnPryor #patents #brand #innovation #knowhow #reputation #tradesecerets #patentbuying #patentlicensing #copyright? #trademark #socialmedia #cybersecurity #confidentialinformation #informationsecurity
Entrepreneur | Social Entrepreneurship, Development
12 个月If you think the 22m data leak we just had was it, im not certain but from following the news, trends and trail, I think were in for it yet. There is something coming, just listen and look at the National Cyber Directors face and expressions while confirming the leak vulnerabilities. Theres something bigger forsure.
Passionate about startups ??????
1 年Being prepared is key! Make sure to prioritize cybersecurity and educate your team. ??
Founder, CEO | Lloyd’s of London Underwriter, Market's first trade secret insurer covering the value of innovation assets. Advisor to Boards, investors, in-house counsel. Speaker, author, on cyber & IP risk management.
1 年Speaking my language. The first step in RM is indentification, then valuation, THEN security/mitigation because only then can you know how robust and what kind of protection needs to apply. Btw, cyber policies do NOT cover the value of trade secret or other IP. They cover the cost to re-key data. It’s a huge gap. We can fill it. Crown Jewel? Insurance
Marketing Content Manager at ContactLoop | Productivity & Personal Development Hacks
1 年John Pryor Love the post -- finding this helpful ??
Great list and timely reminder of how to be prepared in the event of an attack John Pryor