Sitemaps
Assume Everyone Will Leave in Year One
Stop Listening to Investors
Was Mortgaging My Life Worth it?
What's My Startup Worth in an Acquisition?
When Our Ambition is Our Enemy
Are Startups in a "Silent Recession"?
The 5 Types of Startup Funding
What Is Startup Funding?
Do Founders Deserve Their Profit?
Michelle Glauser on Diversity and Inclusion
The Utter STUPIDITY of "Risking it All"
Committees Are Where Progress Goes to Die
More Money (Really Means) More Problems
Why Most Founders Don't Get Rich
Investors will be Obsolete
Why is a Founder so Hard to Replace?
We Can't Grow by Saying "No"
Do People Really Want Me to Succeed?
Is the Problem the Player or the Coach?
Will Investors Bail Me Out?
The Value of Actually Getting Paid
Why do Founders Suck at Asking for Help?
Wait a Minute before Giving Away Equity
You Only Think You Work Hard
SMALL is the New Big — Embracing Efficiency in the Age of AI
The 9 Best Growth Agencies for Startups
This is BOOTSTRAPPED — 3 Strategies to Build Your Startup Without Funding
Never Share Your Net Worth
A Steady Hand in the Middle of the Storm
Risk it All vs Steady Paycheck
How About a Startup that Just Makes Money?
How to Recruit a Rockstar Advisor
Why Having Zero Experience is a Huge Asset
My Competitor Got Funded — Am I Screwed?
The Hidden Treasure of Failed Startups
If It Makes Money, It Makes Sense
Why do VCs Keep Giving Failed Founders Money?
$10K Per Month isn't Just Revenue — It's Life Support
The Ridiculous Spectrum of Investor Feedback
Startup CEOs Aren't Really CEOs
Series A, B, C, D, and E Funding: How It Works
Best Pitch Decks Ever: The Most Successful Fundraising Pitches You Need to Know
When to Raise Funds
Why Aren't Investors Responding to Me?
Should I Regret Not Raising Capital?
Unemployment Cases — Why I LOOOOOVE To Win Them So Much.
How Much to Pay Yourself
Heat-Seeking Missile: WePay’s Journey to Product-Market Fit — Interview with Rich Aberman, Co-Founder of Wepay
The R&D technique for startups: Rip off & Duplicate
Why Some Startups Win.
Chapter #1: First Steps To Validate Your Business Idea
Product Users, Not Ideas, Will Determine Your Startup’s Fate
Drop Your Free Tier
Your Advisors Are Probably Wrong
Growth Isn't Always Good
How to Shut Down Gracefully
How Does My Startup Get Acquired?
Can Entrepreneurship Be Taught?
How to Pick the Wrong Co-Founder
Staying Small While Going Big
Investors are NOT on Our Side of the Table
Who am I Really Competing Against?
Why Can't Founders Replace Themselves?
Actually, We Have Plenty of Time
Quitting vs Letting Go
How Startups Actually Get Bought
What if I'm Building the Wrong Product?
Are Founders Driven by Fear or Greed?
Why I'm Either Working or Feeling Guilty
Startup Financial Assumptions
Why Every Kid Should be a Startup Founder
We Only Have to be Right Once
If a Startup Sinks, Founders Go Down With it
Founder Success: We Need a Strict Definition of Personal Success
Is Quiet Quitting a Problem at Startup Companies?
Founder Exits are Hard Work and Good Fortune, Not "Good Luck"
Finalizing Startup Projections
All Founders are Beloved In Good Times
Our Startup Culture of Entitlement
The Bullshit Case for Raising Capital
How do We Manage Our Founder Flaws?
What If my plan for retirement is "never retire"?
Startup Failure is just One Chapter in Founder Life
6 Similarities between Startup Founders and Pro Athletes
All Founders Make Bad Decisions — and That's OK
Startup Board Negotiations: How do I tell the board I need a new deal?
Founder Sacrifice — At What Point Have I Gone Too Far?
Youth Entrepreneurship: Can Middle Schoolers be Founders?
Living the Founder Legend Isn't so Fun
Why Do VC Funded Startups Love "Fake Growth?"
How Should I Share My Wealth with Family?
How Many Deaths Can a Startup Survive?
This is Probably Your Last Success
Why Do We Still Have Full-Time Employees?
The Case Against Full Transparency
Should I Feel Guilty for Failing?
Always Take Money off the Table
Founder Impostor Syndrome Never Goes Away
When is Founder Ego Too Much?
The Invention of the 20-Something-Year-Old Founder

Espionage In The Era Of The Entrepreneur: How Safe Is Your Intellectual Property?

Pratik Dholakiya

Espionage In The Era Of The Entrepreneur: How Safe Is Your Intellectual Property?

In a world where business moves at the speed of the IOT, and where data and passwords are more readily available online, entrepreneurs have a new obstacle to address: the protection of their intellectual property.

While corporations have the resources to hire top cyber security teams and implement software solutions that protect their collateral, criminals are increasingly taking an interest in small and medium sized businesses. The new targets have equally marketable data, designs and digital information that have value for criminals, and for foreign governments.

The question to ask: Is your business at risk?


screen-shot-2016-11-29-at-7-09-56-pm

The technology industry and foreign policy

In 1986, China began a program that has been loosely referred to as “shadow innovation” and formally identified as “Program 863”. Many experts believe that the era of entrepreneurial espionage actually began thirty-years ago and evolved into a significant concern for international brands and small businesses, particularly through the escalation of hacking and other illegal methods of resourcing.

“Program 863” encouraged citizens to ‘acquire’ products, patents and designs (including technology and software) that were proprietary to other countries. Unlike many other countries, China has been charged with illegal acquisition of American technologies.

The country has also developed both a reputation and history of encouraging private individuals (not governmental agencies) to procure information, products and other sensitive intellectual property. Russia, France and Israel also share a historical reputation for accepting the practice of industrial or trade espionage.

In 2013, the Global Intellectual Property Center stated that the net annual loss due to intellectual property (IP) theft costs American businesses more than $300 billion dollars annually. Some of the most highly targeted niche industries are:

  • Clean energy
  • Technology
  • Software and applications
  • Motion picture and film
  • Music and entertainment
  • Pharmaceutical and medical devices

Digital storage and file sharing have exposed small businesses, designers and large corporations to both domestic and international loss through intellectual property theft. In the first half of 2014, “500 million unique IPs shared files globally, accounting for more than 17 billion downloads and $275 billion dollars of unmonetized demand.”

What kinds of cyber exploits impact businesses?

One of the most common and effective exploits is called a “watering hole” attack. In this scenario, trying to gain access to a website through the main domain (where security protocols are in place) is too difficult. Instead, the perpetrating hacker makes some educated guesses on the other websites or cloud destinations that the business may use, including apps, partner organizations, etc.
The hacker then infects the partner domain with malware, seeding the cloud with viruses that have a probability of being injected when the victim organization uses the partner sites.This allows for “backdoor access” that frequently bypasses firewalls and other security monitoring and software.

One very high-profile example of a “watering hole attack” was the hack of Forbes Magazine website in November 2014. Two zero-day vulnerabilities in both the Microsoft Internet Explorer browser and the Adobe Flash Player were exploited. The malware infected visitors to the site, when they clicked on the “Thought of the Day” page. As you can imagine, infecting Forbes may have been a gateway to gaining access to a limitless number of sites, which use the magazine as a daily resource.

The cyber-espionage campaign was later attributed to the “Codoso Team or the Sunshop Group”, which is an internationally known Chinese hacking organization. Read more: “Top 10 Web Hacking Techniques of 2015”.

Why size doesn’t really matter

Many companies assume that intellectual property (IP) or data theft is only a concern for large brands, or international organizations. Increasingly however, as large companies allocate more resources to cyber security, it is the small and medium sized businesses, and solopreneurs who are most vulnerable to copyright or data theft.

The PwC (Price Waterhouse Cooper) Global State of Information Security Survey 2015 revealed some alarming facts:

  • Theft of intellectual property increased by 56% in 2015
  • There were 38% more security incidents reported in 2015 compared to 2014
  • Employees remain the main source of data breach
  • 22% of IP theft or compromise involved a business partnership or partner organization
  • SME’s reduced security spending by 5% in 2015, due to profit loss and budget

What can a small or medium sized business on a tight budget do to protect intellectual property? First, recognize that being a small business does not exempt you from being a victim of hacking and digital theft. Hire a security professional to evaluate your digital collateral (starting with your website) to determine areas of risk that may be susceptible to malicious code and exploitation by cyber criminals. This small investment is more than worth it to protect your business and IP.

What measures do you have in place to secure your business and IP?


This article was originally shared on Startup Grind

No comments yet.

Upgrade to join the discussion.

Already a member? Login

Upgrade to Unlock