Business Times

Five corporate lessons from WikiLeaks

By Damith Kurunduhewa

‘We Open Governments !’ is the daring motto of the Wiki-Leaks – a document archiving web media upheaval (which operates on virtual headquarters format) created by Julian Assange for the Sunshine Press in December 2006. Since then, the Wiki-Leaks have exposed sensationally secret information related to individuals, political and military circuits and governments of countries.

A random sample of them projects Guantanamo bay prison procedures, Contents of Sarah Palin’s Yahoo mail account, 9/11 pager messages, Afghan war diary, Iraq war logs - and the exposure of over 250,000 US diplomatic cables being the latest. The Wiki-Leaks further frightens the corridors of power by announcing more drip-outs in the coming months which drew sturdy retorts from diverse zones of the globe. While it is a matter for governments of the world to deal with, the episode concerned offers lessons on the criticality of corporate information care – for those who think deep.

Lesson 1: Data serves the holder
Data are similar to guns. They support the master of the moment. In any form of governance, the precise management of its data and information is a core responsibility of those who create, share, receive, transmit and archive them – directly or indirectly. Business managements have no immunity and the corporates – in varying degrees – stand to lose when such volcanic data leaks occur.

It can be the debtors list of a bank, clinical data of patients of a hospital, complete formula of a market-crazy production, travel plans of directors and critical source points of a supply stream or even internal memos exchanged among top management over a period of time. When you lose control and due confidentiality, it is the current possessor who now holds a domination over you, your business and your plans.

Lesson 2: Look beyond electronics
Many corporates are yet to drive their data care beyond electronic realm. Despite reasonably sound data care controls on soft configuration, the same companies still stand a chance of losing vital business information owing to lack of control on hard format such as photo copying, scan option, faxing mode and record room pilferage etc. It is more so when data transmitted on (direct or line) voice formats does not get due focus from the managements. The wireless bugging of a board room by a business espionage expert posing as a naïve cleaning service worker can cost your business in big-time.

Lesson 3: Allegiance is transitory
The life time loyalty is an infrequent fad. What we see around us is only transitory allegiance. Such fidelity happens for some reasons and - better reasons often result in a switch in allegiance. After detaching themselves with a person or an organization, many individuals no longer rate the gravity of information that they are privy to. Recently, a senior manager (upon suspension) was detected with vital company information – both on soft and hard formats – in hidden possession on her way-out. The motive was to hit-back at individuals and the company by creating life and business sensitive information leak.

Lesson 4: High-tech gets high risk
With numerous web based social media options such as blogs, the options are wide open for discreet information outflow to someone with a vicious motive while remaining mysterious, anonymous – and most dangerously within the trusted circle. When technology developed the wireless data tools, the next came (in no time) was the social engineering fiddles such as electronic pick pocketing, Phishing, password spoofing, SMishing and VoIP vishing etc. The lesson here is simple and clear. The higher you are on the ultra-tech ladder sans exact levels of care; the fall is an immense hurt and humiliation someday.

Lesson 5: Money talks often
Unauthorized data possession, thievery and exposure come about for many reasons from mere fun to ideology - from revenge to sabotage - from mental disorder to blackmailing to cite a few. Yet, the nucleus reason is the fiscal value created for data by a hush-hush market which is eager to procure them. Sometimes, it could be an inner circle employee who is on the under-wrapped payroll of your - not so gentle – competitor or the rival. This is a discovered reality in corporate raider domain, at insider information based share frauds and sales plan theft. Mostly it is money, position, perks or a combination of all that often sets the motivation for information theft.

That is why the professional vigil – both on behaviour and data care – forms a vital component of information risk mitigation – in relation to future-centric leakage potentialities that may uncover decades of doings and un-doings in the past. As the saying goes, ‘Things go wrong when we least expect it - or worst still when we never expect it’. The next question is what do you do – not if - when that happens to your business critical information. Are you ready with your plan B ?

(The writer is a Corporate Risk and BCP Specialist / Pragmatic Trainer and the CEO of Strategic Risk Solutions. He can be reached on solutions@sltnet.lk).

Top to the page  |  E-mail  |  views[1]
SocialTwist Tell-a-Friend
 
Other Business Times Articles
Fresh bids called for CCC property
Aitken Spence, JKH, Cargills interested in GOH
More than Rs 31 bln from IPOs/Rights Issues since war ended
Treasury control of tea cess spawns new export levy
Two mobile telcos eye Lanka Bell
Softlogic Group to buy Hotel Ceysands
Comment - Moving into another millennium
Feature - Climate change worries and challenges
Feature - CEPA talks in December: The lies will start again
Opening doors to Europe through a second residency and citizenship
Panasian Power to raise Rs.600 million through IPO
Caribean firm increases stake in Coco Lanka
What you eat is an investment issue
Communities of practice
EPF money used to bail out business cronies: CFL
Lankan delegation in Scotland on Commonwealth Games bid
Pakistan and Sri Lanka agree to reinvigorate the Joint Economic Commission
SriLankan launches expansion plans
Useful day-to-day info on mobile phones soon
Five corporate lessons from WikiLeaks
Singer Finance IPO, parent firm raises Rs 1.4 bln
New 'airtel' global identity in SL
ICASL prepares to reward best financial reporting units
FCCISL ties up with SLIM to promote new marketing programme
AA wins National Business Excellence Award 2010
Innovative fuel station by Lanka IOC at Marawila
SEC rules bring in new big business for banks, broker firms
From Sea Street to Gold Street: New Gold Centre in Colombo
Dec. 6 finals for 'Inter-University Enterprise Mobility Software Competition'
Intellectual property rights for agricultural development
Fitch replaces Hayleys' RWN with 'Negative'
Central Bank mulls more exchange control relaxations
Blocking NGOs from grassroots work not helping government
Post conflict optimism dropping : Study

 

 
Reproduction of articles permitted when used without any alterations to contents and a link to the source page.
© Copyright 2010 | Wijeya Newspapers Ltd.Colombo. Sri Lanka. All Rights Reserved.| Site best viewed in IE ver 6.0 @ 1024 x 768 resolution