US firms told to be on guard against Chinese IP theft

The Trump Administration has released documents to help firms protect themselves against potential attacks

binary on a screen with words 'hacking attack'

US-based companies have been warned by the government to protect themselves against hackers - particularly those originating from China after a spate of attacks on big businesses including HPE and IBM.

The National Counter-Intelligence and Security Center has been contacting security personnel within firms to beef up security on any trade secrets and other confidential intel to ensure if they are hacked criminals can't access sensitive information.

Specifically, the governmental department responsible for national security says it's worried about potential activity from state-supported hacker groups in China, Russia, North Korea and Iran.

National Counter-Intelligence and Security Center boss William Evanina said businesses should "know the intent of our adversaries and what they are trying to do economically to gain the upper hand. We are not saying don't invest in China or with China, but know the risk."

The security organisation has created a range of materials to support its campaign to knuckle down on attacks, including brochures detailing the types of attacks criminals are likely to launch (such as using fake social media accounts) and how to protect information. Some of the suggestions are to research apps before downloading them to make sure they're legitimate.

The National Counter-Intelligence and Security Center revealed there were nine high-profile attacks between July 2018 and December 2018 and at least two of these were traced back to China's main spy agency.

Russia also presents a pretty big risk to businesses and Evanina referenced evidence that the state had tried to infiltrate the country's power grids and communications, financial and transportation systems.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

14 Jan 2021
Mimecast admits hackers accessed users’ Microsoft accounts
Security

Mimecast admits hackers accessed users’ Microsoft accounts

13 Jan 2021
What is public key infrastructure (PKI)?
Security

What is public key infrastructure (PKI)?

12 Jan 2021

Most Popular

IT retailer faces €10.4m GDPR fine for employee surveillance
General Data Protection Regulation (GDPR)

IT retailer faces €10.4m GDPR fine for employee surveillance

18 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021