US firms told to be on guard against Chinese IP theft

The Trump Administration has released documents to help firms protect themselves against potential attacks

binary on a screen with words 'hacking attack'

US-based companies have been warned by the government to protect themselves against hackers - particularly those originating from China after a spate of attacks on big businesses including HPE and IBM.

The National Counter-Intelligence and Security Center has been contacting security personnel within firms to beef up security on any trade secrets and other confidential intel to ensure if they are hacked criminals can't access sensitive information.

Specifically, the governmental department responsible for national security says it's worried about potential activity from state-supported hacker groups in China, Russia, North Korea and Iran.

National Counter-Intelligence and Security Center boss William Evanina said businesses should "know the intent of our adversaries and what they are trying to do economically to gain the upper hand. We are not saying don't invest in China or with China, but know the risk."

The security organisation has created a range of materials to support its campaign to knuckle down on attacks, including brochures detailing the types of attacks criminals are likely to launch (such as using fake social media accounts) and how to protect information. Some of the suggestions are to research apps before downloading them to make sure they're legitimate.

The National Counter-Intelligence and Security Center revealed there were nine high-profile attacks between July 2018 and December 2018 and at least two of these were traced back to China's main spy agency.

Russia also presents a pretty big risk to businesses and Evanina referenced evidence that the state had tried to infiltrate the country's power grids and communications, financial and transportation systems.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021
1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021