US firms told to be on guard against Chinese IP theft

The Trump Administration has released documents to help firms protect themselves against potential attacks

binary on a screen with words 'hacking attack'

US-based companies have been warned by the government to protect themselves against hackers - particularly those originating from China after a spate of attacks on big businesses including HPE and IBM.

The National Counter-Intelligence and Security Center has been contacting security personnel within firms to beef up security on any trade secrets and other confidential intel to ensure if they are hacked criminals can't access sensitive information.

Advertisement - Article continues below

Specifically, the governmental department responsible for national security says it's worried about potential activity from state-supported hacker groups in China, Russia, North Korea and Iran.

National Counter-Intelligence and Security Center boss William Evanina said businesses should "know the intent of our adversaries and what they are trying to do economically to gain the upper hand. We are not saying don't invest in China or with China, but know the risk."

The security organisation has created a range of materials to support its campaign to knuckle down on attacks, including brochures detailing the types of attacks criminals are likely to launch (such as using fake social media accounts) and how to protect information. Some of the suggestions are to research apps before downloading them to make sure they're legitimate.

The National Counter-Intelligence and Security Center revealed there were nine high-profile attacks between July 2018 and December 2018 and at least two of these were traced back to China's main spy agency.

Advertisement
Advertisement - Article continues below

Russia also presents a pretty big risk to businesses and Evanina referenced evidence that the state had tried to infiltrate the country's power grids and communications, financial and transportation systems.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020