It is advisable to use the following methods of
work for employees who use documents that
represent a trade secret:
create instructions for using and working with
protected information;
appointment of persons responsible for office
work;
strict supervision of employees who have
access to confidential documentation;
obtaining written consent from employees for
non-disclosure of commercial information;
application of technologies for the protection of
confidential information;
administrative control over the security of the
use of information in their confidential
documentation.
One of the tools when working with employees
who have access to confidential information should
be a comprehensive work with the staff. When there
is a need for a new employee for a position that
involves working with confidential information, it is
advisable to adhere to the following admission
technology.
The most widely used way to protect the business
information of an enterprise is to enter into a non-
disclosure agreement on the organization's trade
secrets. Such an agreement must be signed with all
employees who, in the course of their work, begin to
possess secret information and confidential
information about the company. To regulate such
relations related to the use of confidential information
in the company, first of all, the main document of the
organization – the Charter, which discloses the
concept of commercial secrets and establishes
responsibility for its violation.
A threat to the information security of an
enterprise can also be the dismissal of an employee
who had access to confidential data. After dismissal,
the employee no longer has obligations to the
organization, which may encourage him to disclose
valuable information to competitors. In order to
reduce the risk of such consequences, the company's
management should inform employees about the
prohibition of using any information obtained at the
workplace in their own interests or in the interests of
third parties. In order to protect the company from the
possible consequences of such actions, the employee
must sign a non-disclosure of confidential
information (trade secrets) after his dismissal. If an
employee violates this agreement, all losses incurred
by the company as a result of illegal actions can be
recovered in court.
Another tool aimed at maintaining a high level of
the company's confidential data protection system is
the need to actively engage in training, placement,
promotion, and stimulation of employees, regularly
instruct them about the rules for working with
confidential information, inform them about the need
to comply with all these rules and about responsibility
in case of violation.
An important aspect in the present time is the
transition of the company's employees to remote
work. In this regard, a particularly important aspect is
the formation of ways of information security of
employees in this mode of their work. To ensure the
information security of employees when working
remotely, the company must develop and prepare a
document that will display brief information for
employees that will help them protect themselves
directly at their workplace. The list of aspects that
should be specified in this document includes:
how to protect the devices with which the
employee works with antivirus software;
pay special attention to the importance of
updates to programs and the operating system
on the employee's computer, since applications
and operating systems are constantly finding
vulnerabilities through which an attacker can
steal any employee information; updates are
often used to monitor and fix problems that
arise;
how to set up Wi-Fi encryption so that attackers
do not intercept the data that an employee
enters over the Internet, for example, about
passwords in the system for remote access or
corporate email credentials;
emphasize the importance of changing the
username and password from the router, since
many employees may have it by default, and
this can be used by attackers when compiling
the code of viruses and malware;
an explanation for the employee that in
coworking areas or other public places, you
should work especially carefully, so that
unscrupulous people surrounding the employee
in public places can not track his information
through public Wi-Fi;
pay special attention to blocking the device
when an employee leaves the workplace, so
that no unauthorized persons see various
corporate information, or accidentally delete
important data;
the importance of using only corporate mail or
corporate messengers, since all the information
sent through them can be intercepted by an
attacker and used for their own purposes;
configuring the employee's firewall system to
monitor incoming and outgoing traffic when
Informal Methods and Means of Information Protection in Enterprise Information Security