Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
Smith investigated one case where a disgruntled former employee gained access to the corporate network through a security hole, erased the manufacturing database and made hidden changes in the system, which halted operations for two days.
In another instance, an unscrupulous individual wanted schematics and manufacturing/process information to establish a competing company. He hired an employee from the already existing company as a consultant, who, in turn, brought the needed information to the new company.
0 Comments
View Comments
Maggie Dewitt
Author's page
Related Content
Comments