As another simple access method, we must mention that the massive flow of electronic information increases the visibility and transferability of information through the Internet media. Therefore, the existence of computer and network resources not only accelerates the high-speed operation of information, but also greatly increases the amount of public information. According to the investigation, the information obtained by ethical competitive intelligence organizations from a large number of open information sources is obtained through about 6 150 effective databases, that is, legally obtained from media messages, enterprise texts, import and export records, patent information and financial reports. In addition, from a technical point of view, we should strictly pay attention to and prevent "hackers" from using the network to destroy its operation and steal information through computer systems. In view of this, the average annual growth rate of investment in science and technology security services in the United States is 25.8%, that is, from $3.7 billion in 1997 to $7.3 billion by the end of 2000.
It can be seen that strict monitoring and management of open information sources plays a vital role in effectively protecting competitive intelligence. Non-public information sources include all kinds of personnel and activities related to enterprises, as well as "turning waste into treasure" activities of "garbage".
The employees of our company
Few people doubt that employees are the most valuable resource of an enterprise. But if employees lack safety awareness, they will inadvertently become accomplices of competitors' competitive intelligence organizations. Ira Winkler, a former member of the National Security Council and honorary consultant of competitive intelligence, has confirmed that salespeople usually provide all sensitive information without "reservation" in order to increase sales performance. Over time, there will be "scammers" from competitors collecting information and data here, pretending to be customers and obtaining information. In addition, disgruntled employees and job-hopping employees in this enterprise center may become the "export" of information leakage.
Third-party force
Another real and often overlooked fact is that the crisis of information integration within enterprises comes from the seemingly friendly "third party" forces. Banks and securities companies, consulting companies, industry associations, suppliers and distributors, advertising companies, partners, strategic alliances, joint ventures, temporary employees, contractors and suppliers may all threaten key factors in information. They often publish the relevant data and information of enterprises by giving speeches or publishing documents, thus becoming an important source for competitors to obtain enterprise information.
Business meeting
Another method of information loss favored by many competitive intelligence collectors is commercial exhibitions, trade fairs and various forms of meetings, including live media interviews and other activities. First of all, the meeting place of these activities is considered as an acceptable and legal place close to competitors. Secondly, many normal and abnormal activities at the conference take on too many gathering opportunities, from making technical papers in front of a large audience to private receptions. In recent years, inspired by the football team, an organization called "quarterback" is forming in the field of competitive intelligence. They only aim at a series of industry conferences and get very valuable information from them through strict organization and effective coordination. Therefore, we should pay special attention to business meetings, an important channel for information outflow. Compaq microcomputer company was caught in the crime of stealing competitive intelligence in an exhibition, and was later disqualified from the conference next year. Afterwards, the person in charge of Compaq said with infinite emotion: "The exhibition will bring much more information to competitors than to customers." It can be seen that business activities such as meetings often become an important channel for sensitive information to flow out.
Wheeled trash can
A legal and optional means for spies to obtain information is to find out what their "treasure" is by screening the garbage of rival companies. In the end, garbage often becomes a public industry and is legally occupied and absorbed by competitors' competitive intelligence organizations. These rubbish may specifically include telephone numbers, expired invoices and waybills, which will bring information and tips to competitive intelligence collectors. Specially trained competitive intelligence practitioners can even build a complete competitor's supply chain system from these discarded wastes. It can be seen that our garbage often becomes the "baby" of our opponents.
Reverse engineering
Among many means of information disclosure and analysis, we have to notice that reverse engineering often becomes an important channel for competitors to obtain information. Reverse engineering refers to a product production method based on modern design theory and method, which explores, digests and absorbs other people's advanced technologies and design concepts through reverse analysis and reverse design. Mainly through the anatomical analysis of imported technology and equipment, we can master their functional principles, structural parameters, materials, shapes and dimensions, especially key technologies, and carry out product redesign. Therefore, reverse engineering is a shortcut for competitors to obtain information such as product technology.
In addition to the above-mentioned ways that lead to information leakage, there are many details that run through the business activities of enterprises at all times. A little carelessness will lead to the loss of important information and bring a fatal blow to the whole enterprise. Identification of types of competitive intelligence protection
We have fully realized the various channels of information leakage, so plugging loopholes and protecting information will become the top priority for enterprises. We should give different understanding and protection to information and intelligence with different confidentiality levels. Therefore, it is very important to identify competitive intelligence that needs to be protected in time and effectively.
In the classification of enterprise competitive intelligence, some parts can be made public and some parts need encryption protection. This mainly includes technical secret information, business secret information, transaction secret information, management secret information, financial secret information, organization planning secret information, personnel management secret information and legal documents. The above secret information should be included in the scope of protection and properly and reasonably handled and protected. The development of enterprises is closely related to the acquisition and protection of enterprise information, and the secret information of enterprises has a far-reaching and huge impact on enterprise security.
Methods of protecting competitive intelligence
Generally speaking, it is impossible for enterprises to take complete safety precautions in all aspects of business activities, so they often ignore the overall protection work. To sum up, in order to achieve a good degree of competitive intelligence protection, we can usually start from five aspects: physical protection, daily management protection, technical protection, legal protection and the use of false information.