You are on page 1of 4

GSGM7514 MC-026_Forum Discussion Individual Work_UNU2200342

Competitive Intelligence
and Asian Business
Strategy
(GSGM7514)

Prepared For:
Prof. Dr. Mohd Hassan Bin Mohd Osman

Forum Discussion:
Counterintelligence

Name Nurul Nadiah Binti Jufri


Student ID UNU2200342
Section MC-026
Handphone No. 013-341 6259
Submission Week 3
GSGM7514 MC-026_Forum Discussion Individual Work_UNU2200342

1. Understanding about Counterintelligence


The collaborative efforts designed to secure an organization's sensitive information
from competitors are known as business counterintelligence. In a business
environment, intelligence is information that aids decision-making and gives a
strategic edge to a company. Businesses have now taken steps to considerable
efforts to learn about their competition. To obtain corporate secrets, they can utilize
legal/ethical, unethical, or criminal information-gathering approaches or a mix of
them. There are a number of businesses that do not all follow an ethical code, and
several falsify or abuse the law in order to acquire data on their rivals. To be
competitive, businesses throughout the world are growing increasingly reliant on
good intelligence (analysed data) on their rivals, environment, suppliers, goods, and
even customers. The loss of private information is exacerbated by complacency,
negligence, and inadequate security standards. This is where counterintelligence in
businesses steps in, for the reason that when other companies know our confidential
information may ruin the company’s future competitive advantage. By implementing
counterintelligence as part of its business strategy, management will strengthen its
company's overall competitive position in the marketplace.
2. My organization protects internal information from other competitors by
protecting data in the storage cloud.
One of the regulations implemented by my organization is the usage of cloud storage
as it is extremely safe and secure. Another approach is to encrypt important data
before sending it to the cloud. In this day and age, there are many corporate cloud
storage providers’ security features such as Microsoft One Drive, Google G-Suite,
and Amazon Web Services. Cloud storage is located in a data center, giving the
highest level of protection instead of having hardware in the workplace.
3. Strategies/action plans to counterintelligence.
My organization’s action plan to protect internal information was to have parties sign
a Non-Disclosure Agreement, where the agreement agrees that sensitive
information, they may obtain will not be made available to any others. Client or sales
contact lists, non-public accounting numbers, or any distinctive thing that
distinguishes one organization from another are all examples of protected
information.
I worked in a Real Estate Investment Trusts company, our management often need
to discuss proprietary or sensitive information (Confidential Information) with outside
individuals. “Confidential Information” means any and all proprietary information
relating to the company, the unit trust funds under the management or the proposed
transaction under the portfolio of our company whether in written, oral, electronic or
any other for which the recipient of the agreement may have access to, whether
before or after the effective date including but not limited to information regarding
intellectual property rights, patent, copyrighted works, industrial design, processing
data, investment data, investor data, financial data, any and all information. Non-
disclosure agreements have always been a legal framework for maintaining
confidence and preventing critical information from getting out away from rivals.
On top of that, another action plan taken from my organization to counterintelligence
is to protect against malware.
GSGM7514 MC-026_Forum Discussion Individual Work_UNU2200342

Protect your data by safeguarding your PCs and networks against viruses. Malicious
software not only may cause huge data loss, but malware can also swarm on
vulnerable PCs have all the company data leaked without even realizing it. It is
critical that our organization defend against malware by installing anti-virus software
on every computer. So, we have a robust antivirus software package installed in
every computer that can handle identity theft, suspicious websites, and hackers all at
once.
GSGM7514 MC-026_Forum Discussion Individual Work_UNU2200342

REFERENCES
Bernhardt, D. (2003). Competitive Intelligence: How to acquire and use corporate
intelligence and counter-intelligence. In Pearson Education.

You might also like