Ethics Tracking
Text: Irina Golova
At the seminar "Competitive intelligence and ensuring the economic security of business. Methods for protecting confidential information from insiders and fraud," organized by the Academy of Information Systems, experts talked about what business tasks can be solved today by collecting information about other companies.
Andrei Masalovich, head of the competitive intelligence department of the Academy, says that today the relevance of competitive intelligence is greater than ever. "Today it’s easier to find incriminating evidence and ruin the reputation of a competitor at the auction than to really prove that your product is better," he says. The reputation war allows companies to achieve a leading position in the absence of competitive advantages. Moreover, compromising information is not always contained in closed sources, timely access to certain databases can tell a lot about the state of a competitor or counterparty. Moreover, companies are more and more involved in the process of tracking the "neighbor", the state itself calls on them to do this. “More than 50% of the brain of a security specialist is satisfied with the needs of the regulator,” says Andrei Masalovich. Indeed, in recent years the burden on companies has increased, now they must exercise due diligence when concluding contracts, see if they cooperate with one-day companies, companies with a mass registration address, a mass director or founder. To avoid additional charges from the tax authorities, companies carry out impressive work on the analysis of counterparties. And at the same time they can analyze the competitor, having discovered the unpleasant milestones of his biography.
If earlier work on the study of companies was carried out manually, now monitoring systems are more often used for it, which process information from the databases of various government bodies and independently calculate the risk index, the higher it is, the more dangerous it is to work with the organization. The analysis is based on the reports that the company submits to government agencies. If reporting is not provided by the company, then the assessment is based on the fulfillment of obligations to various organizations. For example, it is checked whether the company pays for the light on time, the office, settles with suppliers.
Electronic systems also provide information on bankruptcy and company reorganization. Artyom Pinchuk, director of business development at Interfax, said that the USRLE often late in posting company bankruptcy data, which prevents lenders from submitting claims. After all, they have only 30 days to do it. Monitoring systems allow you to monitor all the contractors of the company and promptly inform you about the beginning of bankruptcy or reorganization procedures.
Of course, a company can use not only a “systemic” approach, but also independently search for data on competitors and contractors. At the same time, find very interesting information. For example, on the Internet you can find dossiers on any public person with information about apartments, houses, garages, accounts and promotions that he owns. To do this, you need to learn how to correctly enter queries into the search engine. “To find what you’re looking for, you need to know exactly where it is and clearly formulate the request,” Masalovich says. To find the data, the address of the site on which you are looking for information is entered into the search engine. Masalovich gives advice: if you know that the data you are looking for is stored in tables, you should specify in the search bar that the xls file is being searched. That is, with this method, you need to know in advance where the information is stored and in what format. But this allows you to find unprotected files that cannot be detected simply by looking at the main page of the site and its sections, these are files in the internal structure of the portal, which for some reason was not denied access.
Sometimes, in order to get to where you can go only with a password, you do not need to be a hacker. Masalovich talks about the site of one state structure, which was developed with four levels of protection. But the site developer did not care about the security of correspondence with the customer, as a result, the discussion of the project, as well as logins and passwords for entering the site were freely available. Now access to the document in the Network is closed, and the information has not been disseminated, so the site was not affected by the negligence of the contractor. However, all new site developers make exactly the same mistakes. Therefore, those who want to receive information do not hack into the site, but find the correspondence of the customer with the contractor and gain access to the information. Hackers also help to get to the site without hacking, they penetrate websites and steal passwords that experienced people never store on their computer. Having picked up the appropriate link, you can find such an Internet cache and go to the hacked site.
In some cases, the information sought is not even hidden from the public. A case in point is a plant in the Urals, whose management turned to the help of specialists. Things were going well at the enterprise, but the opposition structure was staging protests all the time: strikes and hunger strikes, blocking roads. Information agencies of the city provided the plant with information, but already about the events that had happened. Experts quickly established a forum where oppositionists planned their actions. So the plant was able to learn about sabotage in advance and minimize its reputation and financial losses.
[DLMURL] https://www.rg.ru/2013/08/27/slezka.html [/ DLMURL]