…I’ve found that it’s not wise
To leave my garden untended …
What to do when suckers are preyin’
On my well-guarded spreadsheets
Oh why, hell does it send up fleets
Of evil-doers through the big hole
To get to evil-doers who dig holes
Which leaves my lawn with lawn-chew …
‘Cause we’ve come down with a case of potholes …
De La Soul ♦ Potholes in my Lawn
You need to be mindful of the core assets. You have trade secrets, you have key personnel, you have formulas, market plans, customer lists and assorted protected assets. These are not static, immutable items without need of active protection. These are more akin to a garden that requires weeding, pruning, watering and maintenance.
A hundred years ago you put the items in a safe or vault and forget about them. A few years ago you could have a computer password to protect them. However the evil-doers are evolving with the technology and their techniques will leave your organization with lawn-chew and a perforated security system trying to figure out how you lost all the valuable assets that make up your intellectual property treasure trove.
Accordingly, periodically review you protection system. Consult and brainstorm about the maintenance and security measures you take. Revisit the efficacy of your protection.
- REVIEW SECURITY PERIODICALLY
- SECRECY REQUIRES VIGILANCE