Your SlideShare is downloading. ×
IDENTITY PROTECTION  in BUSINESS © George Greenwood © copyright held by George Greenwood – 2007 - 2010   Division of CANAD...
Leverage is a good and strong tool  in business…  Except when used against you! The enemy to this thought is…. The Busines...
Why YOU Need to Understand This “STUFF” Unconsciousness and Complacency Consciousness and Awareness Peace of Mind and Secu...
Sometimes you must  unlearn  what you have already learned… What you have learned unconsciously could get you or your clie...
What is…? A + B + C = D Desire + Opportunity + Action =  Crime Desire + Opportunity + Action =  Prevention
40 th  Canadian Parliament Bill S-4: An Act to Amend the  Criminal Code of Canada  (Identity Theft and Related Misconduct)...
But today is about your  and your client’s  BUSINESS! YOUR INFORMATION IS ON THE LINE …   PROTECT IT!
CRIMINAL – it’s about VIABILITY VICTIM – it’s about VULNERABILITY Victims can be Individuals,  Families or Businesses Any ...
Jennifer Stoddard  Canada’s Privacy  Commissioner says… “ This year will see more threats to the privacy of Canadians unle...
 
<ul><li>There is a Distinctive Need… </li></ul><ul><li>Re: how you treat private data </li></ul><ul><ul><li>to  create   a...
FOUR CULTURES OF  IDENTITY THEFT IN BUSINESS 1.  BUSINESS  is the victim –  How is the owner affected? 2.  OWNER  is the v...
The “HOW” depends on the perpetrator’s level Mail Theft Dumpster Diving Hacking or Stealing Computers Stealing or Creating...
<ul><li>Thief surveys a business and knows when to strike </li></ul><ul><li>Pretends to be a courier </li></ul><ul><li>Pay...
ABC COMPANY   12345 South Street,    Any Town, BC,  V1A 0B0 TYPICAL BUSINESS CARD John Smith   Bus. Phone: 604 123 4567 Ce...
If you were a customer in your business , knowing how your customer information is kept,  would you feel safe, secure and ...
Where do you store sensitive and confidential files, like customer receipts and annual tax records?
old dated files in an open  store room or washroom  that is available to anyone? Are you like many business owners that st...
 
How do you dispose of paper, such as quotations, contracts, statements, billings and other sensitive documentation?
“ Dumpster Diver” DESTROY DOCUMENTS BEFORE THEY GO INTO THE DUMPSTER
 
What information is exposed and who has access to it?
What information is exposed and who has access to it?
 
A thief will study you,  so they can be you! Or learn staff timing and procedures!
<ul><li>“ SHOULDER SURFING ” </li></ul>
 
1 3 2
 
 
 
 
<ul><ul><li>What do you carry  open  in your vehicle ?  ◊ laptop  ◊   folders  ◊   loose mail  ◊   stack of statements  </...
 
LapTop Computer theft has become one of the biggest threats to our data’s safety and our security. Common sense can preven...
DRIVE-BY ID THEFT HOW SECURE ARE YOUR WI-FI CONNECTIONS? Here is an  open  connection
 
 
Lockers for staff instead of throwing purses under the counter
CREDIT CARDS, ATM DEBIT CARDS & PIN #s
ARE YOUR CLIENT’S ELECTRONIC  RECEIPTS TRUNCATED  ??? Acct: 1324 4566 9876 1265  Exp: 0805 Name: John Smith Acct: 1324 456...
 
How experienced are your client’s staff?
 
 
<ul><li>Watch for distraction techniques. Know this and teach it to your staff… </li></ul><ul><li>Be familiar with the  we...
Confessions of an Identity Thief written with Ryan Michaels Convicted on 30 counts of Commercial identity theft…  Arrested...
 
 
What’s in YOUR mail? Who Collects YOUR mail? Where is YOUR mail? Who has access to YOUR mail? How is YOUR mail sent out?
HOW SAFE IS YOUR INCOMING  OR OUTGOING MAIL? ???
TELEPHONE  SCAMS
<ul><li>Commercial Crime and Major Fraud </li></ul><ul><li>Corporate Fraud </li></ul><ul><li>Credit Fraud </li></ul><ul><l...
Business  Vulnerability  Risk  Assessment BUSINESS SERVICES TO SAFEGUARD AGAINST IDENTITY ABUSE Canadian Identity Resource...
 
HAVE   TWO CREDIT/DEBIT CARDS 1. Holding Account 2. Maintenance Account
“ Skimming”
KEEP YOUR CUSTOMER’S DEBIT CARD IN THEIR SIGHT WE TREAT TRUST TOO CASUALLY
A Skimmer can be small enough to fit into a fraudster’s pocket
<ul><li>THE FACTS Re: DEBIT CARDS </li></ul><ul><li>Canada is a world leader in debit card usage.  </li></ul><ul><li>In 20...
THE FACTS Re: DEBIT CARDS 5 seconds is all it takes for fraudsters to install equipment that would rig an ABM to capture d...
WHO… is watching you?
WHAT DO YOU KEEP… … IN YOUR DAY PLANNER?
iPODs Discs Camera phones Memory sticks Flash drives Other personal devices BECOMING BANNED FROM WORK… Personal…
 
<ul><ul><li>Before targeting consumers, often identity thieves impersonate a trusted business -- like Your client’s.  </li...
What if you just found out…?
My Two Books!
Before you leave today  be sure to request that  we send this informative newsletter to your  email address. Keeping you i...
Identity Theft is an Abuse!   Don’t let it happen to you or your client I intend to show you that  Identity Theft is an Ab...
Questions   ???
 
Law vs. Moral? Customer responsibility vs. store responsibility? Ryan’s Cab Cigarette purchase Customer asking about someo...
These 2 books – now available to purchase! $ 22  ea. $ 18  ea. $ 35  Combination
What is your filing system?
IDENTITY THEFT: THE BOARD GAME In a 2 Player Game YOU THIEF The thief is the only one playing to win
THE BOARD GAME
 
 
Upcoming SlideShare
Loading in...5
×

June 2010 - George Greenwood

545

Published on

Identity Theft

Published in: Business, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
545
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • KIPLINGERS in February 2004 had a major article about Identity Theft
  • George speaking
  • Transcript of "June 2010 - George Greenwood"

    1. 1. IDENTITY PROTECTION in BUSINESS © George Greenwood © copyright held by George Greenwood – 2007 - 2010 Division of CANADIAN IDENTITY RESOURCES INC. YOUR INFORMATION IS ON THE LINE … PROTECT IT!
    2. 2. Leverage is a good and strong tool in business… Except when used against you! The enemy to this thought is…. The Business Owner’s… Ego, Ignorance and Apathy!
    3. 3. Why YOU Need to Understand This “STUFF” Unconsciousness and Complacency Consciousness and Awareness Peace of Mind and Security
    4. 4. Sometimes you must unlearn what you have already learned… What you have learned unconsciously could get you or your client in trouble… Statistics prove this to be true!
    5. 5. What is…? A + B + C = D Desire + Opportunity + Action = Crime Desire + Opportunity + Action = Prevention
    6. 6. 40 th Canadian Parliament Bill S-4: An Act to Amend the Criminal Code of Canada (Identity Theft and Related Misconduct) Received Royal Assent – Oct. 22 nd, 2009 Signed into law by the Governor in Council – January 8 th , 2010
    7. 7. But today is about your and your client’s BUSINESS! YOUR INFORMATION IS ON THE LINE … PROTECT IT!
    8. 8. CRIMINAL – it’s about VIABILITY VICTIM – it’s about VULNERABILITY Victims can be Individuals, Families or Businesses Any one of these could be you, your employee or your customer!
    9. 9. Jennifer Stoddard Canada’s Privacy Commissioner says… “ This year will see more threats to the privacy of Canadians unless business organizations do more to protect personal information .”
    10. 11. <ul><li>There is a Distinctive Need… </li></ul><ul><li>Re: how you treat private data </li></ul><ul><ul><li>to create a policy </li></ul></ul><ul><ul><li>to use the policy </li></ul></ul><ul><ul><li>to train staff on this policy </li></ul></ul><ul><ul><li>to post the policy </li></ul></ul><ul><ul><li>to enforce the policy </li></ul></ul>N-7 It is not fair to blame untrained or uninformed staff!
    11. 12. FOUR CULTURES OF IDENTITY THEFT IN BUSINESS 1. BUSINESS is the victim – How is the owner affected? 2. OWNER is the victim – How is the business affected? 3. EMPLOYEE is the victim – How is the owner or business affected? 4. CUSTOMER is the victim – How is the owner or business affected? Especially if [YOUR] business is made . to look responsible.
    12. 13. The “HOW” depends on the perpetrator’s level Mail Theft Dumpster Diving Hacking or Stealing Computers Stealing or Creating Cheques Creating or Washing Cheques Stealing Purses Bribing Staff Getting Hired Phoning Customers Collecting Customer’s Payments Mortgage or Real Estate Fraud Modifying Pin Pads / Russian Worming Tampering ATMs Phoning Staff (Vishing) Caller ID Spoofing Pretending to be a rep of yours Stealing or Creating new Credit Cards Stealing, Modifying or Creating New Driver’s Licences, Birth certificates, Passports or Social Insurance Numbers Ghosting or Tombstoning Impersonation Being Creative Often involves weapons and drugs Each has his/her signature style or technique
    13. 14. <ul><li>Thief surveys a business and knows when to strike </li></ul><ul><li>Pretends to be a courier </li></ul><ul><li>Pays a staff member </li></ul><ul><li>Becomes a staff member </li></ul>4 Tricks of the Trade
    14. 15. ABC COMPANY 12345 South Street, Any Town, BC, V1A 0B0 TYPICAL BUSINESS CARD John Smith Bus. Phone: 604 123 4567 Cell. Phone: 604 234 5678 Res. Phone: 604 345 6789 Res. Phone: 604 345 6789
    15. 16. If you were a customer in your business , knowing how your customer information is kept, would you feel safe, secure and satisfied?
    16. 17. Where do you store sensitive and confidential files, like customer receipts and annual tax records?
    17. 18. old dated files in an open store room or washroom that is available to anyone? Are you like many business owners that store …
    18. 20. How do you dispose of paper, such as quotations, contracts, statements, billings and other sensitive documentation?
    19. 21. “ Dumpster Diver” DESTROY DOCUMENTS BEFORE THEY GO INTO THE DUMPSTER
    20. 23. What information is exposed and who has access to it?
    21. 24. What information is exposed and who has access to it?
    22. 26. A thief will study you, so they can be you! Or learn staff timing and procedures!
    23. 27. <ul><li>“ SHOULDER SURFING ” </li></ul>
    24. 29. 1 3 2
    25. 34. <ul><ul><li>What do you carry open in your vehicle ? ◊ laptop ◊ folders ◊ loose mail ◊ stack of statements </li></ul></ul>
    26. 36. LapTop Computer theft has become one of the biggest threats to our data’s safety and our security. Common sense can prevent it... Everytime!
    27. 37. DRIVE-BY ID THEFT HOW SECURE ARE YOUR WI-FI CONNECTIONS? Here is an open connection
    28. 40. Lockers for staff instead of throwing purses under the counter
    29. 41. CREDIT CARDS, ATM DEBIT CARDS & PIN #s
    30. 42. ARE YOUR CLIENT’S ELECTRONIC RECEIPTS TRUNCATED ??? Acct: 1324 4566 9876 1265 Exp: 0805 Name: John Smith Acct: 1324 4566 9876 1265 Exp: 0809 Name: John Smith
    31. 44. How experienced are your client’s staff?
    32. 47. <ul><li>Watch for distraction techniques. Know this and teach it to your staff… </li></ul><ul><li>Be familiar with the weight of a reader terminal – watch for changes in weight. </li></ul><ul><li>Inspect for inserted objects </li></ul><ul><li>Have distinguishing marks or logos </li></ul><ul><li>Distractions happen at the counter </li></ul><ul><li>To get staff to go to the back storeroom </li></ul>
    33. 48. Confessions of an Identity Thief written with Ryan Michaels Convicted on 30 counts of Commercial identity theft… Arrested 7 times… What could someone like Ryan do to your business?
    34. 51. What’s in YOUR mail? Who Collects YOUR mail? Where is YOUR mail? Who has access to YOUR mail? How is YOUR mail sent out?
    35. 52. HOW SAFE IS YOUR INCOMING OR OUTGOING MAIL? ???
    36. 53. TELEPHONE SCAMS
    37. 54. <ul><li>Commercial Crime and Major Fraud </li></ul><ul><li>Corporate Fraud </li></ul><ul><li>Credit Fraud </li></ul><ul><li>Marketing Fraud </li></ul><ul><li>Investment Fraud </li></ul><ul><li>Executive Fraud </li></ul><ul><li>Forensic Fraud </li></ul><ul><li>Areas not usually considered </li></ul><ul><li>Employee Risk </li></ul><ul><li>Lost Data </li></ul><ul><li>Employee Error </li></ul><ul><li>Lack of Policy </li></ul>Ask yourself… “ What can an identity thief do to a business?”
    38. 55. Business Vulnerability Risk Assessment BUSINESS SERVICES TO SAFEGUARD AGAINST IDENTITY ABUSE Canadian Identity Resources Inc. YOUR INFORMATION IS ON THE LINE … PROTECT IT!
    39. 57. HAVE TWO CREDIT/DEBIT CARDS 1. Holding Account 2. Maintenance Account
    40. 58. “ Skimming”
    41. 59. KEEP YOUR CUSTOMER’S DEBIT CARD IN THEIR SIGHT WE TREAT TRUST TOO CASUALLY
    42. 60. A Skimmer can be small enough to fit into a fraudster’s pocket
    43. 61. <ul><li>THE FACTS Re: DEBIT CARDS </li></ul><ul><li>Canada is a world leader in debit card usage. </li></ul><ul><li>In 2008 within Canada </li></ul><ul><li>110 million payment cards in circulation </li></ul><ul><li>By 2013 </li></ul><ul><li>130 million cards expected </li></ul><ul><li>720,000 merchant acceptance locations. </li></ul><ul><li>In 2007, nearly 160,000 cardholders </li></ul><ul><li>about 1 in 200 Canadians, were victims of debit card fraud </li></ul><ul><li>Reimbursements of almost $107 million (double that of 3 years earlier.) </li></ul>
    44. 62. THE FACTS Re: DEBIT CARDS 5 seconds is all it takes for fraudsters to install equipment that would rig an ABM to capture debit card information from unsuspecting users. No specific type of store or location that is more prone to debit card fraud. However, the fraudsters are looking to skim as many cards as possible in the shortest period of time. Any location that records a high volume of debit card transactions could be at risk.
    45. 63. WHO… is watching you?
    46. 64. WHAT DO YOU KEEP… … IN YOUR DAY PLANNER?
    47. 65. iPODs Discs Camera phones Memory sticks Flash drives Other personal devices BECOMING BANNED FROM WORK… Personal…
    48. 67. <ul><ul><li>Before targeting consumers, often identity thieves impersonate a trusted business -- like Your client’s. </li></ul></ul><ul><ul><li>They look for high-transaction volume, open communications, or </li></ul></ul><ul><ul><li>business-to-consumer environments. </li></ul></ul><ul><ul><li>&quot;It is a major threat.&quot; </li></ul></ul>
    49. 68. What if you just found out…?
    50. 69. My Two Books!
    51. 70. Before you leave today be sure to request that we send this informative newsletter to your email address. Keeping you in touch with the latest scams and news you need to know about THIS MONTH’S FEATURES Next Events Following up What’s New? What You Should Know Tip of the Month Business Thought Story of the Month … and more “ It’s about you being the ONLY YOU there is!” MONTHLY e-NEWSLETTER...
    52. 71. Identity Theft is an Abuse! Don’t let it happen to you or your client I intend to show you that Identity Theft is an Abuse and that it covers much more than you previously thought Or your business and anyone connected to it!
    53. 72. Questions ???
    54. 74. Law vs. Moral? Customer responsibility vs. store responsibility? Ryan’s Cab Cigarette purchase Customer asking about someone else? Poorly placed surveillance cameras
    55. 75. These 2 books – now available to purchase! $ 22 ea. $ 18 ea. $ 35 Combination
    56. 76. What is your filing system?
    57. 77. IDENTITY THEFT: THE BOARD GAME In a 2 Player Game YOU THIEF The thief is the only one playing to win
    58. 78. THE BOARD GAME

    ×