Leverage is a good and strong tool in business… Except when used against you! The enemy to this thought is…. The Business Owner’s… Ego, Ignorance and Apathy!
Why YOU Need to Understand This “STUFF” Unconsciousness and Complacency Consciousness and Awareness Peace of Mind and Security
Sometimes you must unlearn what you have already learned… What you have learned unconsciously could get you or your client in trouble… Statistics prove this to be true!
What is…? A + B + C = D Desire + Opportunity + Action = Crime Desire + Opportunity + Action = Prevention
40 th Canadian Parliament Bill S-4: An Act to Amend the Criminal Code of Canada (Identity Theft and Related Misconduct) Received Royal Assent – Oct. 22 nd, 2009 Signed into law by the Governor in Council – January 8 th , 2010
But today is about your and your client’s BUSINESS! YOUR INFORMATION IS ON THE LINE … PROTECT IT!
CRIMINAL – it’s about VIABILITY VICTIM – it’s about VULNERABILITY Victims can be Individuals, Families or Businesses Any one of these could be you, your employee or your customer!
Jennifer Stoddard Canada’s Privacy Commissioner says… “ This year will see more threats to the privacy of Canadians unless business organizations do more to protect personal information .”
There is a Distinctive Need…
Re: how you treat private data
to create a policy
to use the policy
to train staff on this policy
to post the policy
to enforce the policy
N-7 It is not fair to blame untrained or uninformed staff!
FOUR CULTURES OF IDENTITY THEFT IN BUSINESS 1. BUSINESS is the victim – How is the owner affected? 2. OWNER is the victim – How is the business affected? 3. EMPLOYEE is the victim – How is the owner or business affected? 4. CUSTOMER is the victim – How is the owner or business affected? Especially if [YOUR] business is made . to look responsible.
The “HOW” depends on the perpetrator’s level Mail Theft Dumpster Diving Hacking or Stealing Computers Stealing or Creating Cheques Creating or Washing Cheques Stealing Purses Bribing Staff Getting Hired Phoning Customers Collecting Customer’s Payments Mortgage or Real Estate Fraud Modifying Pin Pads / Russian Worming Tampering ATMs Phoning Staff (Vishing) Caller ID Spoofing Pretending to be a rep of yours Stealing or Creating new Credit Cards Stealing, Modifying or Creating New Driver’s Licences, Birth certificates, Passports or Social Insurance Numbers Ghosting or Tombstoning Impersonation Being Creative Often involves weapons and drugs Each has his/her signature style or technique
Thief surveys a business and knows when to strike
Pretends to be a courier
Pays a staff member
Becomes a staff member
4 Tricks of the Trade
ABC COMPANY 12345 South Street, Any Town, BC, V1A 0B0 TYPICAL BUSINESS CARD John Smith Bus. Phone: 604 123 4567 Cell. Phone: 604 234 5678 Res. Phone: 604 345 6789 Res. Phone: 604 345 6789
If you were a customer in your business , knowing how your customer information is kept, would you feel safe, secure and satisfied?
Where do you store sensitive and confidential files, like customer receipts and annual tax records?
old dated files in an open store room or washroom that is available to anyone? Are you like many business owners that store …
How do you dispose of paper, such as quotations, contracts, statements, billings and other sensitive documentation?
“ Dumpster Diver” DESTROY DOCUMENTS BEFORE THEY GO INTO THE DUMPSTER
What information is exposed and who has access to it?
What information is exposed and who has access to it?
A thief will study you, so they can be you! Or learn staff timing and procedures!
“ SHOULDER SURFING ”
1 3 2
What do you carry open in your vehicle ? ◊ laptop ◊ folders ◊ loose mail ◊ stack of statements
LapTop Computer theft has become one of the biggest threats to our data’s safety and our security. Common sense can prevent it... Everytime!
DRIVE-BY ID THEFT HOW SECURE ARE YOUR WI-FI CONNECTIONS? Here is an open connection
Lockers for staff instead of throwing purses under the counter
CREDIT CARDS, ATM DEBIT CARDS & PIN #s
ARE YOUR CLIENT’S ELECTRONIC RECEIPTS TRUNCATED ??? Acct: 1324 4566 9876 1265 Exp: 0805 Name: John Smith Acct: 1324 4566 9876 1265 Exp: 0809 Name: John Smith
How experienced are your client’s staff?
Watch for distraction techniques. Know this and teach it to your staff…
Be familiar with the weight of a reader terminal – watch for changes in weight.
Inspect for inserted objects
Have distinguishing marks or logos
Distractions happen at the counter
To get staff to go to the back storeroom
Confessions of an Identity Thief written with Ryan Michaels Convicted on 30 counts of Commercial identity theft… Arrested 7 times… What could someone like Ryan do to your business?
What’s in YOUR mail? Who Collects YOUR mail? Where is YOUR mail? Who has access to YOUR mail? How is YOUR mail sent out?
HOW SAFE IS YOUR INCOMING OR OUTGOING MAIL? ???
Commercial Crime and Major Fraud
Areas not usually considered
Lack of Policy
Ask yourself… “ What can an identity thief do to a business?”
Business Vulnerability Risk Assessment BUSINESS SERVICES TO SAFEGUARD AGAINST IDENTITY ABUSE Canadian Identity Resources Inc. YOUR INFORMATION IS ON THE LINE … PROTECT IT!
HAVE TWO CREDIT/DEBIT CARDS 1. Holding Account 2. Maintenance Account
KEEP YOUR CUSTOMER’S DEBIT CARD IN THEIR SIGHT WE TREAT TRUST TOO CASUALLY
A Skimmer can be small enough to fit into a fraudster’s pocket
THE FACTS Re: DEBIT CARDS
Canada is a world leader in debit card usage.
In 2008 within Canada
110 million payment cards in circulation
130 million cards expected
720,000 merchant acceptance locations.
In 2007, nearly 160,000 cardholders
about 1 in 200 Canadians, were victims of debit card fraud
Reimbursements of almost $107 million (double that of 3 years earlier.)
THE FACTS Re: DEBIT CARDS 5 seconds is all it takes for fraudsters to install equipment that would rig an ABM to capture debit card information from unsuspecting users. No specific type of store or location that is more prone to debit card fraud. However, the fraudsters are looking to skim as many cards as possible in the shortest period of time. Any location that records a high volume of debit card transactions could be at risk.
WHO… is watching you?
WHAT DO YOU KEEP… … IN YOUR DAY PLANNER?
iPODs Discs Camera phones Memory sticks Flash drives Other personal devices BECOMING BANNED FROM WORK… Personal…
Before targeting consumers, often identity thieves impersonate a trusted business -- like Your client’s.
They look for high-transaction volume, open communications, or
"It is a major threat."
What if you just found out…?
My Two Books!
Before you leave today be sure to request that we send this informative newsletter to your email address. Keeping you in touch with the latest scams and news you need to know about THIS MONTH’S FEATURES Next Events Following up What’s New? What You Should Know Tip of the Month Business Thought Story of the Month … and more “ It’s about you being the ONLY YOU there is!” MONTHLY e-NEWSLETTER...
Identity Theft is an Abuse! Don’t let it happen to you or your client I intend to show you that Identity Theft is an Abuse and that it covers much more than you previously thought Or your business and anyone connected to it!
Law vs. Moral? Customer responsibility vs. store responsibility? Ryan’s Cab Cigarette purchase Customer asking about someone else? Poorly placed surveillance cameras
These 2 books – now available to purchase! $ 22 ea. $ 18 ea. $ 35 Combination
What is your filing system?
IDENTITY THEFT: THE BOARD GAME In a 2 Player Game YOU THIEF The thief is the only one playing to win