• Save
June 2010 - George Greenwood
Upcoming SlideShare
Loading in...5
×
 

June 2010 - George Greenwood

on

  • 688 views

Identity Theft

Identity Theft

Statistics

Views

Total Views
688
Views on SlideShare
680
Embed Views
8

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 8

http://www.fvcaa.ca 8

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • KIPLINGERS in February 2004 had a major article about Identity Theft
  • George speaking

June 2010 - George Greenwood June 2010 - George Greenwood Presentation Transcript

  • IDENTITY PROTECTION in BUSINESS © George Greenwood © copyright held by George Greenwood – 2007 - 2010 Division of CANADIAN IDENTITY RESOURCES INC. YOUR INFORMATION IS ON THE LINE … PROTECT IT!
  • Leverage is a good and strong tool in business… Except when used against you! The enemy to this thought is…. The Business Owner’s… Ego, Ignorance and Apathy!
  • Why YOU Need to Understand This “STUFF” Unconsciousness and Complacency Consciousness and Awareness Peace of Mind and Security
  • Sometimes you must unlearn what you have already learned… What you have learned unconsciously could get you or your client in trouble… Statistics prove this to be true!
  • What is…? A + B + C = D Desire + Opportunity + Action = Crime Desire + Opportunity + Action = Prevention
  • 40 th Canadian Parliament Bill S-4: An Act to Amend the Criminal Code of Canada (Identity Theft and Related Misconduct) Received Royal Assent – Oct. 22 nd, 2009 Signed into law by the Governor in Council – January 8 th , 2010
  • But today is about your and your client’s BUSINESS! YOUR INFORMATION IS ON THE LINE … PROTECT IT!
  • CRIMINAL – it’s about VIABILITY VICTIM – it’s about VULNERABILITY Victims can be Individuals, Families or Businesses Any one of these could be you, your employee or your customer!
  • Jennifer Stoddard Canada’s Privacy Commissioner says… “ This year will see more threats to the privacy of Canadians unless business organizations do more to protect personal information .”
  •  
    • There is a Distinctive Need…
    • Re: how you treat private data
      • to create a policy
      • to use the policy
      • to train staff on this policy
      • to post the policy
      • to enforce the policy
    N-7 It is not fair to blame untrained or uninformed staff!
  • FOUR CULTURES OF IDENTITY THEFT IN BUSINESS 1. BUSINESS is the victim – How is the owner affected? 2. OWNER is the victim – How is the business affected? 3. EMPLOYEE is the victim – How is the owner or business affected? 4. CUSTOMER is the victim – How is the owner or business affected? Especially if [YOUR] business is made . to look responsible.
  • The “HOW” depends on the perpetrator’s level Mail Theft Dumpster Diving Hacking or Stealing Computers Stealing or Creating Cheques Creating or Washing Cheques Stealing Purses Bribing Staff Getting Hired Phoning Customers Collecting Customer’s Payments Mortgage or Real Estate Fraud Modifying Pin Pads / Russian Worming Tampering ATMs Phoning Staff (Vishing) Caller ID Spoofing Pretending to be a rep of yours Stealing or Creating new Credit Cards Stealing, Modifying or Creating New Driver’s Licences, Birth certificates, Passports or Social Insurance Numbers Ghosting or Tombstoning Impersonation Being Creative Often involves weapons and drugs Each has his/her signature style or technique
    • Thief surveys a business and knows when to strike
    • Pretends to be a courier
    • Pays a staff member
    • Becomes a staff member
    4 Tricks of the Trade
  • ABC COMPANY 12345 South Street, Any Town, BC, V1A 0B0 TYPICAL BUSINESS CARD John Smith Bus. Phone: 604 123 4567 Cell. Phone: 604 234 5678 Res. Phone: 604 345 6789 Res. Phone: 604 345 6789
  • If you were a customer in your business , knowing how your customer information is kept, would you feel safe, secure and satisfied?
  • Where do you store sensitive and confidential files, like customer receipts and annual tax records?
  • old dated files in an open store room or washroom that is available to anyone? Are you like many business owners that store …
  •  
  • How do you dispose of paper, such as quotations, contracts, statements, billings and other sensitive documentation?
  • “ Dumpster Diver” DESTROY DOCUMENTS BEFORE THEY GO INTO THE DUMPSTER
  •  
  • What information is exposed and who has access to it?
  • What information is exposed and who has access to it?
  •  
  • A thief will study you, so they can be you! Or learn staff timing and procedures!
    • “ SHOULDER SURFING ”
  •  
  • 1 3 2
  •  
  •  
  •  
  •  
      • What do you carry open in your vehicle ? ◊ laptop ◊ folders ◊ loose mail ◊ stack of statements
  •  
  • LapTop Computer theft has become one of the biggest threats to our data’s safety and our security. Common sense can prevent it... Everytime!
  • DRIVE-BY ID THEFT HOW SECURE ARE YOUR WI-FI CONNECTIONS? Here is an open connection
  •  
  •  
  • Lockers for staff instead of throwing purses under the counter
  • CREDIT CARDS, ATM DEBIT CARDS & PIN #s
  • ARE YOUR CLIENT’S ELECTRONIC RECEIPTS TRUNCATED ??? Acct: 1324 4566 9876 1265 Exp: 0805 Name: John Smith Acct: 1324 4566 9876 1265 Exp: 0809 Name: John Smith
  •  
  • How experienced are your client’s staff?
  •  
  •  
    • Watch for distraction techniques. Know this and teach it to your staff…
    • Be familiar with the weight of a reader terminal – watch for changes in weight.
    • Inspect for inserted objects
    • Have distinguishing marks or logos
    • Distractions happen at the counter
    • To get staff to go to the back storeroom
  • Confessions of an Identity Thief written with Ryan Michaels Convicted on 30 counts of Commercial identity theft… Arrested 7 times… What could someone like Ryan do to your business?
  •  
  •  
  • What’s in YOUR mail? Who Collects YOUR mail? Where is YOUR mail? Who has access to YOUR mail? How is YOUR mail sent out?
  • HOW SAFE IS YOUR INCOMING OR OUTGOING MAIL? ???
  • TELEPHONE SCAMS
    • Commercial Crime and Major Fraud
    • Corporate Fraud
    • Credit Fraud
    • Marketing Fraud
    • Investment Fraud
    • Executive Fraud
    • Forensic Fraud
    • Areas not usually considered
    • Employee Risk
    • Lost Data
    • Employee Error
    • Lack of Policy
    Ask yourself… “ What can an identity thief do to a business?”
  • Business Vulnerability Risk Assessment BUSINESS SERVICES TO SAFEGUARD AGAINST IDENTITY ABUSE Canadian Identity Resources Inc. YOUR INFORMATION IS ON THE LINE … PROTECT IT!
  •  
  • HAVE TWO CREDIT/DEBIT CARDS 1. Holding Account 2. Maintenance Account
  • “ Skimming”
  • KEEP YOUR CUSTOMER’S DEBIT CARD IN THEIR SIGHT WE TREAT TRUST TOO CASUALLY
  • A Skimmer can be small enough to fit into a fraudster’s pocket
    • THE FACTS Re: DEBIT CARDS
    • Canada is a world leader in debit card usage.
    • In 2008 within Canada
    • 110 million payment cards in circulation
    • By 2013
    • 130 million cards expected
    • 720,000 merchant acceptance locations.
    • In 2007, nearly 160,000 cardholders
    • about 1 in 200 Canadians, were victims of debit card fraud
    • Reimbursements of almost $107 million (double that of 3 years earlier.)
  • THE FACTS Re: DEBIT CARDS 5 seconds is all it takes for fraudsters to install equipment that would rig an ABM to capture debit card information from unsuspecting users. No specific type of store or location that is more prone to debit card fraud. However, the fraudsters are looking to skim as many cards as possible in the shortest period of time. Any location that records a high volume of debit card transactions could be at risk.
  • WHO… is watching you?
  • WHAT DO YOU KEEP… … IN YOUR DAY PLANNER?
  • iPODs Discs Camera phones Memory sticks Flash drives Other personal devices BECOMING BANNED FROM WORK… Personal…
  •  
      • Before targeting consumers, often identity thieves impersonate a trusted business -- like Your client’s.
      • They look for high-transaction volume, open communications, or
      • business-to-consumer environments.
      • "It is a major threat."
  • What if you just found out…?
  • My Two Books!
  • Before you leave today be sure to request that we send this informative newsletter to your email address. Keeping you in touch with the latest scams and news you need to know about THIS MONTH’S FEATURES Next Events Following up What’s New? What You Should Know Tip of the Month Business Thought Story of the Month … and more “ It’s about you being the ONLY YOU there is!” MONTHLY e-NEWSLETTER...
  • Identity Theft is an Abuse! Don’t let it happen to you or your client I intend to show you that Identity Theft is an Abuse and that it covers much more than you previously thought Or your business and anyone connected to it!
  • Questions ???
  •  
  • Law vs. Moral? Customer responsibility vs. store responsibility? Ryan’s Cab Cigarette purchase Customer asking about someone else? Poorly placed surveillance cameras
  • These 2 books – now available to purchase! $ 22 ea. $ 18 ea. $ 35 Combination
  • What is your filing system?
  • IDENTITY THEFT: THE BOARD GAME In a 2 Player Game YOU THIEF The thief is the only one playing to win
  • THE BOARD GAME
  •  
  •