The document summarizes the key findings of a BBB report on scams. It identifies the top 5 riskiest scams according to a new "Risk Index" methodology that considers exposure, susceptibility, and monetary loss. Home improvement scams and fake check scams pose the greatest risk. The report also provides scam statistics by age group and gender. Men are more susceptible than women, and 18-24 year olds are most likely to lose money. However, seniors tend to lose more money on average. The report advises consumers on various digital spring cleaning and identity protection tips.
Part of the Rosetta series of communications studies, this article uses real-world case studies of fraud to look at how organizations have managed issues and crises.The article provides tools to help organizations more effectively manage these sorts of situations.
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
Business email compromise (BEC) has overtaken ransomware and data breach by hackers as the main driver of AIG EMEA cyber claims, according to the latest cyber claims statistics.
Nearly a quarter of reported incidents in 2018 were due to business email compromise (BEC), up significantly from 11% in 2017. Ransomware, data breach by hackers and data breach due to employee negligence were the other main breach types in 2018.
Social login adoption is growing at a rapid clip as businesses come to understand social login as more than a means faster registration, and as a key for gaining access to rich, permission-based identity data that drives more relevant user experiences.
This comprehensive eBook covers everything you need to know to develop a successful social login strategy that supports your business needs.
Part of the Rosetta series of communications studies, this article uses real-world case studies of fraud to look at how organizations have managed issues and crises.The article provides tools to help organizations more effectively manage these sorts of situations.
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
Business email compromise (BEC) has overtaken ransomware and data breach by hackers as the main driver of AIG EMEA cyber claims, according to the latest cyber claims statistics.
Nearly a quarter of reported incidents in 2018 were due to business email compromise (BEC), up significantly from 11% in 2017. Ransomware, data breach by hackers and data breach due to employee negligence were the other main breach types in 2018.
Social login adoption is growing at a rapid clip as businesses come to understand social login as more than a means faster registration, and as a key for gaining access to rich, permission-based identity data that drives more relevant user experiences.
This comprehensive eBook covers everything you need to know to develop a successful social login strategy that supports your business needs.
Cyber Defense for SMBs offers guidance to help small and medium-sized businesses identify the most cost-effective best practices to help improve their business’s cybersecurity posture. Published by the Florida Center For Cybersecurity and written by cybersecurity experts from academia, private industry, government and the military.
Over the last several years, financial institutions have spent billions of dollars and resources securing a perimeter defense system consisting of intrusion detection, intrusion prevention, firewalls, user authentication, and other layers of security all built to secure their financial systems. Due to the exponential increase in internal and external information security incidents, these investments are necessary to protect an institution’s reputation and revenue. In addition, the federal government is using regulatory means to ensure the banks
take responsibility for potential losses.
Of equal or even greater threat, however, are the social aspects of the Internet that cannot
be controlled. For example, financial institutions need to be aware of the reputational risk that is inherent on the Internet. Each institution needs to do more than reactively protect its data; it must also proactively safeguard its reputation online, where references to its corporate name alone can number in the millions. An institution must also guard against infringements against its logo, its trademarks or other graphic representations. This risk, outside the firewall, is the other side of the coin.
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
This presentation was delivered by Shawn E. Tuma, Cybersecurity and Data Privacy Attorney, at the January 27, 2017 meeting of (ISC)² Dallas Fort Worth Chapter.
This presentation was significantly updated from past presentations and included a discussion of the groundbreaking New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies.
The main points of this presentation are:
(1) Cybersecurity events create a crisis situation and should be treated as such;
(2) Cybersecurity incidents are as much legal events as they are IT or Business / Public Relations events;
(3) Companies must have a cybersecurity breach response plan in place and tested, in advance;
(4) While consumer class action data breach litigation is a significant threat to companies and their leadership, it is not as great of a threat as regulatory enforcement by agencies such as the FTC and SEC, or the shareholder derivative claims for officer and director liability; and
(5) The odds are that all company will be breached, but preparation and diligence can help minimize the likelihood that such a breach from being a catastrophic event.
This presentation addresses the role of attorneys as the first responders in leading their clients through cybersecurity and data loss crisis events. The discussion begins by looking at the risk business have of being the victim of a cybersecurity or data loss incident and examining the nature of such incidents and the crisis environment they create. Then, because of this crisis environment, the need for leadership in helping keep the parties calm, rational, and making deliberate, calculated decisions.
The discussion then explains why cybersecurity events are legal events and legal counsel is the natural leader that should fulfill this role and how they can do so. It will then discuss the process legal counsel will take, including assembling the key players in such an event, both internally and externally. It discusses the obligations for responding to such an event, the steps that must be taken, those that must be considered, and certain factors that go into the decision-making process. It briefly addresses the costs of such an incident and the liability issues that can arise from such an incident and failing to properly respond to the incident. This section includes a discussion of the cybersecurity lawsuit landscape, cybersecurity regulatory landscape, and the issue of cybersecurity-related officer and director liability stemming from shareholder derivative lawsuits based on cybersecurity incidents.
It concludes with a discussion of the steps that companies can take to prepare for and be in a better position to respond to and mitigate the negative repercussions of such an incident.
Cyber Risk in Real Estate Sales - Workshop PresentationBrad Deflin
The presentation is for the real estate sales professional seeking to protect themselves, their clients, and their practice from information theft, fraud, and cyber crime.
A presentation on the evolving digital economy as of year 2005 CE. This presentation was made to the Indian Professionals Association, Paris, France on 26-Feb-2006 by Vijayan Ganapathy
Explores the footprints of the digital economy, the transformation of the notion of money, the convergence of technology and resources, digital money, virtual money, internet, digital control and intelligence, the pains of a digital life, flight of money, digital money taxation issues, digital crimes, digital value preservation, examples of virtualization from daily life and the transforming digital economy, examples of privacy and piracy issues and their impact on e-commerce.
The presentation ends with a peek into the evolving future and some general guidelines on how to tread safely and derive value from the digital future.
Note: The information in this presentation was sourced from various articles which were available on the internet as of the date of the presentation. The author does not vouch for the veracity of the information. Since the material for this presentation has been sourced from multiple sources for a purely academic purpose, the author may not be able to individually credit each of the sources from where the information was sourced. If you feel that you deserve credit for some or most of the information presented, please reach out to the author of this presentation.
In today’s interconnected world, few things terrify CEOs and CTOs more than electronic security (well, a breach of that security, anyway). Most of our records, personal information, corporate information, and sensitive data exist online or on Internet-connected hardware. Mobile, with all it’s advantages for enterprises, actually poses one of the largest emerging threats to those enterprises’ data security. As such, we wanted to share some statistics that demonstrate the severity of the problem and highlight the importance of mobile security for your business.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Cyber Defense for SMBs offers guidance to help small and medium-sized businesses identify the most cost-effective best practices to help improve their business’s cybersecurity posture. Published by the Florida Center For Cybersecurity and written by cybersecurity experts from academia, private industry, government and the military.
Over the last several years, financial institutions have spent billions of dollars and resources securing a perimeter defense system consisting of intrusion detection, intrusion prevention, firewalls, user authentication, and other layers of security all built to secure their financial systems. Due to the exponential increase in internal and external information security incidents, these investments are necessary to protect an institution’s reputation and revenue. In addition, the federal government is using regulatory means to ensure the banks
take responsibility for potential losses.
Of equal or even greater threat, however, are the social aspects of the Internet that cannot
be controlled. For example, financial institutions need to be aware of the reputational risk that is inherent on the Internet. Each institution needs to do more than reactively protect its data; it must also proactively safeguard its reputation online, where references to its corporate name alone can number in the millions. An institution must also guard against infringements against its logo, its trademarks or other graphic representations. This risk, outside the firewall, is the other side of the coin.
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Shawn Tuma
This presentation was delivered by Shawn E. Tuma, Cybersecurity and Data Privacy Attorney, at the January 27, 2017 meeting of (ISC)² Dallas Fort Worth Chapter.
This presentation was significantly updated from past presentations and included a discussion of the groundbreaking New York Department of Financial Services (NYDFS) Cybersecurity Requirements for Financial Services Companies.
The main points of this presentation are:
(1) Cybersecurity events create a crisis situation and should be treated as such;
(2) Cybersecurity incidents are as much legal events as they are IT or Business / Public Relations events;
(3) Companies must have a cybersecurity breach response plan in place and tested, in advance;
(4) While consumer class action data breach litigation is a significant threat to companies and their leadership, it is not as great of a threat as regulatory enforcement by agencies such as the FTC and SEC, or the shareholder derivative claims for officer and director liability; and
(5) The odds are that all company will be breached, but preparation and diligence can help minimize the likelihood that such a breach from being a catastrophic event.
This presentation addresses the role of attorneys as the first responders in leading their clients through cybersecurity and data loss crisis events. The discussion begins by looking at the risk business have of being the victim of a cybersecurity or data loss incident and examining the nature of such incidents and the crisis environment they create. Then, because of this crisis environment, the need for leadership in helping keep the parties calm, rational, and making deliberate, calculated decisions.
The discussion then explains why cybersecurity events are legal events and legal counsel is the natural leader that should fulfill this role and how they can do so. It will then discuss the process legal counsel will take, including assembling the key players in such an event, both internally and externally. It discusses the obligations for responding to such an event, the steps that must be taken, those that must be considered, and certain factors that go into the decision-making process. It briefly addresses the costs of such an incident and the liability issues that can arise from such an incident and failing to properly respond to the incident. This section includes a discussion of the cybersecurity lawsuit landscape, cybersecurity regulatory landscape, and the issue of cybersecurity-related officer and director liability stemming from shareholder derivative lawsuits based on cybersecurity incidents.
It concludes with a discussion of the steps that companies can take to prepare for and be in a better position to respond to and mitigate the negative repercussions of such an incident.
Cyber Risk in Real Estate Sales - Workshop PresentationBrad Deflin
The presentation is for the real estate sales professional seeking to protect themselves, their clients, and their practice from information theft, fraud, and cyber crime.
A presentation on the evolving digital economy as of year 2005 CE. This presentation was made to the Indian Professionals Association, Paris, France on 26-Feb-2006 by Vijayan Ganapathy
Explores the footprints of the digital economy, the transformation of the notion of money, the convergence of technology and resources, digital money, virtual money, internet, digital control and intelligence, the pains of a digital life, flight of money, digital money taxation issues, digital crimes, digital value preservation, examples of virtualization from daily life and the transforming digital economy, examples of privacy and piracy issues and their impact on e-commerce.
The presentation ends with a peek into the evolving future and some general guidelines on how to tread safely and derive value from the digital future.
Note: The information in this presentation was sourced from various articles which were available on the internet as of the date of the presentation. The author does not vouch for the veracity of the information. Since the material for this presentation has been sourced from multiple sources for a purely academic purpose, the author may not be able to individually credit each of the sources from where the information was sourced. If you feel that you deserve credit for some or most of the information presented, please reach out to the author of this presentation.
In today’s interconnected world, few things terrify CEOs and CTOs more than electronic security (well, a breach of that security, anyway). Most of our records, personal information, corporate information, and sensitive data exist online or on Internet-connected hardware. Mobile, with all it’s advantages for enterprises, actually poses one of the largest emerging threats to those enterprises’ data security. As such, we wanted to share some statistics that demonstrate the severity of the problem and highlight the importance of mobile security for your business.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Better Business Bureaus October 2019 Market Monitor includes stories on protecting your business from ransomware, dark web monitoring, a timeshare resale scam and more!
Simple Training for Information Security and Payment FraudEvan Francen
The frequency of financial scams and payment fraud have been increasing substantially. We put these simple training slides together as a way to help our clients and friends.
December is Identity Theft Prevention and Awareness Month - Identity theft is a serious crime. This is the month to educate yourself on how to prevent identity theft. Join us for an important webinar with staff members from the SC Department of Consumer Affairs on how to prevent ID theft and know what to do if it happens to you. Open to library staff, state government employees, general public.
This was a presentation by Hewie Poplock on Tuesday, November 15th, 2016 in the Goodwill Manasota (FL) Ranch Lake Community Room, "How to Avoid Identity Theft".
A victim of identity theft himself, Hewie will provide examples of how ID theft can happen as well as suggestions and precautions on how to prevent you and your family from becoming victims of identity theft yourselves. Topics covered included:
• What is Identity Theft
• How ID Theft Happens
• How to Protect Yourself
• Phishing
• Data Breaches
• Facebook Spoofing
• Skimmers
• Security Freeze
• On Line Shopping Safety
• Credit Card Chips
• What to Do If You are a Victim
Hewie is a former teacher, college instructor, business owner and manager, IT Manager, and web designer. He is currently semi-retired, but is active in technology user groups and frequently speaks to and teaches groups who are mostly seniors. He holds a monthly Windows Special Interest Group for a group in Orlando and has several videos on YouTube. He is an active member of The Sarasota Technology User Group.
Common Consumer Frauds & How to Avoid Themmilfamln
Dr. Barbara O'Neill of Rutgers University and Carol Kando-Pineda of the Federal Trade Commission will present this 90-minute session on behalf of the Military Families Learning Network on March 20 at 11 a.m. ET. More info: https://learn.extension.org/events/1500/
Better Business Bureaus August 2019 Market Monitor includes stories on becoming a Cleveland Age-Friendly Business, a DNA Scam targeting older adults, a mailing scam targeting Ohio small businesses and more.
Learn what to do if you paid someone you suspect of being a scammer, gave them personal information, or granted them access to your phone or computer.
Scammers are incredibly convincing. They contact, email, and text us in an attempt to obtain our money or sensitive personal information, such as our Social Security numbers or account numbers. They're also really good at what they do. Here's what to do if you paid or offered your personal information to someone you suspect is a fraudster.
Better Business Bureau Serving Greater Cleveland's June 2023 Market Monitor includes stories about our recent Celebration of Integrity, how to implement AI as a small business, and BBB benefits.
Better Business Bureau Serving Greater Cleveland's September 2023 Market Monitor includes stories on aggressive ERC promoters, brushing scams that affect businesses, and how company's can apply to BBB's Spark Award.
Better Business Bureau Serving Greater Cleveland's pamphlet for their 2023 Celebration of Integrity event. Includes local high school scholarship winners and applicants, event sponsors, and statistics for our local community impact in 2022.
Better Business Bureau Serving Greater Cleveland's August 2018 Market Monitor includes stories on pet leasing, labor law postings, IRS fraud, and porn scammers.
Better Business Bureau Serving Greater Cleveland's April 2017 Market Monitor includes stories on protecting your business from phony grant offers, how to clean your cyber clutter, and protecting yourself against fake blackmail scams.
Better Business Bureau Serving Greater Cleveland's March 2022 Market Monitor includes stories on protecting your Google Business Profile, the winners of BBB's Spark Award, tax laws, the top scams to avoid of 2022, and more!
Better Business Bureau Serving Greater Cleveland's June 2022 Market Monitor includes stories on coping with inflation, BBB's Celebration of Integrity event, recognizing Juneteenth in the office, and how messages regarding Google Business Profiles may be a scam.
Better Business Bureaus February 2020 Market Monitor includes stories on Cocky's Bagels - the 2020 Spark Award Winner, census scams, the purchase of BBB's new building, and more!
Better Business Bureaus December 2019 Market Monitor includes stories on the purchase of BBB's new building, 2020 board of elections, vanity award scams, and more!
Better Business Bureaus June 2019 Market Monitor includes stories on an Appliance Repair Firm, BBB's Spark Award, a dues increase and BBB's Celebration of Integrity.
BBB’s annual “Celebration of Integrity” honors those who personify ethics, leadership, and community service. The “Celebration of Integrity” includes recognition of BBB Champion of Integrity, BBB Students of Integrity and its Spark Winner. We would like to congratulate this year’s honorees and all participants!
Better Business Bureaus April 2019 Market Monitor includes stories on Virtual Kidnapping Scams, Employment Scams, Phishing Emails, and BBB's Celebration of Integrity.
BBB’s annual “Celebration of Integrity” honors those who personify ethics, leadership, and community service. The “Celebration of Integrity” includes recognition of BBB Champions of Integrity and BBB Students of Integrity. We would like to congratulate this year’s honorees and all participants!
BBB’s annual “Celebration of Integrity” honors those who personify ethics, leadership, and community service. The “Celebration of Integrity” includes recognition of BBB Champions of Integrity and BBB Students of Integrity. We would like to congratulate this year’s honorees and all participants! Thank you for valuing ethical business practices and integrity in the community.
The key differences between the MDR and IVDR in the EUAllensmith572606
In the European Union (EU), two significant regulations have been introduced to enhance the safety and effectiveness of medical devices – the In Vitro Diagnostic Regulation (IVDR) and the Medical Device Regulation (MDR).
https://mavenprofserv.com/comparison-and-highlighting-of-the-key-differences-between-the-mdr-and-ivdr-in-the-eu/
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
1. theMarketMonitorN E W S F O R B E T T E R B U S I N E S S B U R E A U A C C R E D I T E D B U S I N E S S E S®
B E T T E R B U S I N E S S B U R E A U S E R V I N G G R E A T E R C L E V E L A N D
Digital Spring Cleaning
• Clean out old email and
empty deleted folders
• Unsubscribe to
newsletters, alerts, etc.,
you no longer read
• Update software on
devices to reduce
malware risk
• Delete unused apps and
review app permissions
• Make new passwords
using upper and lower
case letters with numbers
or symbols
• Copy sensitive/important
data to the cloud for safe
storage
INSIDE: B2B Discounts • FacebookScams • DigitalSpringCleaning • EmailScamAlert
ShredDay • NARIContractor oftheYearAward • QuickTipTuesdays • FlashWebinar
APRIL 2017
SERVICE TO THE
COMMUNITY
Greater Cleveland BBB Activity
Report: January - March 2017
Reports issued on companies/
charities: 369,964
Customer complaints filed: 1,675
Online Accredited Business
Directory listings viewed: 32,270
bbb.org/cleveland visits: 297,539
Advertising review cases
initiated: 183
New algorithm identifies cons that are riskiest to consumers:
men more vulnerable than women, and young adults at
highest risk
The BBB Institute for Marketplace Trust (BBB Institute) has
released its BBB Scam Tracker Annual Risk Report, which
provides comprehensive insight into scams based on the more
than 32,000 reports made to BBB Scam Tracker (bbb.org/
scamtracker) in 2016. The BBB Risk Index is a paradigm shift in
how to calculate the true impact of different scams. In the past,
virtually all involved organizations used volume alone to create
“top scam” lists, but this approach ignored two other equally
critical factors: the susceptibility of the population and dollar
losses.
The data revealed that men were more vulnerable than women
in seven of the top ten scam categories; and consumers 18-24
are the most likely to lose money to a scam. While seniors tend
to lose more money than Millennials when they are scammed,
they fall for scams far less often. And the biggest takeaway is
that no one is immune from the risk posed by scams.
The BBB Risk Index measures risk along three dimensions:
• Exposure (how likely are you to be exposed to the con?)
• Susceptibility (if you are exposed, how likely are you to lose
money?) and
• Monetary loss (if you do lose money, how much is it likely to
be?).
Exposure X Susceptibility X Monetary Loss = Risk Index
Based on the BBB Risk Index, the riskiest top five scams overall
(U.S. and Canada combined) are:
1. Home improvement scams (bbb.org/homescam)
2. Fake checks and money orders (bbb.org/fakecheckscam)
3. Employment scams (bbb.org/employmentscam)
4. Online purchase scams (bbb.org/webpurchasescam)
5. Advance fee loan scams (bbb.org/loanscam)
Visit bbb.org/scamtracker to report scams and to see what
others have submitted from your area.
BBB IDENTIFIES TOP SCAMS
USING NEW “RISK INDEX;”
HOME IMPROVEMENT AND
FAKE CHECK SCAMS HEAD
THE LIST
HIGHLIGHTS BY AGE2
SNAPSHOT OF 2016
Total Number of BBB
Scam Tracker Reports
32,781
Susceptibility (i.e., % of
reports that included $ loss)
18.8%
Median Dollar Loss
$274
TOP 5 MOST RISKY SCAMS1
Travel & Vacation Scams
Home Improvement Scams
Charity Scams Fake Check/
Money Order ScamsDebt Collection Scams Employment Scams
Business E-mail
Compromise
Online Purchase Scams
Advanced Fee
Loans Scams
Home Improvement Scams
Door-to-door solicitors offer
quick, low-cost repairs and
then either take payments
without returning, do shoddy
work, or “find” issues that
dramatically raise the price.
Fake Check Scams
You deposit a phony check
and then return a portion by
wire transfer to the scammer.
The stories vary, but you
will often be told you are
refunding an “accidental”
overpayment.
Employment Scams
You are led to believe you
are applying or have just
been hired for a promising
new career while you have,
in fact, given personal
information or money to
scammers for “training”
or “equipment.”
Online Purchase Scams
These cons often involve
purchases and sales on
direct seller-to-buyer sites.
A buyer may send a fake
check, or a seller may simply
never deliver the item.
Advance Fee Loan Scams
A loan is guaranteed but, once
you pay upfront charges, such
as taxes or a “processing fee,”
the loan never materializes.
#1 #2 #3
#4 #5
BBB SCAM TRACKER
Annual Risk Report
DATAat a Glance
Most Risky Scam Types by Age
65+
Family/Friend
Emergency
55-64
Home
Improvement
45-54
Home
Improvement
35-44
Investment
25-34
Employment
18-24
Fake Check
Susceptibility
decreases with age,
but when losses
occur, they are
higher in the older
age groups.
Median $ Loss
% Susceptibility
HIGHLIGHTS BY GENDER
Gender differences in
susceptibility are small,
but the dollar losses
reported are much
higher for men.
Median $ Loss
% Susceptibility
Most Risky Scam
Types by Gender
Online
Purchases
F
M
Investment
Females
$249
18.8%
$361
19.9%
Males
MEANS OF CONTACT3
PAYMENT METHODS
1
The formula for calculating the BBB Risk Index is Exposure X Susceptibility X Median Loss/Overall Median Loss X 1,000.
2
Excludes scam types with less than 30 reports for the specified group.
3
Excludes reports where no monetary loss occurred.
Report scams. Learn about scams. Protect yourself. Visit bbb.org/scamtracker
12%
$390
65+
15.4%
$300
55-64
20.2%
$273
45-54
25.3%
$225
35-44
27.9%
$227
25-34
37%
$200
18-24
Credit
Card
(34%)
Bank Account
Debit (16%)
Wire
Transfer
(12%)
Check
(9%)
Other
(8%)
Cash
(7%)
Online
Payment
System (6%)
Prepaid
Card
(5%)
Money
Order
(3%)
Phone
(23%)
Website
(19%)
E-mail
(18%)
Social
Media
(11%)
In Person
(7%)
Internet
Messaging
(6%)
Other
(5%)
Text
Message
(3%)
Postal
Mail
(2%)
2. ®
Follow usat:
FACEBOOK SCAMS TARGETING BUSINESSES
WITH PHONY GRANT OFFERS
Do not be misled by Facebook messages claiming that
your small business is eligible for a grant. Scammers
often pose as your Facebook friends to promote
fraudulent grants. Your “friend” may even claim he has
already received funds from the grant. Don’t believe it.
The Federal Trade Commission offers this advice:
• The government won’t contact you through social
media to offer you money.
• Real government grants don’t require that you pay
first. Stay away from any deal that makes you pay to
get your “business grant.”
• If someone tells you they need your passwords to give you a “business grant,” they’re
just trying to hack into your accounts to steal your money or impersonate you and scam
others.
• If the only way to communicate with the person offering you a “business grant” is
through social media or text, that is a red flag.
TIME FOR A DIGITAL SPRING CLEANING
The National Cyber Security Alliance (NCSA) and
Better Business Bureau (BBB) are encouraging
consumers to get their online lives in good order
by conducting a thorough cleanse of their cyber
clutter and make “digital spring cleaning” an
annual ritual to help protect valuable personal
data. A NCSA survey found that preventing
identity theft is a top safety concern for
Americans, but there are several easy steps that
everyone should do that will go a long way in
tidying up digital disorder.
“Chances are that over the years you’ve accumulated lots of digital clutter that can impact
your cybersecurity posture. It’s critical to remember that just as you shred sensitive paper
documents before discarding, you should properly destroy important electronic data,” said
Michael Kaiser, NCSA’s executive director. “By following a few easy-to-use digital spring
cleaning tips, you can be significantly safer and more secure online. In addition, you will
have a renewed peace of mind that you are helping to protect yourself, your family and the
community at large. NCSA and BBB want everyone to enjoy the internet’s extraordinary
benefits with increased confidence.”
“Just as we urge people to safely shred old paper records, BBB is also urging consumers
and businesses to make sure that electronic files are properly disposed of when no longer
needed,” said Bill Fanelli, chief information officer with the Council of Better Business
Bureaus. “Old hard drives, data sticks, cell phones, tablets...anything that contains sensitive
data should securely destroyed. Digital spring cleaning also means deleting old files,
updating passwords and taking other steps to make sure your private information stays
private.” Many BBBs are hosting Secure Your ID Day shredding events in April.
Need to safely destroy old documents? BBB is having a free shredding event on April 29th.
(See notice on page 3). Bring up to 3 boxes or bags of paper for secure shredding.
B2B DISCOUNTS FOR
BBB ACCREDITED
BUSINESSES
KnowYourCustomers.com
is offering a 30% discount
on its service you can
use to report non-paying
customers and to research
reported non-payment of
potential customers. Enter
promo code CLEBBB at
knowyourcustomers.com.
Easton Telecom Phone service
rates ranging as low as 5% off
most retail services. For a no-
obligation cost comparison and
service analysis, contact Jim
Butler at (800) 222-8122.
All Ohio Secure Shred will
shred documents on site for
$25/month for one container.
Also, one-time bulk purge for
10 cents/lb. $50 minimum. Call
(330) 659-0840 or
(888) 747-3394.
Intellicorp Records, Inc. offers
online criminal checks for
$17.07 each. Other reports also
discounted. Call
(800) 539-3717.
PartnerShip®
offers discounts
on select FedEx®
services
including express packages,
ground packages, and
residential delivery, on both
new and existing FedEx®
accounts. Also save at
least 70% on standard and
guaranteed LTL freight
shipments with UPS Freight,
YRC Freight, Con-way Freight,
and other reputable carriers,
including competitive pricing
on truckload, expedited, and
tradeshow shipments. Call
(800) 599-2902.
Some member discount programs
generate revenue which BBB reinvests
into the organization’s operations.
3. bbb.org/cleveland
theMarketMonitor
SCAM ALERT: CREEPY EMAIL CON CLAIMS
TO BE WATCHING YOU ONLINE
You receive an email informing you that you’ve
been caught performing fraudulent activities
online. One version claims you’ve been using
PayPal to illegally transfer funds. The accusation is
false, of course, but the email has your real name
and address (although targets report that the
address is frequently out of date).
The email’s author warns that someone has been
monitoring your online activities and collecting
evidence to take to the police. Luckily, the
scammer has attached the incriminating evidence
to the email, so you can see it and respond. How kind!
No matter how curious you are, don’t download the file! The attachment adds malware
to your device, which scammers then use to capture passwords or hunt for sensitive
information.
How to Spot an Email Scam:
• Be wary of unexpected emails that contain links or attachments. Do not click on links or
open files in unfamiliar emails.
• Check the reply email address. One easy way to spot an email scam is to look at the reply
email. The address should be on a company domain, such a jsmith@company.com.
• Don’t believe what you see. Just because an email looks real doesn’t mean it is.
Scammers can fake anything from a company logo to the “Sent” email address.
• Consider how the organization normally contacts you. If an organization normally
reaches you by mail, be suspicious if you suddenly start receiving emails or text
messages without ever opting into the new communications.
• Be cautious of generic emails. Scammers try to cast a wide net by including little or no
specific information in their fake emails. Be especially wary of messages you have not
subscribed to or companies you have never done business with in the past.
SHED A FEW POUNDS (OF UNWANTED
PAPER) AT BBB’S FREE SHREDDING EVENT
Bring up to 3 boxes or bags of
documents and have them securely
shredded at BBB’s Secure Your ID Day.
The event happens Saturday, April
29th at RadAir locations in Lorain and
Solon. BBB has conducted this event
for nine years resulting in 119 tons of
shredded paper. This is a perfect time
to clean personal and business files
and be assured that confidential
information does not get into
the hands of scammers. BBB thanks All
Ohio Secure Shred for providing the
shredding services. Their trucks are
equipped with video cameras if you
wish to watch your documents get
shredded. Hope to see you there!
CONGRATULATIONS!
The following BBB Accredited
Businesses were recognized as
the “best of the best” at NARI’s
Contractor of the Year Award
(COTY) ceremonies held in March.
Absolute Roofing and Construction
B. Legrand Design::Build
Dover Home Remodelers
Hurst Design-Build-Remodel
Jemm Construction
Kitchens by LoGrasso
Northeastern Residential
Odell Construction
Perrino Builders & Remodeling
R. B. Schwarz
Remodel Me Today
Tamer Construction
Mini webinars (under 15 minutes)
to help you maximize your BBB
accreditation.
May 2nd @ 9:00 am
Are you using BBB’s Customer
Review Button?
May 16th @ 9:00 am
Does your business have a Five
Star Rating?
June 6th @ 9:00 am
Event Marketing Tips for Better
Events
June 20th @ 9:00 am
Effectively Advertise your
Accredited Business
Watch your email for registration!
You and your employees are
invited to tune into FREE, 30
minute webinars that get straight
to the point and cover important
details on helpful topics. So grab
your computer and let your BBB
help advance your business in the
time it takes to enjoy your morning
coffee! Stay tuned for upcoming
webinars.
Interested in presenting a BBB
Flash Webinar? Have questions?
Contact Brigid at (216) 623-8964
x206 or brigid@cleveland.bbb.org.
BBB FLASH Webinar
4. The Market Monitor
Better Business Bureau
2800 Euclid Avenue, 4th Floor
Cleveland, OH 44115-2417
The Market Monitor (ISSN 1085-5122). April 2017. Volume 13 No. 2. Published bimonthly in February, April, June, August, October and December by the Better Business Bureau, Inc. 2800 Euclid Avenue, 4th Floor,
Cleveland, OH 44115-2417, Periodicals postage paid at Cleveland, OH. POSTMASTER: Send address changes to: The Market Monitor, 2800 Euclid Avenue, 4th Floor, Cleveland, OH 44115-2417.
Periodicals Postage Paid
A special thank
you to our
BBB Accredited
Businesses for
supporting our
booth at the
2017 Home +
Remodeling Expo
The Market Monitor
Better Business Bureau
2800 Euclid Avenue, 4th Floor
Cleveland, OH 44115-2417
Periodicals Postage Paid
APRIL 2017