Monday, 27 May 2013

Workplace Privacy Fact Sheet


Here's an interesting overview of Privacy in the Workplace, the illustration and fact sheet are from The Office of the Privacy Commissioner of Canada.

"Whether or not privacy is protected by law or contract, respecting privacy in the workplace makes good business sense.
People expect to have some privacy at work, even if they are on their employer's premises and using the employer's equipment. At the same time, it's normal that working for someone will mean giving up some privacy. Employers need basic information about their employees for things like pay and benefits, and they have to be able to ensure that work is being done efficiently and safely.

But the possibilities for infringing on privacy are greater than ever before. Psychological tests, web-browsing records, video surveillance, keystroke monitoring, genetic testing: the information an employer can have about employees is limitless.

Employers can balance their "need to know" with their employees' right to privacy, if they ensure that they collect, use, and disclose personal information about their employees for appropriate purposes only.

Employers have legitimate requirements for personal information about their employees. They need to know who they're hiring. They need to address performance issues and ensure the physical security of their workplace. And they may see electronic monitoring and other surveillance as necessary to ensure productivity, stop leaks of confidential information, and prevent workplace harassment." [read full article]

Employers need to know about workplace Privacy, and if the expertise in not in-house they should contact a professional. Call The Renwick Group if your business is in need of Corporate Surveillance or Pre-Employment Screening or you have questions about workplace Privacy. We have the experience and knowledge to handle these important services.

Friday, 17 May 2013

Infographic - The Perpetrators & Victims of Occupational Fraud

Here is an Infographic put together by the LowerRiskgroup.com using the 2012 Global Fraud Study conducted by The Association of Certified Fraud Examiners.

Some of the Fraud Prevention Practices recommended by the study include;

  • Fraud Prevention Practices
  • ongoing anti-fraud training
  • effective fraud reporting mechanism
  • measures exist to promote employee's perception of fraud detection
  • Tone at the Top is one of honesty and integrity
  • Fraud Risk assessments are performed
  • Strong anti-fraud controls are in place
  • Hiring Policy included comprehensive background checks
Call us to discuss corporate fraud prevention or employment background checks. 1 (888) 722-9807   Or visit us online to learn more about service we provide.



Tuesday, 7 May 2013

Password Pain is a Gain for Fraudsters

Here is an excellent article from I-Sight Case Management about Passwords (Create a Hacker Proof Password) and how important it is to take password protocol seriously in your organization. Let's
hope no one reading this is using one of the top 10 worst passwords listed below!

"Employees are the weakest link and strongest ally in the fight against fraud

Cybercriminals recently stole more than $1 million from a county hospital in Leavenworth, Washington, by hacking into the medical center’s accounting system. By the time the head office had noticed anomalies in three payroll files, more than $1 million worth of payroll transactions had been processed and deposited into the bank accounts of 96 “mules” and then siphoned off by the fraudsters.

When AP’s Twitter account was hacked and the hackers tweeted about explosions at the White House, the Dow Industrial Average lost about 140 points. Although the losses were quickly recovered, the incident highlighted the damage that can be inflicted with a hacked password. And because password theft is usually behind social media account hacking, security experts were quick to point out the importance of password security and make suggestions to strengthen security by using two-factor authentication.

90% of Passwords are Hackable

Top 10 of SplashData’s worst passwords of 2012
password
123456
12345678
abc123
qwerty
monkey
letmein
dragon
111111
baseball"

read the full article

by Dawn Lomer
Corporate Journalist
Article Published May 7, 2013

Tuesday, 30 April 2013

Urban Myths About Cyber Security - How to stay safe online

Are you concerned about online security? Cyber security is an issue not just for governments and businesses, but anyone using the internet from a mobile device or a desktop computer. Here is an overview of myths and truths about internet security issues that may get you thinking about your online habits and systems.

source: BBC News Technology, Alan Woodward

Are we wising up to the dangers lurking online? Or are phishing, spam and hacking just words that we still do not understand and we hope will not happen to us.

Ofcom recently revealed that one in four British people still use the same password for all their activities online, suggesting we still have some way to go to fully understand computer security.
Here Prof Alan Woodward explores some of the misconceptions about how we stay safe online.
While there is still a long way to go in raising awareness of the risks inherent in surfing the net, word is spreading.

Unfortunately, some urban legends have arisen that are leading to a false sense of security.
Probably the most common of these myths is that your computer cannot be infected simply by visiting a website containing malicious code. The story goes, that you are only going to get malware on your machine if you actively agree to download software.

SECRET DOWNLOADS

As with many myths it contains a grain of truth. However, you may not recognise that you are giving your permission, and often hackers rely upon the fact that your computer is set to give permission by default to certain types of download. This has led to the phenomenon of "drive-by downloads".
These downloads can happen in several ways, with hackers developing new methods all the time.
Possibly the most insidious technique relies upon what are known as inline frames or "IFrames". The intention of IFrames was to allow webpages that have a mixture of variable and static content to be constructed so that they used computer resources more efficiently.
First introduced in 1997, IFrames essentially allow you to embed "active" material that is brought in from elsewhere.

When misused, IFrames can secretly download another webpage - one you will not see because they can be as small as a single pixel - which redirects you to a page containing an exploit.
If your browser and system are vulnerable to this exploit then the malware is downloaded on to your computer. And, you did not agree to anything, did you?

A variant of this first great myth is that webpages cannot download to your computer without you clicking on an "OK" button.

You may have to click but that click might not be doing what you think. A typical trick is for a compromised site to pop up a box - usually an advert - which you simply have to close if not interested. The act of closing the advert can be the very click that initiates a download.
Things are not always what they seem online.

HOW TO STAY SAFE ONLINE
  1. Anti-virus software is a good start although it can only protect you against the threats it knows about
  2. Don't open emails or attachments from people you don't know
  3. Block spam emails and delete them
  4. Use unique passwords for every site you interact with
  5. Make sure passwords are complex and contain no personal information - a combination of letters and numbers is a must
  6. When visiting a site check that it is genuine - by looking for addresses and phone numbers
  7. Check the address in the browser address bar is the same as the one you typed
Read the full article on the BBC website