Thursday, 22 October 2015

How to Protect Your Organization from Social Engineering in 6 Important Steps

What is social engineering and how can it be a threat to your organization? 

Social engineering or “social hacking” as it is sometimes referred to, is a way in which people manipulate someone into revealing their confidential information such as passwords, account numbers, network access, or ID’s. As computer networks and programs improve their security, social engineering becomes more prevalent as a way to gain access to this restricted information, often shockingly easily. Rather than breaking into a computer system, they play psychological tricks 
to gain this information.

Barrie Social Engineering FraudSome common ways people use social engineering might be posing as a repairman or company representative such as a financial advisor. Recently a teen in the US gained access to the CIA Director’s email by posing as a Verizon worker.

Social hackers may use phone, the web, or even face-to-face tactics to gain information. They might call you posing as a representative from your bank claiming that your account has been flagged for suspicious activity, and demand personal information to “verify” your identity. A hacker may even pose as a collections agency demanding payments and threatening to arrest you if you don’t pay. You may receive an email claiming to be from the IT dept of your own company requiring restricted information to perform audits or system tests. Some hackers are dedicated enough to gain employment at their target in order to gather privileged information.

So how do you protect yourself from these types of psychological attacks? By following some simple guidelines you can make sure your organization does not fall victim to social hackers.

  1. Implement a policy at your organization and train all employees on proper security procedures. Empower them to take responsibility for your company's security by using critical thinking and creating a security aware culture. Require them to verify visitor IDs, and report suspicious activity.
  2. Implement proper storage and disposal of sensitive documents. Locked filing cabinets, paper shredders, and high-end network security are your best practices.
  3. Remember that it is not enough to have a strong password. Have different logins and passwords for different programs, change passwords often, and never reveal your password to anyone.
  4. Stand your ground. If you suspect someone is attempting to use these tactics on you, do not give in to intimidation.
  5. Damage control. If you suspect you may have fallen victim to a social engineering attack report the incident immediately to authorities, change all passwords, update your network software, and call your financial institutions or monitor your accounts.
  6. Hire a private investigator to complete background checks on employees as well as to help you further protect your organization from hacking and fraud.


Social engineering is a common way to gain confidential information, however you can protect yourself and your organization by staying vigilant and following the steps outlined above.

The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.


Friday, 18 September 2015

10 Tips to Protect Yourself from Identity Theft and Fraud

identity theft renwick PI
Identity theft occurs when a person’s private identifying information is stolen for financial gain. An impostor will acquire key pieces of your personal information such as your social insurance number and drivers license … and impersonate you to commit fraud.

Here are some tips to protect yourself from identity theft:

  1. Ask questions. If someone is asking you for personal information, question them. Don’t simply answer. Your personal information is protected by Canadian legislation such a PIPEDA, so don’t give it away without questioning the reasons.
  2. Protect your pin. This seems simple, but it’s surprising how many people don’t do this! Shield the keypad every single time you enter your pin.
  3. Guard your information online. Remember to clear your logins and passwords from your computer, and change your password, at minimum, once per month. Consider paying online with credit card rather than online payment services or debit. Credit card companies usually have guarantees to protect you.
  4. Watch out for phishing scams. Be alert when you see “pop-ups” that seem like they’re from a bank. This scam will ask for your personal information which they will try to use to access your accounts.
  5. Monitor your bank and credit statements. Keep an eye out for any suspicious purchases. You can go one step further and monitor your credit report through companies such as Equifax.
  6. Shred sensitive information. Be careful with your personal information. Any piece of paper that has personal information – including your name, address, account numbers, identification numbers etc. – can be used to commit fraud. Don’t just throw it out on the street, shred the paper first. And this includes old credit and debit cards.
  7. Secure your mail. This tip goes along with number 6! Be sure to shred or destroy all documents containing personal information. Especially that pre-approved credit card application that is mailed out.
  8. Don’t give out your social insurance number. There are very few organizations that should ask for this information. More importantly, only give this information to organizations YOU have initiated contact with (like banks, employers and government.)
  9. Only enter payments on secured sites. Look for the “paddock” symbol and sites that begin with “https.”
  10. Use complicated passwords. There’s a reason why you can’t choose “1234” for pin codes. Unique complicated passwords will give you an extra layer of protection. Try to stay away from passwords that can be easily guessed (like your birthday or child’s name).


The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.




Friday, 21 August 2015

Why Should You Conduct Tenant Screening Background Checks?

tenant screening skip tracing PI BarrieWouldn’t it be nice is every tenant paid on time and worked hard to make sure they didn’t disturb their neighbours? Tenant screening can help you find the ideal occupant for your property by helping your learn everything you need to know about your potential tenants. There are plenty of great tenants out there, and tenant screening will help you make sure you choose the right one.

The screening process will help you determine if you’re choosing the right tenant. Most screening processes include a criminal background check, credit report, employment references, and rental history. But what if the screening process all checks out fine … but there is still something “off” about the potential new tenant?

Here are some red flags to watch out for:

  • Negative opiniona about current or previous landlord
  • Bad references (especially a poor reference from a landlord)
  • Unexplained “rush” to move in (could indicate a previous eviction) 
  • Aggressive pets
  • Late arrival to rental showing
  • Different people show up for the viewing than previously discussed
  • Excessive criticism of property before they move in
  • Frequent relocation
  • History living with relatives or at motels
  • Frequent job changes
  • Inability to pay deposit prior to move-in date
  • Unprofessional phone or email correspondence
  • Promises to “update” your property … at no cost
  • Income that is less than 2.5 – 3 times the monthly rent
  • Prior eviction(s)
  • Unexplained nervousness regarding the screening process 
And of course, a criminal record and poor credit history are the biggest red flags to consider.

A thorough tenant screening process will ensure will cover your bases and protect you from losses related to late/no payments and property damage. Everything that is on your screening application should be verified – don’t take your tenant’s word for it! Protect yourself and your property with a background check.

Property managers and landlords use The Renwick Group background checks to screen their potential tenants. We offer many instant background checks for tenant screening, including credit reports and criminal records.

Contact us today for more information about our tenant screening services.


The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.

Friday, 31 July 2015

Choosing the Right CCTV Camera for Corporate Surveillance

Video surveillance is a great tool for protecting employees, preventing theft and reducing the risk of criminal break-ins. In addition, it can assist your in supervising your employees to ensure safety protocols (including WCB rules) are followed, record that the right products were shipped or received without damage, and even prevent employee harassment.

CCTV Skip Tracing Surveillance BarrieThere are so many CCTV cameras on the market today. This presents a great opportunity for you to find a camera that does exactly what you need. The first step in choosing a CCTV camera is understanding the main types of cameras out there, and of course determining the main purpose for your surveillance.

What is a CCTV Camera System?

Closed-circuit television (CCTV) is the use of CCTV video cameras to transmit a video signal to a monitor for live viewing, or to a recording device for viewing at a later date. They are used primarily for surveillance and security purposes.


What Type of CCTV Camera Should I Buy?

Here is a selection of the different types of CCTV Cameras you can consider:

Dome Camera

Dome Cameras are often used for indoor security and surveillance. Typical applications are retail environments, where the camera is designed to be unobtrusive, but visible. In addition, the "dome" shape makes it difficult to tell the direction that these cameras are facing, and thus are ideal for deterring criminals. The “bad guys” will know the facility is being watched and customers will feel at ease knowing the facility is being protected. Units that allow the camera to pan/tilt/zoom and spin quickly within the housing are often referred to as “speed domes.” Speed domes are used to cover a wide area with only one camera, or to avoid poor light conditions at certain times of day.

Bullet Camera

Bullet Cameras have a long, cylindrical, and tapered shape, similar to that of a "rifle bullet", often used in applications that require long distance viewing. The camera is not typically designed to have pan/tilt/zoom control but instead to capture images from a fixed location, pointing at a particular area.

A bullet camera is a wall-mount or ceiling-mounted unit that is typically designed for indoor use, but can also be used for some outdoor applications. Many bullet cameras can also be waterproof by being installed inside protective casings, which protect against dust, dirt, rain, hail and other harmful elements.

C-Mount Camera

C-mount cameras have detachable lenses to fit different applications. Standard camera lenses can only cover distances of between 35 and 40ft, therefore with C-mount cameras, it is possible to use special lenses, which can cover distances greater than 40ft.

Day/Night Camera

Day/Night cameras have the distinct advantage of operating in both normal and poorly-lit environments. These cameras do not have Infrared illuminators because they can capture clear video images in varying light conditions and in the dark.

The camera is ideal for outdoor surveillance applications, where Infrared CCTV cameras cannot function optimally. These cameras are primarily used in outdoor applications and they can have a wide dynamic range to function in glare, direct sunlight, reflections and strong back light 24/7.

High-Definition HD Camera

Ultra high-definition cameras are often relegated to niche markets, such as casinos and banks. These give the operators the ability to zoom in with extreme clarity (to look at a poker player who might have something up their sleeve).

If you plan to conduct corporate surveillance, there are some additional factors to consider.  Click here to view our post: Corporate Surveillance | What You Need to Know.


We offer a variety of corporate surveillance services that will allow us to discreetly gather information and assist you in presenting unbiased facts and circumstances. We have a strict privacy policy in place, and can assist you in navigating your own privacy-related legislative requirements.

Contact us today for more information about our corporate surveillance services.



The Renwick Group has experience working with many different types of businesses and organizations providing skip-tracing, fraud investigations, WSIB support, legal team assistance, evidence gathering, employee background checks, and more. We also work with individuals who need help with personal matters. Call us at 1 (888) 722-9807 or visit our website for information.