Strengthening The Human Element To Weaken Fraud

Strengthening The Human Element To Weaken Fraud

There’s a new level of fraud in town, and it doesn’t come from outside your doors. Instead, it’s coming straight from you.

Just ask a Snapchat employee about it, who fell for the scam earlier this year. In this case, the employee received an email impersonating the CEO, asking for sensitive data. The employee believed it, released the data, compromising internal employee records.

Fraudsters find where the weak points are. And in cases like this, they know that when you receive an email or a text message from someone you know, someone in authority, someone you’re used to receiving information from, the chances are you’ll respond without a second thought.

It’s called “call spoofing” and involves masking their phone number and manipulating it to appear as another. And you can use it to accomplish many different things, including obtaining sensitive information, making unauthorized purchases, even opening up lines of credit.

When something comes from a trusted source, you want to believe. It’s human nature. That makes this type of fraud that much more difficult to counter, especially for eager employees trying to do a great job and looking for opportunities to move forward within the company.

Just like a lot of other kinds of fraud, “call spoofing” relies on the human element to be successful. It plays on human emotion and their desires to ultimately please those around them.

It’s difficult to train your employees to question everything. But to succeed against some of the most potentially damaging security risks out there, questioning everything makes good business sense.

Strengthening the human element means making people aware of social engineering tactics. In an age where sensitive data is readily available for all to see in environments like Facebook or LinkedIn, fraudsters are able to guess the right answers to security questions with ease. Which means employees must look beyond the obvious – a simple answer – and go more on gut instinct – watching for things that simply don’t make sense.

Question everything.

  • Does this request make sense?
  • Is it framed in a way that makes it believable?
  • Is this something this person would normally ask for in this method of communication?
  • Is there a way I can quickly verify the validity of this request?

Training your employees to think differently is half of the battle. The other half involves strengthening your systems. Arm your employees with as much information as possible about normal routines within the business environment. Real-time fraud analysis systems can also validate information even before it finds its way to your employees’ email boxes or phone systems. And when something doesn’t meet with the way things are normally done, they have the ability to treat suspicious activity in a set way that puts your entire company at less risk.

How strong is the human factor in your business at preventing fraudulent behavior?

Is There A Difference Between Indoor and Outdoor Cameras?

Is There A Difference Between Indoor and Outdoor Cameras?

Video surveillance is an important part of any home security system. They add an extra layer of security, and provide an added level of peace of mind.

But adding video surveillance isn’t as easy as selecting the first camera equipment you find. It can be difficult to know which cameras best suit your needs. And there is a difference between indoor and outdoor cameras; selecting the wrong one won’t provide the proper coverage your home needs.

The primary distinction between indoor and outdoor security cameras is the ability to withstand harsher external elements. While both types of cameras usually come with similar styles and internal features, outdoor cameras need to be able to contend with the harshest winter days, the hottest summer days, and varying light conditions.

Outdoor cameras are also more vulnerable to being tampered with, so they are typically made from more durable materials, possibly housed in a casing that discourages easy break-ins or removal.

Indoor cameras are smaller, more lightweight, and are usually far less intrusive than their bulkier outdoor counterparts. Both indoor and outdoor cameras utilize features like infrared, allowing for clear pictures even in low light situations. They can easily transition when there is a sudden change in lighting conditions, and automatically go from color in daylight to black and white as it darkens.

Dome cameras are also popular in both indoor and outdoor settings in order to keep visitors from knowing exactly where the lens is pointed. This keeps people from easily hiding just out of range, and makes a potential burglar think twice before moving forward.

Keep in mind that in most cases, hidden cameras are better off in indoor applications, where they are designed in such a way as to be hidden in common household items. Concealing a camera outside means selecting a small camera that isn’t designed for outdoor use, and therefore is more susceptible to weather elements.

In order to ensure you have the right camera setup for your situation, connect with a security technician to find out your best options.

Why Senior Living Communities Should Care About Security Technology

Why Senior Living Communities Should Care About Security Technology

Demand for senior housing will continue to rise in the coming year’s thanks to an ever-growing supply of baby boomers that are aging and moving into a phase where they begin needing care. The National Investment Center for Seniors Housing and Care has reported that established senior housing occupancy rose to an all-time high in 2015 of just over 90 percent. And in every sector – independent living, assisted living, and nursing care – growth and demand continues to rise.

While this tremendous growth is fueling a host of problems within the industry, security is one that is rarely talked about. There’s a general lack of industry-wide best practice principles, while at the same time there’s a growing sophistication of cyber threats in an increasingly digital world.

Cybersecurity risks transcend all industries. It’s not just banks and financial services companies that are at risk. Target knows this. Anthem knows this. According to an IBM report, healthcare tops the list of targeted industries.

Like other organizations, healthcare businesses are rapidly shifting toward adopting electronic reporting and cloud-based storage of information. Senior living facilities hold sensitive resident, patient and employee data in a variety of ways. Because senior living facilities also store financial information on residents, such as credit card and other banking information, their exposure to hackers is even greater than most. Hackers know this, and often target these facilities, knowing they can fetch a much higher price on the black market for personal health information compared with something like credit card information.

It can also be argued that the health care industry has been slower to adopt security policies than other more technology driven industries. It’s not just the large corporations who are at risk. Small, low profile companies are often more susceptible because they are easier to penetrate and may not notice breaches in an instantaneous fashion. In 2014, Assisted Living Concepts’ payroll services computer system was hacked, putting the risk of about 43,600 employees records at risk, including names, birth dates, Social Security numbers and compensation data.

It’s difficult to know what best practices are, especially when they seem to change every day. When it’s not your primary job function, how can you ever keep up with the demands that come along with securing your data? Senior living has been fortunate until now that hackers haven’t focused on the industry as much as others. But that doesn’t mean the trend will continue.

Data security should be at the top of mind for every C-level executive in every industry. It’s not a matter of if a breach attempt occurs, it’s a matter of when. The more you are prepared, the less potential damage will exist.

We can help.

Do You Offer Fraud Protection As A Customer Service?

Do You Offer Fraud Protection As A Customer Service?

Imagine a hurricane slowly moving up the coastline, causing floods and damage as it travels from city to city.

Or a river rising as the rains come down day after day. Eventually, it surpasses its banks and creeps into offices and housing complexes that share the same borders.

You can’t stop Mother Nature. When events happen beyond our control, you simply have to wake up the next morning and deal with the aftermath.

People understand that. And if Mother Nature impacts your business, people will give you a little leeway to make things right.

But what if a hacker gets into your databases and compromises your customer files? What’s it going to take to keep your customers happy in this situation?

Unfortunately, large and small companies alike are finding out every day.

Customer-friendly companies are finding themselves in a unique catch-22 situation. On the one hand, it’s important to keep security issues confidential and work issues and problems internally as quickly as possible. On the other hand, if you don’t share what’s happened quickly and thoroughly and your customer base finds out without your input, your reputation can be severely destroyed.

Nothing loses trust with your customer base faster than a data breach. The way you act from the moment you discover it sets the stage for everything.


While it’s difficult to recover from a data breach, it’s not impossible. If a company acts with integrity and total transparency from the beginning, it can build a stronger customer base throughout the process.

Where do you start?

With your customer messaging.

You can’t hide. You can’t ignore. All it takes is one person finding out the truth, and they can hit social media in an instant. Within minutes, a tidal wave can occur throughout sites like Twitter or Facebook.

Even before you have a data breach, you can begin to build trust by letting your customer base know your security plans. Show them your commitment by talking about upgrades. Send a clear message that security is everything.

If a data breach occurs, begin the campaign to tell your customers where the problem lies as soon as you possibly can. The message should be clear: something happened, and we won’t stop until we fix it. Because hiding problems will get you nowhere. Even giants like eBay have learned the hard way, when it didn’t release information on a security breach with its customer data.

Then talk about the problem throughout the clean-up process. What should your customer base do? What steps are you taking to ensure it never happens again? Remember your customer base is on multiple channels. If you’re where they are, they will be more accepting of the process. That means through print, mobile, and online technology.

Today’s threats and challenges are real. How you respond to them even before a crisis happens sets the stage for your continued growth.

What message are you sending your customer base?

Why It May Be Time To Hand Over Your IT To A Managed Service Provider

Why It May Be Time To Hand Over Your IT To A Managed Service Provider

Managed Service Provider. It’s a buzzword you’ll often hear throughout the business world. If you’ve been searching for the right company to provide IT services, you’ve probably seen it again and again.

As defined, Managed Services allows a business to offload their IT operations. The managed service provider assumes all responsibility for monitoring, managing and fixing problems for the IT systems within the business.

Companies today are increasingly relying on outside providers for part of their IT needs. But that doesn’t mean MSPs replace your IT function; in many cases, they complement rather than replace. MSPs help free up existing IT staff to focus on more strategic projects. It allows them to begin development and implementation of projects that in many cases have been calendared for months, even years, without proper time for implementation.

Managed service providers originally were companies consisting of networks of people that were self-taught in the area of break-fix maintenance. When something broke, the company called the service provider to come and fix it. And hopefully, it worked.

As time went on, these networks became more developed and offered greater tools, programs, and procedures. They would periodically come on-site to perform systems reviews and look for hints of bigger problems that were stored within. Still, in most cases, you simply could not see what didn’t exist. Most support still happened only when emergency situations occurred, and the MSP was called in to fix it.

Since that time, hardware and software has continued to improve. Technology continued to change. And today’s managed service providers are better equipped than ever before. The managed services software used today allows providers to

  • Be alerted for every symptom or risk that occurs as it happens
  • Be alerted when anything of importance needs to be addressed

Support services today need to oversee increasingly complex IT environments and be quick to move on everything that takes place. If you fall behind in any area – backups, patches, outages, problems or security issues – it can quickly have a negative impact in all areas of business, including your customer service relationships and ultimately your bottom line.

Businesses today can no longer afford a “break-fix” mentality. A broken system can quickly bring your world to a crashing halt. You simply no longer have time for this.

One of the biggest benefits of managed services is discovering and fixing symptoms long before they have the opportunity to become problems. A well-maintained computer network will always run better than the alternative. A proactive 24-hour monitored system will help you reduce cost and increase operating efficiencies right from the beginning.

Is your network running as efficiently as it could?