Tips on how to reduce your exposure to business crime


Phil Bower TV-Bay Magazine
Read ezine online

Business Crime is growing in popularity and is cunning, smart, and very convincing. It is being spurred on by the very technology that is supposed to help media and other businesses improve performance. One of the trending frauds is 'Social Engineering' where criminals can make use technology, and trickery to exploite our human nature. Here we outline 2 true stories from clients of Sutton Winson and provide some useful tips on managing your risks:

1. The CEO's email account was hacked and his style of writing well studied. When the CEO was out of the office the Hacker sent an email from the CEO's Outlook, to the Finance Controller requesting that £64,000 be transferred as a deposit to a new supplier with whom the CEO had just struck fantastic deal. The email was convincing, except for one word "Thanks"..it was not in the CEO vocabulary and caused the FC to be suspicious

2. On a warm Friday afternoon, the Accounts Department received a call from the Chairman. He was put through to John, a new and relatively junior employee. The voice on the phone was quite abrupt and when the Chairman introduced himself, John was excited but nervous at the same time. It was a convincing impression as John had seen the company's introductory video when he joined. John was asked to transfer £89,000 to a 'new subsidiary' account and when the fraud was discovered the next day it was too late - the transaction could not be refunded.

Incidents of crime often have other unintended consequences and for one of our clients they were unable to pay their end of month salaries to their employees.

Identifying and Managing your Risk

Human hackers use different strategies:

Impersonation/pretexting: sounding like persons of authority, or a fellow employee, IT representative, or vendor all trying to gather confidential / sensitive information.

Phishing/spamming/spearphishing: sending emails that contain malware software designed to compromise computer systems or capture personal and private credentials.

IVR/Phone phishing (AKA 'vishing'): replicates legitimate sounding message that appears to come from a bank or other financial institution directing the recipient to "verify" confidential information.

Trash cover/forensic recovery: collecting information from discarded computer equipment and company documents that were not securely disposed.

Quid pro quo ("give and take"): random calls offering gift in exchange for a specific action or piece of information

Tailgating/direct access: an employee is followed entering their company premises

Diversion theft: misdirecting a vehicle and arranging for a package to be taken to another location to steal vital data such as account numbers, phone and client contact lists, but also other property such as keys, access cards.

The best defence against fraud is awareness through corporate culture, education and training. If you would like further information or guidance on how to manage risk, including the availability of specialised Insurance products, then please contact:


Tags: iss116 | business crime | social media | online crime | Phil Bower
Contributing Author Phil Bower

Read this article in the tv-bay digital magazine
Article Copyright tv-bay limited. All trademarks recognised.
Reproduction of the content strictly prohibited without written consent.

Related Interviews
  • Social Media Virtual Production Switching from Sony

    Social Media Virtual Production Switching from Sony

  • Movidiam at BVE 2015

    Movidiam at BVE 2015

  • Pixel Power Buzz at IBC 2014

    Pixel Power Buzz at IBC 2014

  • Ross Video at BVE 2014

    Ross Video at BVE 2014


Articles
Shedding Light on the Blackmagic Pocket Cinema Camera 4k BMCPP4K
Garth de Bruno Austin “What is it about light that has us craving it?” Is the question asked in the opening seconds of Garth de Bruno Austin’s latest short, The Colour of Light. Exploring this natural, human need as well as our innate desire to control it, Garth’s film showcases everyday people going about their lives in differing degrees of luminance, whether that be an artificial streetlight or a natural morning sunrise.
Tags: iss134 | blackmagic | cinema camera | 4k | cpp4k | Garth de Bruno Austin
Contributing Author Garth de Bruno Austin Click to read or download PDF
Using Wireless Transmission
Jeremy Benning Wireless acquisition is a staple of live sports, entertainment and reality shows where cable free capture permits shots not previously possible, for health and safety reasons, and gives the camera-operator greater artistic licence to roam. The same is increasingly true of narrative drama where cinematographers are keen to work handheld or Steadicam where that helps tell the story. Any equipment which frees their movement and time by being lighter, easier to use and reliable in performance is going to tick a lot of boxes.
Tags: iss134 | wireless | 4k | transmission | Jeremy Benning
Contributing Author Jeremy Benning Click to read or download PDF
Accelerated Workflows with eGPU
Mike Griggs From the UK’s National Trust to magazine publishers to manufacturers, digital content creator Mike Griggs has a wide and varied portfolio of clients for whom he creates 3D art, motion graphics and multimedia exhibits. A typical day might involve sampling birdsong near Virginia Woolf’s country estate or creating 3D animations for VR. To keep on top of these demands, Griggs wanted to take the full power of the GPU computing revolution on the road.
Tags: iss134 | sonnet | egpu | amd | post production | editing | Mike Griggs
Contributing Author Mike Griggs Click to read or download PDF
An Obituary to Timecode
Bruce Devlin - new A stoic and persistent character that stubbornly refused to change with the times, Timecode has finally passed on, but no-one has noticed. A long-lasting industry veteran, Timecode was brought into this world at an uncertain date in the late 1960s due to the needs of analogue tape workflows and the demand for synchronisation between audio and video devices. A joint activity between SMPTE and the EBU led to the work on Time and Control codes starting its journey to standardisation in the early 1970s.
Tags: iss134 | timecode | smpte | ebu | edit | Bruce Devlin - new
Contributing Author Bruce Devlin - new Click to read
The Wireless Way to 4k
JP Delport DTC’s AEON group of products have been specifically designed for the 4K market. We encode with the more efficient HEVC algorithm, which means we are taking a 12G signal and compressing it to a bitrate that can be managed over an RF link. So what makes this a leading idea in the 4K revolution?
Tags: iss134 | wireless | 4k | transmission | JP Delport
Contributing Author JP Delport Click to read or download PDF