Posts tagged "background screening"

Dishonest Employees: How to Avoid Hiring Them

Dishonest Employees are a serious issue and common cause for corporate data breach. In this video, identity theft speaker and data theft expert John Sileo discusses several tools that will help you reduce the chances that you are hiring a data thief into your business. The Top 3 Tips for preventing the hire of dishonest employees are:

1. Insure that reference verification procedures are not just in place, but are actually taking place. The difference between a good policy and actual application is what separates best-in-class privacy cultures from those corporations that end up on the front page of the Wall Street Journal as the poster child for data breach.

2. Perform comprehensive background screening in both the hiring process and after the candidate has become an employee. Believe it or not, employees do commit crimes after they have already taken a job with you. If necessary, utilize a strong background screening service to help you flag dishonest candidates.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

Dishonest Employees: How to Avoid Hiring Them

Dishonest Employees are a serious issue and common cause for corporate data breach. In this video, identity theft speaker and data theft expert John Sileo discusses several tools that will help you reduce the chances that you are hiring a data thief into your business. The Top 3 Tips for preventing the hire of dishonest employees are:

1. Insure that reference verification procedures are not just in place, but are actually taking place. The difference between a good policy and actual application is what separates best-in-class privacy cultures from those corporations that end up on the front page of the Wall Street Journal as the poster child for data breach.

2. Perform comprehensive background screening in both the hiring process and after the candidate has become an employee. Believe it or not, employees do commit crimes after they have already taken a job with you. If necessary, utilize a strong background screening service to help you flag dishonest candidates.

Posted in Burning Questions (Video), Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , ,

Employee Background Checks

CSIdentity Safe

CSIdentity SAFE

Great employees are hard to find, but without the right employee background screening process, deceitful candidates are even harder to spot. Hiring dishonest employees puts your sensitive and confidential business information at risk and could cost you millions if stolen or damaged.

According to The Ponemon Institute, an independent research foundation, the average cost of data breach to a victim corporation is $6.75 million. In 2008, the lowest reported cost of data breach was $613,000, while the highest was just under $32 million. Given that the average cost per stolen record is $202, one missing laptop with 2,500 customer or employee records on it would come with a data breach recovery bill for a half a million dollars. And that doesn’t factor in loss of stock value, brand damage or customer defection that results from having your breach in the news.

Posted in Product Reviews by Identity Theft Speaker .
Tags: , , , , , , , , , ,