Latest "Fraud Detection & Prevention" Posts

Dishonest Employees: How to Avoid Hiring Them

Dishonest Employees are a serious issue and common cause for corporate data breach. In this video, identity theft speaker and data theft expert John Sileo discusses several tools that will help you reduce the chances that you are hiring a data thief into your business. The Top 3 Tips for preventing the hire of dishonest employees are:

1. Insure that reference verification procedures are not just in place, but are actually taking place. The difference between a good policy and actual application is what separates best-in-class privacy cultures from those corporations that end up on the front page of the Wall Street Journal as the poster child for data breach.

2. Perform comprehensive background screening in both the hiring process and after the candidate has become an employee. Believe it or not, employees do commit crimes after they have already taken a job with you. If necessary, utilize a strong background screening service to help you flag dishonest candidates.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

Dishonest Employees: How to Avoid Hiring Them

Dishonest Employees are a serious issue and common cause for corporate data breach. In this video, identity theft speaker and data theft expert John Sileo discusses several tools that will help you reduce the chances that you are hiring a data thief into your business. The Top 3 Tips for preventing the hire of dishonest employees are:

1. Insure that reference verification procedures are not just in place, but are actually taking place. The difference between a good policy and actual application is what separates best-in-class privacy cultures from those corporations that end up on the front page of the Wall Street Journal as the poster child for data breach.

2. Perform comprehensive background screening in both the hiring process and after the candidate has become an employee. Believe it or not, employees do commit crimes after they have already taken a job with you. If necessary, utilize a strong background screening service to help you flag dishonest candidates.

Posted in Burning Questions (Video), Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , ,

Identity Theft of H&R Block Customers | Sileo Group

H&R Block identity theft

The number of identity theft victims rose 22% last year! Although it’s important to always protect your identity, tax season makes people more vulnerable to this crime and you should be especially cautious.

H&R Block identity Theft

A recent article in the New York Times uncovers an H&R Block office in the Bronx that was infiltrated by identity thieves (apparently it was not the only office affected).

Last year, Kevin Johns, a construction worker in the Bronx, did his taxes at the H&R Block store on Riverdale Avenue that he had used for the past 20 years or so. The next day, though, he got a call from the tax preparer: his return was rejected because he had already filed. Or at least, someone had filed in his name. That someone helped himself or herself to a $8,499 refund.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Top 5 Reasons Corporations Educate Employees on Identity Theft

image-8352
Why do corporations care (and spend money) to educate employees about protecting personal identity?

After all,  most businesses are profit-driven and only have time and resources to concentrate on initiatives that affect their bottom line. In effect, that is the answer to the question…

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , ,

New Item: Identity Theft Prevention and Recovery Workbook!

TLAS-Workbook

Identity Theft Prevention and Recovery Workbook

$10.95* (Including Shipping) – Click Here to Order!

Order your copy Today to get our special introductory pricing!

The #1 recommendation to prevent Identity Theft is Education. Know what to look for and the steps to take to fight Identity Theft. If you have been a victim, learn which steps to take and in what order to recover your Identity quickly, accurately and safely!

Identity Theft is on the rise and according to Javelin Strategy & Research there were a staggering 11.1 MILLION Identity Fraud victims in 2009 alone. The cost of this handbook is well worth the price of protecting your most valuable asset, your Identity!

This 20 page Workbook includes:

Part I – Prevention

This 10 phase process of Preventing Identity Theft Includes:

  • Protecting your credit.
  • Knowing what is in your wallet.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Fraud Training: Bored to Tears Yet?

Businesses often make fraud training boring! And that’s bad for their bottom line, because no one ends up remembering anything about the subject.

Too often, fraud and social engineering workshops cover just the concepts that define fraud rather than the feelings that signal it’s happening. The key to training your executives, employees and even customers on fraud is to let them experience what it feels like to be conned. In other words, they need to actually be socially engineered (manipulated into giving away their own private information) several times throughout the training so that they begin to reflexively sense fraud as it is happening. Like learning to throw a ball, there is no substitute for doing it for yourself. Fraud detection is similar; it takes actually doing it (or having it done to you) to fully understand the warning signs. Anything less will leave your audience yawning and uneducated.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , ,

Electronic Information Privacy – Securing Your Job: Part II

Picture 6As we discussed in Electronic Information Privacy – Securing Your Job Part I, if you are an employee at a corporation, association, university or small business, you must realize that protecting electronic information and organizational data is vital not only to your company’s profitability, but for your job security.

Here is a crash course on how to promote information security within your company. The most effective way to build a Culture of Privacy is to break it down into 3 simple steps (most corporations skip the first step, dooming them to failure):

1.    Motivate the Individual. Train yourself, your employees and executives on how to protect identity and company information first. Learning the basic principles of privacy at an individual level is a pre-requisite for all subsequent forms of data security, and supplies the necessary motivation to apply the same habits at work. Each employee needs to overcome their own apathy, ignorance and inaction before they are equipped to protect corporate assets.  By making it personal, your executives and employees are acquiring the building blocks necessary to construct a corporate Culture of Privacy. Electronic information privacy training is good for their wellness, and is a means to a safer and more profitable end.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , ,

Electronic Information Privacy – Securing Your Job: Part I

Picture 6Electronic information privacy will eventually be one of the criteria on your job performance review. In fact, it’s not just electronic data that you should be concerned about, but all data. If you are an employee or executive at a corporation, association, university or small business, you must realize that protecting organizational data is vital not only to your company’s profitability, but to your job security. If it isn’t right now, it will be soon.

As a company employee or business leader, it is essential that you clearly understand the relationship between identity theft, data breach and your bottom line.  One of the costliest data security mistakes I see executives make is that they initially approach data privacy from the perspective of the company. They don’t recognize the following reality: All privacy is personal. It’s not electronic information privacy. It’s not physical data privacy. It’s personal.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , ,

Fraud Training: Interrogate the Enemy

PMP-CoverDuring your fraud training exercises, fostering an attitude of curiosity (or in the corporate world, a culture of curiosity) is the most powerful critical thinking skill in your arsenal of tools to protect sensitive information. Employees who can think critically and ask the right questions regarding data privacy make up the fabric that supports a Culture of Privacy. Interrogation is the art of questioning someone thoroughly and assertively to verify intentions, identities and facts.

Questions: Who’s in Control? Can I Verify? What are my Options? What are the Benefits?

When spies need information, they ask for it. They “socially engineer” or con their victims with a variety of tools.

The primary tool for evaluating risk once your reflexes have been triggered (Hogwash) is to interrogate the person or institution asking for your information. Interrogation is not meant to be about forceful or physical questioning. I define interrogation as clear, aggressive questioning used to establish whom you can trust, how far you can trust them, and with what information.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,