Latest "Fraud Detection & Prevention" Posts

Social Engineering: Scams that play on your Human Emotion

If it seems too good to be true, it probably is. Picture 12

That is the best way to Think Like A Spy and be alert of Social Engineers that are trying to manipulate you.  With such a gloomy economy and many people without work, offers for fast cash and huge discounts become more and more attractive. Most of these Identity Theft cases use the technique of Social Engineering.

Social Engineering is the act of manipulating people into performing actions or divulging confidential information by playing on their human emotions. The term typically applies to deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. These days most thieves can nab your identity over the phone, mail, email, and through social networking sites such as Facebook and Twitter.

Posted in Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , ,

Protect Yourself Against Mail Fraud

Picture 5The reality is that unsecured, curbside mailboxes are prime targets for people who are intent on committing the crime of identity theft. Although I would suggest to stop using the mail to send and receive identity documents, this is not always possible. Therefore, here are alternative suggestions:

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Uncovering Business Identity Theft

While the majority of identity theft schemes prey upon individuals, small-businesses and organizations are increasingly becoming targets. Business identity theft is a serious threat, but it mostly flies under the radar simply because companies are embarrassed to discuss.

Although most companies are protected by copyright, patent and trademark laws, smaller companies lack the higher IT security measures that large companies have. According to recent studies by Javelin Strategy & Research this makes them 25% more likely to be victims of business identity theft over larger businesses.  Not only do small businesses and business owners typically have larger lines of credit open than an individual, but they are unlikely to detect the fraud for six to eight months making them a prime target.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , ,

Biometric Identity Theft: Stolen Fingerprints

Identity Theft is a huge and growing problem. According to the recent 2009 Identity Theft Fraud report by Javelin Strategy & Research, victims increased 22% in 2008 to 9.9 million. When businesses are involved, the companies face billions of dollars in theft, millions of dollars in fines and, perhaps most important, the loss of customer trust.

The large impact that identity theft has on individuals lives and corporations’ bottom lines has made inexpensive biometrics look attractive for authenticating employees, customers, citizens, students and any other people we want to recognize. The most recent debate is on whether the pros outweigh the cons. (To see some of the materials that influenced this article, please visit George Tillmann’s excellent article in Computerworld).

fingerprintBiometrics uses physical characteristics, such as fingerprints, DNA, or retinal patterns to positively verify individuals. These biological identifiers are electronically converted to a string of ones and zeros and stored on file in the authenticator database.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Meeting Planning Guide – 5 Ways to Create an Extraordinary Experience

meeting-planning-guideHaving a great meeting planning guide can be a great time saver when attempting to plan any sort of meeting/conference.

Meeting planners have more on their plates at one time than just about any profession I’ve experienced. Who else spends months anticipating every minute detail leading up to an event only to find out that their work has just begun? And to discover that many of the rules have changed mid-course?

Putting together a successful meeting can be a stressful endeavor, which is why I have put together a “best practices” meeting planning guide, with 5 important tips for planning an “out of this world” meeting. These tips are strategic in nature – how to move from organizing speakers to hiring speakers that rock.

This guide will help you find new and creative ways to engage your audience, and provide you tips for creating a conference/meeting participants will never forget.

Posted in Fraud Detection & Prevention by Identity Theft Speaker .
Tags: ,