Tips on how to reduce your exposure to business crime


Phil Bower TV-Bay Magazine
Read ezine online

Business Crime is growing in popularity and is cunning, smart, and very convincing. It is being spurred on by the very technology that is supposed to help media and other businesses improve performance. One of the trending frauds is 'Social Engineering' where criminals can make use technology, and trickery to exploite our human nature. Here we outline 2 true stories from clients of Sutton Winson and provide some useful tips on managing your risks:

1. The CEO's email account was hacked and his style of writing well studied. When the CEO was out of the office the Hacker sent an email from the CEO's Outlook, to the Finance Controller requesting that £64,000 be transferred as a deposit to a new supplier with whom the CEO had just struck fantastic deal. The email was convincing, except for one word "Thanks"..it was not in the CEO vocabulary and caused the FC to be suspicious

2. On a warm Friday afternoon, the Accounts Department received a call from the Chairman. He was put through to John, a new and relatively junior employee. The voice on the phone was quite abrupt and when the Chairman introduced himself, John was excited but nervous at the same time. It was a convincing impression as John had seen the company's introductory video when he joined. John was asked to transfer £89,000 to a 'new subsidiary' account and when the fraud was discovered the next day it was too late - the transaction could not be refunded.

Incidents of crime often have other unintended consequences and for one of our clients they were unable to pay their end of month salaries to their employees.

Identifying and Managing your Risk

Human hackers use different strategies:

Impersonation/pretexting: sounding like persons of authority, or a fellow employee, IT representative, or vendor all trying to gather confidential / sensitive information.

Phishing/spamming/spearphishing: sending emails that contain malware software designed to compromise computer systems or capture personal and private credentials.

IVR/Phone phishing (AKA 'vishing'): replicates legitimate sounding message that appears to come from a bank or other financial institution directing the recipient to "verify" confidential information.

Trash cover/forensic recovery: collecting information from discarded computer equipment and company documents that were not securely disposed.

Quid pro quo ("give and take"): random calls offering gift in exchange for a specific action or piece of information

Tailgating/direct access: an employee is followed entering their company premises

Diversion theft: misdirecting a vehicle and arranging for a package to be taken to another location to steal vital data such as account numbers, phone and client contact lists, but also other property such as keys, access cards.

The best defence against fraud is awareness through corporate culture, education and training. If you would like further information or guidance on how to manage risk, including the availability of specialised Insurance products, then please contact:


Tags: iss116 | business crime | social media | online crime | Phil Bower
Contributing Author Phil Bower

Read this article in the tv-bay digital magazine
Article Copyright tv-bay limited. All trademarks recognised.
Reproduction of the content strictly prohibited without written consent.

Related Interviews
  • Creating Broadcast Quality Live Streams for Social Media

    Creating Broadcast Quality Live Streams for Social Media

  • Mediaproxy MediaPlayer publishing to Social media SDI, 2110, 2022-6 and NDI at IBC 2019

    Mediaproxy MediaPlayer publishing to Social media SDI, 2110, 2022-6 and NDI at IBC 2019

  • Social Media Virtual Production Switching from Sony

    Social Media Virtual Production Switching from Sony

  • Movidiam at BVE 2015

    Movidiam at BVE 2015

  • Pixel Power Buzz at IBC 2014

    Pixel Power Buzz at IBC 2014

  • Ross Video at BVE 2014

    Ross Video at BVE 2014


Articles
Cloud integration: The only way is up
Francois Vaillant

In 2017 we saw the introduction of SMPTE 2110 and since then, the transition to IP has emerged as a priority for broadcasters looking to streamline their operations, decrease their footprint and effectively integrate with an industry in a rapid state of flux. A 2020 survey by Devoncroft found that almost 20% of broadcasters had already deployed SMPTE 2110, and over 25% were planning to do so. Then came the pandemic, precipitating the need for on-the-fly collaboration and accelerating the transition to remote, virtual and cloud production.

Tags: dejero | smpte 2110 | dazzl | streaming | Francois Vaillant
Contributing Author Francois Vaillant Click to read
The Cloud - a measured approach
Ciaran Doran

With the buzz of ‘cloud’ everywhere in our industry it would be natural to think that cloud is the only game in town. Isn’t it time to step back and consider very carefully how, or whether, you make that journey to the cloud?

Tags: cloud | rohde and schwarz | rohde | schwarz | Ciaran Doran
Contributing Author Ciaran Doran Click to read
Meeting the specification
Chris Smeeton

A good technical specification will detail precisely what is required, from the equipment to the cables connecting it. Many specifications will give  particular manufacturers and model numbers. On many occasions, this makes tendering simple and gives vendors a secure and fair way to bid.

Tags: CPR specification | argosy cable | fire safe cable | eu standard cable | chris smeeton | Chris Smeeton
Contributing Author Chris Smeeton Click to read
Avid and Rohde & Schwarz
Ciaran Doran

Rohde & Schwarz is the perfect ingest partner to build flexible workflows with Avid.

Tags: Rohde and Schwarz | avid | spycernode | editing | asset management | venice | Ciaran Doran
Contributing Author Ciaran Doran Click to read
Sennheiser MKE 400 hands on review and test
KitPlus

Sennheiser have just released two products aimed at simplifying audio on the move, the MKE400 shotgun microphone and the XS Lav Mic, in this review we’re looking at the MKE400.

Tags: sennheiser mke400 | sennheiser mke 400 | sennheiser mke 400 quality | best microphones for youtube | mic for youtube videos | sennheiser mke 400 hands on | microphone review | iphone videography | microphones | sound for video | camera microphone | microphone for iphone | microphone for youtube | video microphone | shotgun mics | smartphone microphone | vlogging mic | best microphone for video | shotgun microphone review | mke 400 | sennheiser mke 400 hands on review | sennheiser mke 400 test | KitPlus
Contributing Author KitPlus Click to read