Tips on how to reduce your exposure to business crime


Phil Bower TV-Bay Magazine
Read ezine online

Business Crime is growing in popularity and is cunning, smart, and very convincing. It is being spurred on by the very technology that is supposed to help media and other businesses improve performance. One of the trending frauds is 'Social Engineering' where criminals can make use technology, and trickery to exploite our human nature. Here we outline 2 true stories from clients of Sutton Winson and provide some useful tips on managing your risks:

1. The CEO's email account was hacked and his style of writing well studied. When the CEO was out of the office the Hacker sent an email from the CEO's Outlook, to the Finance Controller requesting that £64,000 be transferred as a deposit to a new supplier with whom the CEO had just struck fantastic deal. The email was convincing, except for one word "Thanks"..it was not in the CEO vocabulary and caused the FC to be suspicious

2. On a warm Friday afternoon, the Accounts Department received a call from the Chairman. He was put through to John, a new and relatively junior employee. The voice on the phone was quite abrupt and when the Chairman introduced himself, John was excited but nervous at the same time. It was a convincing impression as John had seen the company's introductory video when he joined. John was asked to transfer £89,000 to a 'new subsidiary' account and when the fraud was discovered the next day it was too late - the transaction could not be refunded.

Incidents of crime often have other unintended consequences and for one of our clients they were unable to pay their end of month salaries to their employees.

Identifying and Managing your Risk

Human hackers use different strategies:

Impersonation/pretexting: sounding like persons of authority, or a fellow employee, IT representative, or vendor all trying to gather confidential / sensitive information.

Phishing/spamming/spearphishing: sending emails that contain malware software designed to compromise computer systems or capture personal and private credentials.

IVR/Phone phishing (AKA 'vishing'): replicates legitimate sounding message that appears to come from a bank or other financial institution directing the recipient to "verify" confidential information.

Trash cover/forensic recovery: collecting information from discarded computer equipment and company documents that were not securely disposed.

Quid pro quo ("give and take"): random calls offering gift in exchange for a specific action or piece of information

Tailgating/direct access: an employee is followed entering their company premises

Diversion theft: misdirecting a vehicle and arranging for a package to be taken to another location to steal vital data such as account numbers, phone and client contact lists, but also other property such as keys, access cards.

The best defence against fraud is awareness through corporate culture, education and training. If you would like further information or guidance on how to manage risk, including the availability of specialised Insurance products, then please contact:


Tags: iss116 | business crime | social media | online crime | Phil Bower
Contributing Author Phil Bower

Read this article in the tv-bay digital magazine
Article Copyright tv-bay limited. All trademarks recognised.
Reproduction of the content strictly prohibited without written consent.

Related Interviews
  • Social Media Virtual Production Switching from Sony

    Social Media Virtual Production Switching from Sony

  • Movidiam at BVE 2015

    Movidiam at BVE 2015

  • Pixel Power Buzz at IBC 2014

    Pixel Power Buzz at IBC 2014

  • Ross Video at BVE 2014

    Ross Video at BVE 2014


Articles
NAB Intelligence
Bruce Devlin - new It's that time of year again. 06:30 on road bikes on the Las Vegas Strip with a merry bunch of folks who believe they look good in lycra. As we pedal West up the hill towards Red Rock there will be stories of the year just gone and questions about what to look for at the show. I, for one, will be attending the Devoncroft event to check up on who is spending what and where. I will then look forward to the topics that might be buzzing around the halls. I predict there will be many displays of Machine Learning hiding under the banner of Artificial Intelligence. Some of these will show better picture quality, others will show personalisation engines, some will be improved search tools and yet more will be synthesising pictures and motions to replace reality with and Artificial reality that's more compelling for the viewer.
Tags: iss136 | nab | class | ai | smpte | st2110 | imf | Bruce Devlin - new
Contributing Author Bruce Devlin - new Click to read or download PDF
TV Futures - The Shadowing Experience
Daniel Jones My name is Daniel Jones, and it is no accident that I’m currently studying BSc (Hons) Television and Broadcasting at the University of Portsmouth. Since completing GSCE media studies I have been constantly questioning what I watch with questions such as, “Wow, how was that filmed?” or “That looks amazing, I wonder how long that took?” It should come as no surprise that I made it a big focus of mine to get myself some real work experience to give myself some answers to these production questions.
Tags: iss136 | portsmouth university | runner | student | education | training | Daniel Jones
Contributing Author Daniel Jones Click to read or download PDF
4k and HDR Wireless Camera Transmitters
David Edwards Across the globe, live events represented over 50 percent of the most watched TV programs last year. However, big budget episodic shows are impacting live TV and the way viewers want to see their content. Viewers are demanding the same quality of production for live event broadcasts as they see in pre-recorded TV series and films. Producers of live content are looking to new, immersive and cinematic mobile camera views to better achieve these results. This presents a challenge to live production teams as these new camera views and angles must match the quality of the rest of the production -  the demand for mobility means that the cameras need to be wireless.
Tags: iss136 | wireless | hdr | 4k | transmitter | bandwidth | imt vislink | hcam | David Edwards
Contributing Author David Edwards Click to read or download PDF
BSC Expo 2019 Report
Paul MacKenzie BSC Expo returned to the Battersea Evolution on Friday February 1st and Saturday 2nd. It is a busy and friendly event though this year in need of some temperature control: exhibitors around the entrance area were uncomfortably aware of the wintry conditions outside and the main hall was in need of cooling.
Tags: iss136 | bsc | cinematography | canon | c700 | c200 | cartoni | holdan | blackmagic | peli | panasonic | sennheiser | sony | fs5 | teradek | viten | flowtech | Paul MacKenzie
Contributing Author Paul MacKenzie Click to read or download PDF
Preserving the British Film Institute Archive
David Feller Today, the media and entertainment industry faces numerous challenges. To remain successful and competitive, these organisations must be ever innovative, agile and cost efficient in the way they produce, store, manage and distribute their digital assets. Content creators have traditionally relied upon outdated storage models, comprised of legacy interfaces, file structures and historical proprietary storage management software that tend to be complex, cumbersome and expensive. This makes it difficult to forecast and budget for ever-growing content in the effort to reach viewers.
Tags: iss136 | bfi | archive | blackpearl | spectra | storage | film | tape | David Feller
Contributing Author David Feller Click to read or download PDF