Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

Tuesday, March 20, 2012

10 Ways to Protect Yourself and Your Business from Fraud

As the old saying goes, “an ounce of prevention is worth a pound of cure.” This is true for keeping colds at bay and for preventing personal and business fraud. When you consider that most business fraud can be attributed to a lack of proper control over information and assets, then you can instantly see the importance of prevention. It doesn’t matter if you are a small business or a vast conglomerate; there is a demonstrable benefit to be found through being diligent in protecting yourself from fraudulent activities. The following are the top ten ways to protect yourself and your business from fraud.

1.      Upgrade Onsite Security: 

A thief who breaks into your company offices or warehouse could not only steal property but also valuable information. That information can include credit card account numbers, computer passwords and all other forms of sensitive information. Once those numbers are obtained, the criminal could go on a virtual buying spree before you can make it into work the next day. This is why upgrading your on site security in the form of proper locks, alarms and security gates are crucial for preventing theft.

2.      Properly Secure Business Records:

Even with the extra alarms, there might be personnel who will be tempted to access important business information. That is why it should always be kept under lock and key after business. While it is convenient to have a list of all your account passwords handy, you really want to make sure that “prying eyes” won’t get a peek.   

3.     Add Shredding To Your Routine:

A shrewd identity thief will know right where to find the information they need and it’s not always in your office, but in your dumpster. Any paper that is being thrown out with any kind of company information should be shredded first. This is especially true for a small business that might not have secure dumpsters.  

4.     Don’t Divulge Over the Phone:

The natural instinct for anyone answering a company phone inquiry is to be helpful and courteous. That “help” might extend too far towards a potential identity thief who is trolling for information through a random “customer” call. Unless you initiate a call, don’t give out any vital company information over the phone to a stranger. 

5.      Lock Down Your Computers:

You might think it is easy to keep track of people who come through your office on a regular basis. However, when you consider all the messengers, delivery men, service technicians, sales persons and custodians you can see that the stream of outside workers, even in a small business, can be enormous. This is why your computers should have password protection. They should also be shut down when you are away from your desk.

6.      Install Computer Firewalls:

The protection from your computer needs to extend throughout the internet through updated firewall security measures. You need to protect your network systems from potential hackers who troll for businesses to steal from. If you have an IT professional who takes care of your IT network and systems, ask them for their recommendations. 

7.      Establish Strong Anti-Fraud Policies:

Your employees are going to be your best line of defense to prevent fraud. However, they can also become your weakest link. This is why you need to establish clear policies with regard to sharing company information. A rep from your company shouldn’t be out in the world broadcasting sensitive information. It could be unintentional, but that won’t matter if a fraud occurs from using this information.

8.      Set Up a Fraud Hotline:

Sometimes an employee could witness an act of fraud but they don’t want to directly report this incident to a manager. Setting up a fraud hotline or email address can provide staff members with the opportunity to share any knowledge of fraud. This type of hotline also tells anyone who might be thinking about a fraud scheme that they are being watched by their co-workers.

9.      Take Immediate Action:

The moment there is a report of a suspected fraud incident you should begin a thorough investigation. By taking immediate action you’ll let your staff know this type of behavior won’t be tolerated.

10.  Sever Ties With Ex-Employees:

When renting a new apartment, you should request that new locks be installed. This is also a smart policy with regard to ex-employees, especially those who were fired under undesirable circumstances. You need to make sure any previous access these employees had to sensitive information be changed. This could be swapping out passwords, canceling company credit cards and yes, in extreme cases, changing the locks.

Wednesday, November 11, 2009

Who Wants to be a Techie?

Remember the days when the computer technician worked almost around the clock to keep the system up and running, or develop that new program that would save the company? It would appear that the classic techie image is not what one might imagine. Several studies have been conducted recently and the world of IT employees has changed dramatically over the last decade.
 

     Recent industry figures indicate that 420,000 Canadians are employed in technology, nearly half of them in Ontario. The tech personnel divide into two basic categories – development and support. The development professionals, who comprise a small percentage of the field, do work incredibly long hours in order to perfect their products and get them out in the market as soon as possible. Product competition is fierce and time is of the essence. Most techies, though, work in support positions and the vast majority is employed at non-tech companies. Studies show that most of these techies work, at most, a 40 hour work week and barely 10% of them work overtime hours. No more is required. A company's IT department is no longer the mysterious room hidden in the sub-basement of the building. It is a regular functioning department of most companies, solving problems and providing services, as do other departments.
 

     As companies continually seek the youngest and brightest stars of the IT world, the question arises as to aging employees. A young employee may be computer savvy but lacks the management skills to run a department or complex system. Most IT managers come from within the ranks of the tech staff. In fact, most overtime hours are logged by older IT management staff. Generally, they help out on the technical side by day and complete their administrative tasks after hours. The higher you go, the harder you work. A far cry from days gone by when everyone went home after dark.

Incorporate in Canada with CorporationCentre.ca
Click. You're incorporated ®