[Author: Pratum, 05.2020 | Keywords: Cybersecurity, COVID-19] The Coronavirus has now reached every continent, except Antarctica. There are over 2.1 million cases worldwide, with 137,061 deaths reported at the time of this article being published. Like any major news event, cybercriminals are finding new ways to use the fear surrounding the infection to attack victims online. These are some of the top ways online criminals use Coronavirus in new attacks. Posing as Health Information One way cybercriminals capitalize on a crisis is by posing as large health organizations. One scam discovered recently was a phishing scam claiming to offer safety… Read More »
[Author: Pratum, 03.2020 | Keywords: Cyber Security, Information Security, Business Operations] When most people talk about developing an information security program, they are referring to the administrative, physical or technical controls used to protect information. While no information security program can be effective without them, there is one key element that is often underestimated: the employee. The reality is that employees are responsible for designing, implementing and following the controls put in place to protect sensitive information. One misstep by an employee can spell disaster in terms of information security and unfortunately, it often does. The good news is that… Read More »
[Source: Eric Stiles, Construction Equipment Distribution, 2014 | Keywords: Business, Operations, Identity Theft] A finance officer at a financial institution was let go due to poor performance. Before the employee had been terminated, the worker used the company’s computers to access customer account information such as names, social security numbers, driver’s license numbers, and home addresses. The employee used this information to open accounts and incurred unauthorized charges under the names of the individuals from whom he stole the personal information. The defendant made numerous purchases totaling over $50,000. (Source: U.S. Department of Justice, March 2013). Could this happen at your dealership?… Read More »
[Author: Eric Stiles/Source: Construction Equipment Distribution, 08.2014 | Keywords: Business, Operations, Identity Theft] A finance officer at a financial institution was let go due to poor performance. Before the employee had been terminated, the worker used the company’s computers to access customer account information such as names, social security numbers, driver’s license numbers, and home addresses. The employee used this information to open accounts and incurred unauthorized charges under the names of the individuals from whom he stole the personal information. The defendant made numerous purchases totaling over $50,000. (Source: U.S. Department of Justice, March 2013). Could this happen at your… Read More »
[Author: Tom Junge, Iowa Field Director, 2002; R-2013 | Keywords: Business, Operations, Advertising] Recently, a dealer showed me a letter he had received from the Better Business Bureau regarding an advertisement that he had placed in a newspaper. This ad promoted zero percent interest for two years on used combines. The letter from the Better Business Bureau stated that the dealer’s ad did not meet the guidelines for advertising credit financing. The dealer quickly responded to the Better Business Bureau that they would not run the ad as printed again. This dealer was unaware that he needed to disclose additional information in… Read More »
[2005; R-2013 | Keywords: Business, Operations, Consumer Information] In order to protect against the growing problem of “dumpster diving” and the resulting identity theft and other consumer fraud, all dealers will be required to properly dispose of certain consumer information they maintain or possess, including credit reports regarding individual customers, and even the results of background checks in connection with their hiring process. This new law, which is part of the federal Fair and Accurate Credit Transaction Act (“FACTA”), took effect June 1, 2005. “Consumer information” is defined broadly as “any record about an individual, whether in paper, electronic, or… Read More »