Tag Archives: pc monitoring

Corporate security rules

 

infedelta_aziendale_slider

According to a survey conducted by ACFE – Association of Certified Fraud Examiners – every year companies lose over 5% of their profits due to theft and other crimes realized by employees. The potential damage was estimated at global level, in three billion dollars. Frauds by employees affect all companies, small, medium and large.

They have causes, methods and impact very different, but have a common denominator: on the one hand, the lack of knowledge of the risks and internal vulnerabilities and, at the other hand, the inability to prevent and manage employees infidelity. It’s a complex problem and an ever-changing phenomenon. The studies, carried out are still limited, but the scenario that they show is quite clear: companies bear the economic risks, direct or indirect, caused by their employees, at all levels of the hierarchy. But, are often the same companies to provide opportunities for the realization of abuses and violations.

On average, companies employ about 18 months to intercept fraud and more long is  the time of detection, greater is the damage and the impact on the business environment. Currently, the most popular way to become aware of the existence of domestic abuse is the “whisper”. Another employee acts as a “spy” about an unlawful. In 30% of cases, the managers can be peaceful carrying out constant monitoring activities through appropriate tools. In fact, almost always, the cause of these events is to be found in the total absence of anti-fraud policies and, when these are present, they’re inadequate. Only those who rely on professional in security and surveillance field are able to actually prevent fraud of any kind.

Regardless of the numbers, what it’s important emphasized is the resignation that companies seem to have against the risk of fraud; in other words, companies try to hide their inability to limit employee dishonesty behind a kind of tacit tolerance. This threshold moves ever forward, year after year, and beyond this threshold there isn’t almost never an efficiently and effectively plan against fraud. Building and, above all, implement an anti fraud strategy within the company, isn’t difficult and, however, one cannot do without.

Advertisements

Rachel: history of cyberbullying

cyberbullyRachel’s mother had tried to take off her cell phone. She had also closed her Facebook profile and had changed her school. She understood that there was something wrong. But she had no idea that her daughter, a girl of 12 years old, had become the target of a group of cyberbullies. She couldn’t imagine that every day on her pc arrived terrible messages; the kindest was “You must die”.

So when Rachel decided to don’t go out more from the house and don’t open her mouth, her parents didn’t know what to do. Surfing the web and reading the comments of other parents about similar stories, they realized that it could be cyberbullying. They searched for a solution. They found it, answering to the technology with technology. They contacted Endoacustica Europe, leader company in security and surveillance field, and they bought small tools that, connected to the pc, have allowed them to discover everything that was happening, passwords, typed text, chat…What Rachel’s parents were found blackmail, harassment, photos stolen and then made ​​public, insults and hatespeech, anonymous message that no one can trace.

These phenomena to date have concerned mostly United States and UK. But it also happens in every part in the world. A few days ago a group of boys in Bologna (Italy) used the social network Ask.fm to organize a mega fight. Through the same social, Hannah, a teenager from Leicestershire, received hundreds of messages every day in which she was invited to commit suicide. Hannah hanged herself in the bathroom, while the parents were down in the living room. She was a member of Ask.fm because she wanted to be popular. Then she said no to a boy and the trolls, the provocateurs of the network, became crazies. “Why do not you drink bleach so you die?”. They wrote. And for Hannah they weren’t just words.

The buttons for the reporting of abuses introduced by Ask.fm and by Twitter, after the controversy in the newspapers,  aren’t useful . And also are useless petitions, such as the one carried out by the father of Hannah who asked the Ask.fm closure. If you close it, tomorrow is born another. And you can not even pretend to delegate the safety of adolescents with policies of enrollment. So parents have just a road. Be careful. Check what happens when the kids are using the PC or smartphone and other devices. There are tools to enhance the safety of their children and they are also very reliable.