Common Security Dos and Don’ts

internet screen security protection

Photo by Pixabay on Pexels.com

Security vulnerabilities pose a major threat to organizations. Breaches can be costly both in terms of finances and reputation. So what are some ways that businesses can take initiative in protecting themselves against some of the most common security threats?

Do screen job applicants and third parties

Comprehensive background checks and due diligence are extremely important to getting the whole picture of an applicant or a third-party business relationship. Without going through this process, you expose your business to countless threats.

Typical background checks may verify an applicant’s residence and professional history, where a comprehensive investigation including social media can identify more subtle connections that would alter the risk recommendation. If your business does not have the resources to do this on its own, we can help you with our team of professional investigators. Don’t hesitate to reach out!

For more on this subject, be sure to read our article on The Significance of Background Checks in Business.

Do come up with a robust security policy

Your organization’s security policy should cover procedures for preventing, detecting, and acting upon misuse, as well as guidelines for conducting due diligence. These should be crafted with a plan for investigating insider breaches as well.

A good security policy also contains risk management processes. Check out our guide here on the basics of forming a risk management plan.

Don’t overlook the threat of malicious emails

Your organization might go to extremes to secure their email system, and yet it remains one of the most vulnerable links in the chain. All it takes is for one person to inadvertently click on an malicious link or attachment to infect all the computers in the office.

A good rule of thumb is to never open a link or attachment if you don’t recognize the sender, and ensure that your employees are trained in recognizing this type of scamming/phishing behaviour. For help in training your employees on this, don’t hesitate to reach out to our cyber security team.

For more content like this, subscribe to our blog for regular updates in the security industry. If you have any questions or comments, feel free to reach out to us on Twitter @CentryLTD

Centry Opens New Office in Mexico City!

el-angel-de-independencia--mexican-landmark-552812595-59863bb2519de2001116a0d0

We are pleased to announce the expansion of Centry Global to Mexico!

Our new office is now open, located on the 17th Floor Torre Magenta, Paseo de la Reforma 284, Colonia Juarez, Distrito Federal, Mexico CP 06600.

new office.PNG

As an international security company, our work takes us across the world. With the opening of this office, we are now able to better serve our clients in the region.

At Centry, our focus is to develop long-term, communicative working relationships to provide you with the best resolutions to your security challenges. While our combined expertise primarily revolves around security and risk management, you will find among our ranks professionals in corporate and private investigations, fraud control, and experts in programming, software development, and more.

We look forward to meeting and working with more clients across Mexico. Please don’t hesitate to contact us!

📧 info@centry.global 📱 +52 55 4739 2665

 

Typosquatters

Man typing

Of all the myriad of ways that we can be duped, scammed, or otherwise taken advantage of on the internet, “typosquatting” remains one of the easiest to stumble into.

Perpetrators of this scam will purchase site domain names that are very similar to popular pages that people visit, usually by changing the .com part of the web address to .cm. This preys on people who make typos, which is, suffice to say it – all of us.

These duped sites can range from being pop-up laden cesspools riddled with viruses or malware, to near-replicas designed to fool users into inputting login information that can be manipulated later.

So, who is doing this? While these types of tricks can occasionally be tied down to lone actors (given how easy it is to obtain a domain name), KrebsOnSecurity identified the marketing firm Media Breakaway LLC to be behind more than 1500 of these false .cm domains. The company is headed by one Scott Richter – a convicted felon who has been the target of several successful lawsuits for illegal spamming. Other companies related to Richter include Dynamic Dolphin and affiliate[dot]com, also related to email spam.

Just how many people are falling victim to these scams? More than 12 million in a 3 month time frame – amounting to a potential of 50 million per year, according to an analysis conducted by Matthew Chambers. Several of these visitors additionally were found to be coming from .gov and .mil sites in the USA, which are the official federal government and military domains. Many popular news sites, social media, banking, and music streaming sites have these malicious doppelgangers.

The actionable item to protect yourself in this situation ultimately boils down to a matter of double-checking the web address before you hit enter, or bookmark your most commonly visited sites.

For more information on this subject, feel free to reach out to us @CentryLTD on Twitter or any of our other social platforms.

GDPR: Day One

The European Union’s General Data Protection Regulation (GDPR) officially went into effect today. The new regulation exists to give citizens of the EU control over how their data is used. It’s extensive and comes with the promise of harsh fines if non-compliant companies experience a data breach.

Centry’s GDPR Guide, shown on the popular webcast This Week in Law, breaks down the who/what/when/where and why of GDPR for those who want a quick briefing of what this means and why it’s important.

Now, on day one, we are observing the first ripples in the pond of this new policy. Already, BBC has reported that some US-based news websites are unavailable in Europe as the new regulations have come into effect. Some of these include the New York Daily News, LA Times, Chicago Tribune, Orlando Sentinel, and Baltimore Sun.

The above news sites are part of the Tronc media publishing group. Others under Lee Enterprises have been similarly affected. Freelance developer Owen Williams created a blog called GDPR Hall of Shame to provide a tongue-in-cheek illustration of the blunders some companies have made as they have taken the first steps of navigating the ruling.

One of the worst offenders is the social media/micro-blogging platform Tumblr, which requires users to manually deselect more than 300 boxes to prevent each entity from utilizing their data. There is no available option currently for mass selection.

Others are taking the change to data regulation in full stride. Microsoft has expanded their GDPR-compliant policy to protect all of their users, not just the ones based out of the EU.

If you have any questions or comments about GDPR, feel free to contact us on any of our social platforms!

For more content like this, subscribe to Centry Blog for weekly updates related to the security industry, cyber security, risk management, compliance, and global affairs.

Social Networks & Data Protection Policies

tree-200795_1920

In preparation for GDPR, a comprehensive EU data protection law, a few big-name social media companies have taken the time to review their privacy policies, making it easier for users to know where and how their information is being used.

Facebook has made some changes to its privacy settings in light of the Cambridge Analytica scandal and Mr. Zuckerberg’s congressional hearings. While it is not changing the information that the company collects from its users, it is making strides toward greater transparency on what that information is and how that is shared. It created a central hub with a more user-friendly interface to enable people to more easily see what data they are sharing and who can see it.

Additionally, the social network will make it easier for users to see all the data that the company has on them – previously, this could be accessed by a massive data dump download, however the new Access Your Information tool allows individuals to explore the information by category.

Twitter updated their privacy policy, sending out emails to their users with information on some of their key revisions. These include more focus on the controls that they offer users over their personal data, more focus on how Twitter shares public data, more transparency and control over how the data is shared with business partners. Furthermore, there is more clarity about how data may be shared to prevent harm, comply with the law, or serve public interest.

LinkedIn has adapted its policy to enable members to download their personal data, and it has followed up on GDPR’s right to erasure, by clarifying that personal data such as audience email addresses will be automatically deleted within a 90 day time frame if it is not edited or being used in active campaigns.

If you are active on any social media networks, be sure to take a proactive approach and review your privacy settings, as well as the availability of your personal data.

This article was written by Kristina Weber at Centry Ltd. For more content like this, subscribe to Centry Blog and follow us on Twitter @CentryLTD!

Human Trafficking in the European Union

The European Union regards human trafficking as one of the most heinous violations against human rights. Efforts to address this complex issue have been a primary focus for EU strategies on national and international levels.

Among other findings in a country-by-country statistical analysis on human trafficking in the period of 2010-2012, Eurostat reported in 2015 that 80% of the registered victims were female, more than 1,000 children were trafficked, and over 70% of traffickers were male. It should be noted that not all 28 EU Member States were able to provide data, and the statistics are based on the small amount of information available from registered sources. As a result, there is certainly more that goes on undocumented.

However, one particular finding noted that among non-EU states, Nigeria was over-represented

in both the statistics of both victims and traffickers. In the 3-year course of the study, it was found that of the registered victims with non-EU citizenships, there were 1,322 registered victims from Nigeria, as compared to the next highest non-EU state, Brazil, with 537 registered victims. The most frequently reported non-EU citizenship of suspected traffickers over the course of the reference period was also Nigeria, with 299 individuals.

The International Response

The U.S. Department of State has classified Nigeria’s human trafficking narrative as Tier 2: Watchlist on a scale of 1-3 in their 2017 human trafficking report. This means that the government of Nigeria does not fully meet the minimum standards for elimination of trafficking. There are challenges present where some elements of Nigerian Security Forces (NSF) were found to have used children as young as 12 in support roles, and the Nigerian military conducted on-the-ground coordination with the CJTF, which includes non-governmental militias that recruit and use children in support roles, and possibly unwillingly. Furthermore, government officials were found to be involved in sexual exploitation of Borno State women and girls that were displaced by Boko Haram.

That said, Nigeria is making a significant effort to improve. Efforts to investigate, prosecute, and convict traffickers in Nigeria are remarkable, as well as conducting anti-trafficking training for law enforcement officials, however the growth is slow-going, with limited increases in efforts compared to the previous reporting period.

1

Picture 1. NAPTIP & Finland sign MoU to collaborate in curbing trafficking in 2017 (Accessed March 2018)

One such anti-trafficking organization in Nigeria is the National Agency for the Prohibition of Trafficking in Persons (NAPTIP), which recently made headlines when Europol put out a statement detailing how Spanish police forces in cooperation with NAPTIP and UK’s National Crime Agency (NCA) dismantled a Nigerian organized crime ring that had trafficked victims to Europe through Libya and Italy. Among their efforts was a block on bank accounts that laundered more than 300k euros for the crime ring, leading to 89 arrests and the liberation of 39 victims.

The crime network was found to be connected to the Eiye Confraternity (Air Lords), one the most influential campus cult originated gangs in Nigeria. It operates in clandestine groups worldwide, funding the confraternity in Nigeria through both legal and illegal activities.

Campus Cults in Nigeria

Campus cults represent a widespread gang and organized crime problem in Nigeria, as many post-secondary institutions have confraternities. The majority of these cult groups are involved in organized crime.  Recruitment is sometimes involuntary, and the initiation rites involve assault to varying degrees. Some of the cults operate their business with a secret membership model and some of them dominate streets openly. At peak, tens of murders have been connected monthly to confraternity related violence. The Nigerian democracy is relative new, and amongst the former and current cult members are local politicians and other influential members of society. According to some sources, politicians have been known to have used the gangs as their private armies, and the cults have had active roles in the nation’s internal conflicts.

The Eiye Confraternity is very active in social media, utilizing it to give voice to their opinions and in fact openly using platforms such as Facebook and WhatsApp for coordination purposes.

2

Picture 2. Screenshot of a FB page voicing support for EIYE confraternity (Accessed Mar 2018)

Global Business Response

To address the crime of human trafficking, companies have been complementing their due diligence processes with human rights impact assessments and taking relevant related risks in consideration for their existing assessments and processes. This is typically done in compliance with international guidelines such as the United Nations’ Guiding Principles for Business and Human Rights via implementing the “Protect, Respect, and Remedy” Framework. However, new national-level legislations, such as the French Corporate Duty of Vigilance Law, are starting to make human rights duty of care a mandatory compliance for global supply chains. With regard to the issue at hand, global enterprises will be duty-bound to do whatever is in their power to ensure their supply chain isn’t exploited for human trafficking purposes.

This article was written by Investigator Oskar Savolainen and Content Supervisor Kristina Weber of Centry Global. For any questions or comments on the above material, please feel free to contact us @CentryLTD on Twitter or on any of our other social media platforms!

 

GDPR & Consent

GDPR and Consent (1)

The deadline for compliance with the General Data Protection Regulation (GDPR) is approaching fast: May 25th, 2018 is when enforcement will begin.

Be sure to read Centry’s GDPR Guide for a concise, easy-to-read breakdown of what GDPR is and important details of what you need to know about it.

For any questions or comments, feel free to contact us at info@centry.global or on any of our social media outlets. We’re here to help you!