Security Predictions for 2019

The predictions for 2018 that we shared last year seemed to land on the points of data protection and cyber security, while it strayed from others – most notably on the front of cryptocurrencies. BitCoin was a hot topic in 2017, surging to values that had people everywhere kicking themselves for not investing sooner. What unfolded after was an epidemic of articles predicting a global acceptance of cryptocurrencies. That balloon popped when the cryptocurrency market crashed in early 2018, and it seems that many have quietly reneged their cryptocurrency hype since.

Continuing the tradition, here are a few insights into the forecast for 2019:

Supply Chain Attacks. While these threats can occur in every sector of the economy as it pertains to supply chains, the industries that most commonly experience these attacks include pharmaceuticals, biotechnology, hospitality, entertainment, and media. Manufacturing operations are attractive targets to adversaries, due in part to having such a broad potential surface of attack. With increasing reliance on the supply chain, there is a wealth of information that could be obtained if organizations have not taken appropriate steps to secure themselves. For more information on cyber security in the supply chain, read our article here.

Further development of consumer privacy laws. Last year we saw the launch of the European Union’s GDPR, which marked the first big regulatory move toward protecting consumer information. Soon after, California passed a bill (Consumer Privacy Act of 2018) that seems to be the state’s version of GDPR – it is slated to go into effect at the end of 2019. A draft for a federal privacy bill for the United States may arrive early in 2019 after concerns over a number of privacy breaches.

Continuing adoption of artificial intelligence across wider society. From Alexa to politics, AI will continue to spread across industries and uses. Chinese companies have announced intentions to develop AI processing chips to avoid reliance on US-manufactured Intel and Nvidia. There is rising concern that AI technology could be increasingly used by authoritarian regimes for the purpose of restricting personal freedoms. As AI continues to spread its proverbial wings, we could see a move toward “transparent AI”, that is, an effort to gain consumer trust in the use of AI by being clear in how it uses human data and why. Of course there is always the worry that the rise of AI will create a jobless future for people, however Gartner suggests the opposite, that artificial intelligence will create more jobs than it will eliminate.

Big data breaches will push companies to tighten login security. We might see a concerted effort of the security industry to replace username/passwords altogether, pushing toward an alternative solution as an industry standard. Biometrics – for example facial recognition or fingerprint logins – are certainly on the rise.

Digital skimming will become more prevalent. The trick of card skimming has moved to the digital world, where attackers are going after websites that process payments. The growth of online shopping has made checkout pages attractive targets. British Airways and Ticketmaster were two high profile cases of this. The British Airways case was particularly alarming, as airlines in general have access to a wide breadth of information ranging from birthdates, passport details, payment information and more. Although the airline was able to confirm that no travel data was stolen in the attack, it nonetheless remains as a cautionary tale.

This article was written by Kristina Weber. For more content like this, be sure to subscribe to Centry Blog for bi-weekly articles related to the security industry. Follow us on Twitter @CentryLTD and @CentryCyber!

2018 Year in Review

As 2018 comes to a close, we reflect on those moments throughout the year that defined the times yet to come. For Centry, 2018 was a year that brought us great joys like the opening of our new branch in Mexico City and establishment of the ASIS Ukraine chapter, but also times of mourning after our colleague, Mr. Rachid Boukhari, passed away in June. Above all, it has been a journey, and one we are grateful to undertake for the mark we make on this world.

From our Centry family to yours, we wish our readers love and joy over the holidays, and a happy new year!

In keeping with the tradition of our year’s end articles on Centry Blog, we put together a list of some of our most-read stories from 2018 below.

January

Centry’s GDPR Guide

Our GDPR guide breaks down exactly what the EU’s General Data Protection Regulation was all about. This article was highlighted on TWiT live in an interview with our CTO Dave Ehman!

February

The Next Gold Rush: Renewable Energy

The Renewable Energy industry just might be the next gold rush for businesses and investors alike. This time, we aren’t hiking into the Klondike for gold; individuals and organizations alike are turning their eyes toward the broader world, looking out for opportunities to make good on this booming initiative.

March

Hidden Sanctions Risk: North Korean ties to Africa

The connection between Namibia and North Korea stands as but one example among many similar stories. It began in the 1960s, when several African countries started the struggle for independence from colonialism. During this vulnerable time period, North Korea invested time and money in these revolutions, where the political ties eventually grew into commercial relationships.

April

Human Trafficking in the European Union

Over the course of the past two decades, the European Union has been making an increased effort to understand and address the heinous crime of human trafficking. The most recent publication of statistics from Eurostat concerning registered victims and suspected traffickers revealed that a number of non-EU nationals are trafficked into member states, primarily from Nigeria.

This week’s article on Centry Blog examines just a facet of this deep and complex issue through analyzing Nigerian campus cults, the international response, and global business reponses.

May

Fake Social Media Profiles and What To Do If You Are Being Impersonated Online

False accounts are prevalent across social media, mainly used for phishing purposes. Whether it’s a bot or malicious actor threatening your account, we put together an instructional guide for those moments that you notice you have a seemingly second profile, not of your own making.

June

Supply Chain Security Introductory Guide

Having a secure logistics supply chain can save your company millions in terms of assets and reputation, and here at Centry, we have the know-how to help you. This article serves as an introductory guide to security in the supply chain.

July

Typosquatters

Sometimes fat-finger errors can lead to more than just an autocorrect goof. Some scammers have figured out how to lay traps surrounding these common mistakes.

August

Common Security Dos and Don’ts

Our article on Common Security Dos and Don’ts covers what you and your business can do to prevent costly breaches of data and trust.

September

Golden Visa for sale! Now on special offer for the 1%

In some countries, you can buy your way to citizenship. European passports and Schengen visas are the most desired traveling documents in the world. Not only do they grant the most traveling freedom, they give access to a safe and stable living environment, with free speech, in a market that can fulfill all your needs. Many EU countries have taken advantage of this by offering entry in exchange for investment. This kind of activity is commonly referred to as a Golden Visa Program.

October

5 Basic Digital Privacy Tips for the Average Person

Digital privacy is for everyone. But it’s also a massive topic that can be very easy to get lost in, especially if you’re new to to it. However, you don’t need to be a security expert nor do you need any particular reason to want to bolster your privacy on the internet.

November

What is Social Engineering?

Social engineering is a growing threat to individuals and businesses alike. In this article, we look into what social engineering is, the ways it can manifest, and what you can do to protect yourself.

December

Cyber Security in the Supply Chain

Your company might have a rigorous Cyber Security policy, and thorough training on all its personnel. But what happens when the security vulnerability comes from a trusted source in the Supply Chain?

Security professionals must now consider not only the possible vulnerabilities of their own network, but their supplier’s network, and their supplier’s supplier network, and so on.

We hope you have enjoyed Centry Blog this year. For more content like this, be sure to subscribe and follow us on Twitter @CentryLTD! We will see you in 2019!

Cyber Security in the Supply Chain

Cyber Security is generally accepted to encompass the protection of our interconnected information systems and assets including hardware, software, applications and data.  In that range of topics, one of the most important areas of concern for Cyber Security professionals is Vulnerability and Patch Management within the realm of Security Operations.

Vulnerability and Patch Management is the ongoing practice of ensuring that your systems and applications are kept up to date, scanned for known and unknown vulnerabilities.  The conventional wisdom is simple – when a software vendor provides security updates for critical application, these should be installed as soon as possible. Right?

Microsoft issues security patches for Windows and Office applications on the second Tuesday of each month. Apple issues security updates a handful of times per year.  Other vendors have similar programs.

When a vendor issues security updates, they usually disclose the particular security vulnerabilities that it was intended to fix.  So, as soon as a security update is released, the vulnerability becomes “public”. Now that the vulnerability is available (to bad actors) it is even more crucial that the fixes be applied in a timely manner.

All of this assumes that the vendor (the “Supplier” of this particular “Supply Chain”) has not already been compromised.  Imagine if a hacker could get in to the systems of our software supplier, make changes to released software that add malware.  Diligent users would unknowingly, and quite reliably continue to install updates, that now include malware.

If this sounds like a nightmare scenario, it is.  And it has already happened.

Examine the case of the Not Petya worm.  This started at a small company in Ukraine that supplies a piece of software called M.E.Doc.   You probably don’t use M.E.Doc. so you are not worried, right? M.E.Doc. is accounting software, used in Ukraine (think Quicken/TurboTax) and is required for filing national taxes.  So a large number of Ukraine based companies use it. In the spring of 2017, outside forces (likely Russian) hijacked the company’s update servers, injecting malware that included a small, but critical backdoor into the software.  As users updated their systems, they were infected with a backdoor, which laid latent for a month or two.

Then, the attack was launched.  The attack leveraged other vulnerabilities in Windows known as Eternal Blue and Mimikatz. These vulnerabilities rely on being “inside” the network of a company, behind the firewall, and once there, were able to spread globally encrypting data and asking for ransom.  Large multinational companies were affected, including banks, large shipping interests, manufacturing and more. If your company had an office in Ukraine, you may have been affected. If one of your suppliers, to whom you connect has offices in Ukraine, or is connected to someone who does, you might have been affected.

The upshot is this: Supply Chain security in Cyber Security is a now multi level concern.  Security professionals must now consider not only who might get in to their own network, but who might get in to their supplier’s network and who might get in to their suppliers’ supplier’s networks, and so on.

As is the case in other areas of Supply Chain security, we must concern ourselves with not only preventing bad things from happening, but assuming that they can, and trying to limit what can be done when bad things happen anyway.

And there is no simple answer.  Keep systems up to date to protect from know vulnerabilities.  But know that these updates can themselves introduce other vulnerabilities.

This article was written by Dave Ehman and edited by Kristina Weber. For more content like this, be sure to subscribe to Centry Blog for new articles every other week on topics relevant to the security industry. Follow us on Twitter @CentryCyber and @CentryLTD!

What is Social Engineering?

One of the most common methods of fraud is social engineering. This refers to a calculated deception that targets people in order to obtain sensitive information relative to their business, identity, or finances.  

There are two main categories of social engineering: (a) Mass Fraud, which is mostly comprised of basic techniques meant to scam a high quantity of people; and (b) Targeted Fraud, which is a highly-specialized method of fraud that singles out a specific individual or company.

The majority of these schemes follow the same general path. It begins usually with gathering information on a topic or target. Once enough information about the target has been obtained, scammers can focus on developing a false sense of security and trust with their target. In cases of mass fraud, this could look like replicating the design of a Netflix customer service email, or in targeted fraud establishing enough of a friendly rapport with an individual over the phone that they feel comfortable providing more and more information. Once this has been established, scammers can exploit any of the identified vulnerabilities and ultimately execute the scam.

Social engineering works because it preys on our instinct to trust.

Let’s say you are at work and receive a call or email from a “colleague” asking for some sort of account number or other piece of information related to the business. If you haven’t had any training on your company’s confidentiality policy, you might not think twice about providing this person the information they ask for. After all, they might seem trustworthy, or talk about things in a way that would give you no reason to suspect they aren’t a fellow coworker. That’s because they have meticulously studied how to prop up the illusion.

These types of attacks are common; all you need to do is look at the news to find examples. Just recently it was found that hackers connected to the Russian government were impersonating US State Department employees and sending emails with downloadable attachments. These attachments would then install software that could provide the hackers access to internal systems.

These fraud attempts aren’t just work-related. They can target you at home, too.

The Internal Revenue Service (IRS) of the United States just issued a warning about a new tax related scam. A surge of emails recently have been impersonating the IRS and using “tax transcripts” as bait to trick users into opening documents that contain malware. The malware behind this scam, Emotet, has been historically associated with posing as financial institutions in order to encourage people to download the malicious attachments. The IRS has recommended that if you have received one of these emails to delete it or forward it to phishing@irs.gov.

So how can you protect yourself?

Individuals can take the time to be vigilant of unfamiliar calls and emails. Sometimes social engineering won’t be a singular attempt. It could be repeated calls over years that slowly harvest the information needed to execute a scam. When in doubt, you can double check with the source, and avoid providing personal information. Meanwhile, companies can develop a guide for handling sensitive information to avoid blunders with fake employees. With sufficient training, employees can be taught to recognize different types of fraud and have an established plan for handling it should they come across it.

This article was written by Kristina Weber of Centry Global. For more content like this, subscribe to our blog and follow us on Twitter @CentryLTD!

Finding a Due Diligence Provider for your Business and Why it Matters

Company risk manifests in a myriad of ways, some seemingly easy to overlook and others more obvious. One of the biggest risks in day to day operations for companies comes from third parties – distributors, potential employees, suppliers, service providers, contracts, clients, vendors, etc. Basically, anyone on the outside who encounters your business can potentially become a threat.

Many security providers cannot address the risks and complex environment in hostile and emerging markets. They lack the needed infrastructure and cultural understanding to be able to provide services of high quality in locations outside of their area of familiarity, as majority of them are based in Europe or the USA.

The security provider should be a key to success, helping companies in business growth, finding new markets and mitigating potential risks.

What you don’t know can hurt you

Companies need to make informed decisions. The initial analysis of potential ventures and associated risks will show you the situation at hand and how to move forward.

Due diligence is an important part of every process at a business, from mergers and acquisitions to finding the right suppliers and clients.

Comprehensive due diligence is extremely important to getting the whole picture of an applicant or a third-party business relationship. Without going through this process, you expose your business to countless threats.

Making an assumption based on surface-level information could lead to difficulty conducting business, or at worst, breaching sanctions.

It is true that financial losses can be offset by insurance when damage has already taken place, but the stains on the company’s image and reputation are not covered by insurance policies.

Due Diligence makes it possible to secure the business environment before the incident occurs. In the case of cost structure, this can be found to be more of an investment as opposed to an expenditure.

What kind of provider do you need? The most suitable provider will be the one who has already dealt with the same or similar case in the market you want to operate and has built their network. They can aid you in determining potential risks as well as creating a mitigation agenda and budget through their local resources.

Field agents can provide insight into the environment you will be operating. They have years of professional experience and know the details of the potential uphill battle with the dangers and risks. There is no substitute for local knowledge.

It can be invaluable to know the backgrounds and affinities of the stakeholders that influence the company’s operations. Even if the investigated entity is perfectly compliant and lawful, these types of reports can be helpful simply on a level of benefitting the business relationship with information and perspective. The best results with Due Diligence investigations are often achieved when the process is outlined and integrated into the company’s entire business strategy.

Finding the security provider you need is not an easy task. Seek references and assess the capabilities of each provider. Look for companies who work on the ground and know the environment. The ideal partner has developed their network in the location you want to operate in and they possess local knowledge and expertise.

No one has all the answers, but you can find most of them by choosing the right security provider.

This article was written by Daniel Dadikozyan of Centry Global. It has been cross-published in the CIISCM magazine. For more content like this, be sure to subscribe to Centry Blog. If you have any questions or comments about due diligence services, feel free to reach out to us at info@centry.global!

 

Golden Visa for Sale! Now on special offer for the 1%

European passports and Schengen visas are the most desired traveling documents in the world. Not only do they grant the most traveling freedom, they give access to a safe and stable living environment, with free speech, in a market that can fulfill all your needs.

Many EU countries have taken advantage of this by offering entry in exchange for investment. This kind of activity is commonly referred to as a Golden Visa Program. For the subject countries, they are indeed golden, because they have the potential to bring in billions of capital into the country. Latvia, for example, used the program to stabilize its economy after the financial crisis.

According Transparency International, such programs have been in existence since the 1980s, and currently at least 12 EU Member States are offering them. Usually the reward is a residence permit, however Cyprus and Malta offer a fast track to citizenship should the customer invest enough money, and Portugal offers the citizenship option after a six year waiting period.

While the controls in most European countries should prevent individuals who are sanctioned by the EU from obtaining citizenship, many individuals took advantage of Golden Visa programs prior to implementation of the current international sanctions. It is a complicated matter for a nation to try to implement sanctions on its own citizens and capital that is invested within the country.

Most of these programs are legitimate, but the way they are set up invites abuse. Real estate is one of the easiest ways to launder dirty money, and these programs are taken advantage of all over the place.  

Some of the Golden Visa and Golden Passport programs are complex and might involve long red tapes and waiting periods. Of course, sometimes a suitable facilitation payment can fix that…

Latvia Golden Visa Program

The Latvian Golden Visa Scheme was heavily criticized. From 2010 to 2014, Latvia offered it at a discount price of EUR 71,150 if invested in countryside real-estate. The price for living in Riga was doubled to a value of EUR 142,300. As you can see, this could very easily be taken advantage of by someone looking to spend dirty money.

The number of people who took up this offer increased substantially  in 2014, the same year that Russia annexed Crimea. Almost 90% of the visa applicants came from Russia and countries that were formerly in the Soviet Union.  Thus, a program that had originally been intended for economic development and brought wealth to Latvia in the previous years had become embroiled in political significance.GV-by-Year

Picture 1: Latvian Golden Visas per year (Source)

The negative effects of the program eventually convinced the Latvian Administration to dismantle the discount in 2014. The greatest risk of these visa programs was spying, according to the deputy head of the Latvian Security Police in a 2017 parliamentary committee hearing. Then, of course, there was the risk to the economy, since many applicants were unable to prove the legality of their money. Although the program has since been dismantled, the effects of it and risks introduced by it will be felt for years to come.

Hungarian Golden Visa Program

Another interesting notorious golden visa program was the one in Hungary.

The Hungarian Golden Visa program was slightly different than in Latvia. Instead of it being based on investment in real estate, applicants had to buy a state bond from one of eight companies that had solitary rights to sell them on the behalf of the government. These bonds, which totaled up to EUR 300 000, were not inexpensive.

The results of this program were remarkable. The eight companies were able to earn about USD 600 million – and that’s a conservative estimate – over the course of the years that this program was running from 2013 to 2017. (OCCRP May 16, 2018)

The program ended in 2017 after criticism concerning the integrity of the eight bondseller companies. They were pretty mysterious – most were registered in offshore tax havens and it wasn’t completely clear who exactly profited from the sales.  

An investigation conducted by g7.hu and Transparency International Hungary uncovered the way these companies worked. Basically, companies would be assigned to territories around the world and allowed monopolies to sell the bonds under the program. But the way these companies were assigned required inside knowledge and connections – it wasn’t like it was a public tender. They had to have known about it separately since it was never advertised. Per the law, all the applicants were meant to be listed on the Hungarian Economic Committee’s agenda, but this was not always the case.

Although the Golden Visa program in Hungary has since been shut down, there are some rumors that a new ‘golden’ immigration program may be coming. Direkt36 reported that this new program was advertised by a Hong Kong based company on the Chinese platform WeChat. This new program now more closely resembles Latvia’s program, where applicants are required to invest a value of EUR 78 000 into Hungarian real estate.

Case Study: Who buys the visas? 

methode%2Fsundaytimes%2Fprodmigration%2Fweb%2Fbin%2Fb5259512-d8a9-4588-a80a-b4ca90e78b9d.jpg

Picture 2: Screenshot of Mr. Bogolyubov from The Times

Mr. Gennadiy Bogolyubov, the Cypriot, the Israeli, the Brit, the Ukrainian

Main Source: EveningStandard 11 Sep 2018

Mr. Gennadiy Bogolyubov is a popular face in the oligarch edition of the Bold and the Beautiful. He and his business partner, Mr. Igor Kolomoisky, are some of the best customers for UK lawyers – the costs alone for the litigation with their rival Mr. Viktor Pinchuk was estimated to be over GBP 50 million. The allegations and adverse reputation of the duo include alleged murders, violent takeovers and other accusations of mafia-style activities.

The two partners were very successful in post-Soviet era privatizations. Allegedly, the hasty privatization of a national bank in Ukraine to PrivatBank enabled the duo and their associates to empty out the bank’s capitalization with a decade long fraudulent loan scam.

To protect taxpayers’ interest and due to demands from Ukraine government’s external financiers (i.e. USA) PrivatBank was re-nationalized in 2016. “When Ukraine’s finance minister went to oversee the nationalization of the country’s biggest bank in December 2016, he took with him a team of bankers—and a security detail of special-forces operatives” (Wsj.com April 6, 2018).

Amongst Mr. Bogolyubov’s hobbies are philanthropy, which he practices through Bogolyubov Foundation.

Golden Visa United Kingdom Tier 1 Investor Visa (2009)

Cyprus Golden Citizenship (2016)

Nationalities Ukraine, Cyprus, Israel, United Kingdom
Current Residence Switzerland
Net Worth Unknown, was Ukraine’s #3 richest in 2010 (Kievpost)
Frozen Assets At least USD 2.6 Billion, shared with Mr. Igor Kolomoisky
Costs to Ukrainian Taxpayers USD 6 Billion to recapitalize Privatbank
Close Business Partner Mr. Igor Kolomoisky, who, according to a quote from the British Court, has taken over companies “at gunpoint” in Ukraine. Mr. Kolomoisky is a former governor and listed as an inactive PEP (Politically Exposed Person) per Dow Jones
Other Associates Mr. Alexander Zhukov, father of Roman Abramovich’s girlfriend
Powerful Enemies Mr. Viktor Pinchuk
London Real Estate GBP 62.5 Million home

GBP 20 Million house

Eaton Place Mansion

GBP 173 Million office block

Table 1. Mr. Gennadiy Bogolyubov’s Connections

This article was co-written by Oskar Savolainen and Kristina Weber of Centry Ltd. For more content like this, be sure to subscribe to Centry Blog for articles related to the security and risk industries.

Safe Online Dating

My Post

Online dating is a great way to connect with people. Throughout the history of the internet, it has gotten better and better. Most millennials meet their partner online compared to other ways of meeting new people. It’s quicker and easier than ever, where a date with a new person can be arranged within an hour’s notice through your smartphone.

How We Can Help

Despite the concerns that may be raised with some of the risk-related content in the article, online dating overall isn’t a bad thing nor is it something to fear. You can be immensely rewarded and fulfilled by it, and many happily married couples have their origins online. The only thing is, that you have to educate yourself on the environment. Dating online has a different range of risk factors than, say, meeting someone at a nightclub, but just like monitoring your drink in that example, there are steps you can take to avoid being taken advantage of.

We at Centry have been inspired to help people like you after hearing so many stories of online dating gone wrong. We believe you can find something real if you go about it mindfully. So, we are happy to announce that we have opened up an identity verification service called Date Check Online that provides three different levels of private checks to make sure that the person you are talking to is who they say they are. These checks are performed by investigative professionals who have been trained to spot red flags and have data sources available to them to search names against known sex offender registries and watchlists, so it’s a smart way to support your initial Facebook sleuthing if you have a funny feeling about someone.

The Risks

New technologies and phenomena often bring with them concerns that need to be addressed. With the ease of availability comes volume, and, as in any kind of risk management, with increased volume comes increased risk. Online dating can be immensely rewarding, but it should be conducted responsibly; individuals should be aware of their personal safety concerns and online dating risks should be managed accordingly.

Misrepresentation and Catfishing

Misrepresentation is always a risk with online dating, whether it’s something like hiding the fact that someone is married or using a photo on the profile that doesn’t accurately reflect their appearance. It’s so easy to lie behind a digital barrier that you never really know who the person is that you are talking to until you meet them, and even then there could be facts that haven’t been disclosed.

When misrepresentation is deliberate to the point of falsifying an identity, it’s called Catfishing.

It’s a term that refers to situations where someone has been involved in an online romance under the guise of a fake persona. Oftentimes these people will take images of attractive men or women from Google Image Search, come up with a fake name, and create life stories for these personas in order to take advantage of the people who fall for them.

We have all heard of the horror stories of grown  men using these fake personas to take advantage of young girls, but this concept exists across all genders and can affect anyone.

At best these circumstances result in broken hearts and feelings of betrayal when the lie is discovered, but they could also cost you your life savings. Huffington Post reported on a 69 year old woman in Florida who spent two years in a relationship with an individual that ultimately ended up abusing her trust to make money. Over the years of their relationship and phone calls and texts, she had funneled him roughly 1 million USD for the purpose of what she believed was to help him run his business.

Action Fraud reported that targets of romantic fraud lost approximately 41 million GBP in 2017. This number is likely also only the tip of the iceberg, especially considering that it can be humiliating to be taken advantage of in such a way, which can discourage victims from coming forward about their experiences.

Greater Risks for Women

The risks with online dating are greater for women, considering worst case scenarios such as physical or sexual assault, trafficking, or worse. While things like this can also happen to men, statistics for these crimes are heavily skewed toward female victims and that fact cannot be ignored.

This is all the more difficult considering that a number of dating websites perform no screening whatsoever on people who sign up for it. Which means that registered sex offenders can sign up– and approximately 10% of sex offenders use online dating sites.

Online Dating as a Business Risk

For businesses, online dating is a relevant factor that can affect several risks. It is so prevalent that the odds are that someone around you is participating in it. In your technology reliant workplace, most employees feel it is important to have their smartphones with them all the time, and the honeypot tradition has its roots in a long history of espionage. An online romance is a shortcut vector for red teams to breach your company’s security. Other concerns may elevate risk in business travel: online dating apps have been known to be used to lure victims into situations where they can be easily robbed.

While we think that implementing dating controls to your corporate policies is a bad idea, we urge individuals to think about how your personal communications may have have an effect on your professional security. Business is also a great analogy for online dating: as an entrepreneur you would have to take risks that could have negative outcomes, however, with the right planning, the positive outcomes are much much more likely and the impacts of the negative ones are minimized.

Safety, responsibility and integrity considerations aren’t hindrances – they are success enablers. As we always recommend, trust your instinct, and use resources provided to you.

Feel free to reach out to us on any of our social media platforms or on the Date Check website if you have any questions or comments!

For more content like this, please subscribe to Centry Blog. This article was written by Kristina Weber and Oskar Savolainen of Centry Global.