Market Waves In Asia Will Lead to Wipeouts

GUEST BLOG BY JAMES TUNKEY – Chief Operating Officer of I-OnAsia

With many of Asia’s biggest markets in turmoil and global growth slowing, it is reasonable to expect that there will be unexpected business failures in Asia. Fraud and corruption will be brought to light as perpetrators are unable to keep their balance. Once decent if marginal customers will disappear, and there will be defaults on debts and obligations.
There is no doubt that the tremendous challenges faced by the global trade regime in this period of slowing global growth is making it tougher to ride the waves without falling off the board.
Now is a good time to challenge your existing book of business, and to carefully examine the root causes of any failures or surprising results.
1) Do you have a detailed list of your trade counterparties and debtors? How updated are your files? If there was a dispute or default, what assets would you be able to attach?
2) Are there indicators of fraud or corruption amidst this market turmoil? Are unusual excuses or explanations being offered for a funky result?
After 25 years in Asia investigating corruption and fraud and looking for hidden assets, I am always available to offer thoughts and advice on how to better prepare for tomorrow’s likely challenges. Please do not hesitate to contact me by email or via our website.
Due Diligence Background Checks… Competitive Advantage

4 Misconceptions You Have About Password Protection

 

GUEST BLOG – By Jack Warner – General Manager, TechWarn

 

Cybersecurity is becoming more and more prevalent by the day. Passwords are a popular choice when it comes to user authentication, but new innovations are pointing to new alternatives. Numerous tech specialists are currently investigating another world past keyword validation. A portion of the rising options incorporates multifactor authentication (MFA), biometrics, and behavioral analysis, among others. Shockingly, some online content can make you accept a horde of misconceptions about passwords and the fate of authentication. When all is said and done, most accounts are hacked because of weak, poorly managed, or guessable passwords. That is as indicated by a 2017 Data Breach Investigations Report. Along these lines, here are the common misconceptions about passwords that you’ll discover on the web:

#1: Regular Password Changes Enhances Security

Today, pretty much every company has set down standards to oversee periodical password changes. Some will even confine the age of a password. More often, there is a minimum number of characters that you should change when renewing your password. This approach originates from the conviction that passwords start to leak as they age. As much as the methodology is addressing one part of the issue, most users will neglect to observe other password necessities, which can give hackers some starting point. It’s undeniably viable to train users about creating a strong password and why it’s essential to avoid password sharing.

#2: Biometrics Can Solve All Security Problems

With progressions in innovation, biometrics have picked up a solid intrigue to numerous users. Rather than attempting to recall a few long passwords, you just place a finger on a tab and obtain access to your account. It’s an exceptionally secure technique for verification as long as you have a solitary factor validation. Hackers will find it difficult to access your accounts since your fingerprint or retina sweep is only comprised of 0s and 1s. Presently, if somebody gets hold of your fingerprints by whatever means, the consequences can be devastating. They’ll access each and every account you’ve verified with your fingerprints, including your bank accounts and credit cards. Getting another set of fingerprints is even unimaginable.

#3: Complex Passwords are Better than Lengthy Passwords

It is important to make your password withstand different strategies utilized by hackers. Brute force attacks, for example, are utilized to hack more passwords other than dictionary passwords. More often, we assume that hacking a password with complex characters like “Kl*&@3@3P^%$??” is practically impossible, which is further from reality. In reality, a longer but memorable password can be harder to hack than a shorter complex password. You should simply abstain from utilizing words from your own data like your surname, pet’s name, and so forth. Also, it pays to blend characters and lexicon words while keeping away from any phrase that points to your actual account. On the off chance that you include “Twitter” to a secret word, any hacker who figures out how to get to your password through brute force attack may essentially tell that your Facebook, eBay, and a lot more will follow a similar trend.

#4: Online Password Checkers are Accurate

Numerous sites today will reveal to you how strong your password is. When setting up an online account, you’ll get a rating showing whether your password is very weak, weak, strong, or very strong. The site may likewise give you proposals to blend numbers, letters, and unique characters to improve your password quality. In any case, the website may not know precisely what arrangement exhibits the most secure password. Studies have demonstrated that numerous individuals utilize a capital letter at the beginning of a password and numbers in the last part of the password. That implies that blending things up on the grounds that an online password checker tells you so probably won’t give you the most grounded protection.

A strong password portrays a secret set of characters that is hard to guess by humans and PC programs, adequately shielding information from unapproved persons. A solid strong password comprises of 16 characters (and the more characters, the more grounded the password) that are a blend of letters, numbers, and special characters (@, #, $, %, etc) whenever permitted. Passwords are commonly case-sensitive, so a strong password contains letters in both capitalized and lowercase.

Indeed, even with the developing patterns in user verification, passwords still stay one of the most secure and successful strategies. Simply ensure that your password is long, unique, and fuses a blend of letters (both capitalized and lower case), numbers, and special characters. Furthermore, include an additional layer of assurance through two-factor authentication (2FA).

Due Diligence Background Checks Competitive Advantage

 

Our partner I-OnAsia recently posted an article about a success story with regard to Due Diligence Background Checks and one of their clients.  This story illustrates how when you dig deep you can remove obstacles and concerns that can shut-down deals.

James Tunkey, COO of I-OnAsia shared this story…  

I’m pleased to announce that earlier this year one of our clients acquired a multi-billion dollar portfolio of assets, proceeding with a deal that we performed Due Diligence on.

The deal involved an international aspect that our client’s competitors were unable to get comfortable with. But our client saw a potential opportunity: doing the deal might deliver a healthy ROI, and lead to a better stock performance.

We got to work, going beyond Standardized Checks for regulatory compliance. Deep Dive Diligence looked at the backgrounds and reputations of key individuals and entities, and the drivers for potential future success. The result was an authoritative report submitted to the Board that explained away misconceptions, identified upside opportunity,  and repriced the risk.  

The massive acquisition has been very well received in the marketplace.  Not every deal involving foreign entities is always right to do. But not every deal should be shied away from either.

 

Locate Investigations-Skip-Tracing

a Santoni Story Locate Investigations Skip Tracing with Jacqueline Macare

Locate Investigations (Skip Traces) can be challenging even if a client provides a name, date of birth, social security number, last known address, etc. When a client requests that we locate an individual with only a name and license plate number, it is very difficult. Late last week we were asked to locate an individual who was a suspect in a hit and run with a common name & a license plate number, likely living in San Francisco. Unfortunately, California leads the nation in fatal hit and run crashes so we are often called to locate individuals for this reason. A comprehensive search indexed to his name and San Francisco returned too many results to be productive. It was then decided that we run what’s called a Vehicle Sightings Report which utilizes a database of over two billion vehicle sightings, including current sightings (last 30 days), recent sightings (31-90 days) and historical sightings (older than 90 days). The database acquires these sightings from street and traffic cameras, including cameras in underground and public parking lots.

A search of the plate returned 23 sightings, with 20 of the sightings being “current.” Many times, a Vehicle Sighting Report does not yield results, or the results are too old.  The majority of sightings for this particular vehicle were in the cul-de-sac of a residential neighborhood.

Finally, we were able to narrow down our results to one person matching the subject’s name, by searching databases indexed to his name and street of possible residence. We confirmed his residence and provided our client with results in just one day.

Vehicle Sighting Reports are a powerful tool if results are found. We can use the information obtained by the report in a locate investigation of current residences, employers, and identify habits.

Please contact Santoni if you have any questions about Vehicle Sightings Reports and Locate Investigations / Skip Traces. – by Jacqueline Macare

Crafting a Social Media Policy that Protects and Promotes Your CompanyIn today’s digital age, companies are faced with a dilemma. You want to use social media to promote your business, but you’re wary of letting employees post on the channels. Indeed, social media can be a double-edged sword. Business owners need to understand both the power – and the risk – involved.

Your employees are using social media. About three quarters of adults who go online participate in social networking. Most business owners recognize the risk involved – team members could share confidential information, misrepresent the company, or even speak negatively about their employer. And yet, 73% of companies don’t have a written social media policy. Read more

There’s always a risk of an employee misusing (either intentionally or accidentally) a company social media account. Stories of these mishaps are frequently in the news. And if it can happen to McDonalds , it can happen to your company.

In 2005, Microsoft came out with this social media policy: “Be smart. Don’t be stupid.”

While many of us wish that sentiment were enough to govern responsible online behavior, today we have to go a bit further. Here are some key points to keep in mind when drafting social media rules for employees. Here’s how:

SET REALISTIC GOALS

The best social media policies don’t try to prevent every tricky situation that could arise or lay out how each one should be handled. (Social media changes too fast for that approach to be effective.) Instead, they empower employees to work within guidelines, make good choices, and avoid pitfalls.

Don’t try to dictate every aspect of every social media channel. Again, the sites change and your policy will be out of date quickly. You can implement separate written guidelines for each social media channel to cover the details, but your overall policy should focus on the big picture.

STRUCTURE YOUR SOCIAL MEDIA PROGRAM

Your policy should clearly outline who will be communicating on social media on behalf of the company. If this responsibility will be handled by a team, ensure that everyone is on the same page about the type of content that will be used, and the brand voice and personality.

You will also need to decide whether social media content will need to be pre-approved. How does the approval process work? If approval is not necessary, be clear about guidelines for what should not be posted – confidential or not yet released information about the company, your employees or your customers should never appear on social media.

Make sure to include guidelines on responding to customer questions and feedback. It’s a good idea to craft standard responses that can be issued in the case of common questions, and especially in the case of negative feedback. There should be a protocol for responding to angry or unhappy customers – it’s never a good idea to allow an employee to wing it, especially in an emotionally charged situation.

OUTLINE AFTER HOURS BEHAVIOR

Many companies choose to have two social media policies. One for employees who post on social media as part of their job, and one for employees using social media in their personal lives.

Even if they are posting on their own social media accounts, chances are, it’s pretty easy to figure out where your employees work. How they present themselves online will reflect on your company. Your policy should alert employees that offensive or inappropriate comments, or illegal behavior that shows up on social media could affect their good standing at work. They must represent themselves according to the code of conduct of your company and brand.

Tread lightly when telling employees what they can and cannot post. It’s smarter to educate them about how their online behavior reflects on your company, and train them on best practices for professionals in their position.

Once you have crafted a policy for your company, it’s a good idea to have it reviewed by an attorney. There are certain legal aspects that need to be considered. The National Labor Relations Board has taken a firm stance on these policies, saying that employers can’t prevent or suppress discussion about the terms and conditions at work.

REVIEW, TRAIN, REPEAT

Once you have a written social media policy in place, you will need a plan for how to roll it out to employees and train them to follow your guidelines.

In the case of new employees, your policy can become part of the onboarding process. It can be reviewed at the same time as the company handbook or other policy documents.

The digital environment changes quickly and maintaining an up-to-date policy means reviewing it every 6 months to ensure that nothing needs to be updated or changed. This gives you an opportunity to revisit the policy with your team, and reinforce it.

By providing education for your staff about online best practices, you are preventing problems before they start. Therefore, the importance of a social media policy in the workplace can be the deciding factor of company success.

Let’s not forget that there are many upsides to using social media at work. These channels can be used to market your company, launch a new product or build a community around your area of expertise.

As a business owner, you probably don’t have time to run them yourself, so you will need to trust your employees to post and respond without your guidance. A good social media policy is one that allows you to focus on other parts of your business. Use this information as a social media guideline for your employees and be vigilant about what they’re sharing!

– Katie Wagner – President, KWSM, a digital marketing agency

Connect with Katie on LinkedIn here