Trace-X Press Release

Santoni Acquires Trace-X 

Irvine, CA –  Santoni expands its suite of risk mitigation services with the acquisition of Trace-X.  Trace-X is a leading provider in online data removal of personal identifying information from people finder websites.  “With the addition of the Trace-X service we now have the ability to protect clients in a variety of industries who are concerned about their private information being available and accessible to fraudsters and criminals. 

“We can also give peace of mind to victims of identity theft,” said Tim Santoni, President at Santoni.  In today’s information age where your personal identifying information is being bought and sold it is important to regularly monitor and remove your name, address, phone number, and email addresses from people finder sites.  The increased number of threats and unwanted contacts makes it ever more important to control where and how your information is available. 

Santoni is a leader in background screening, investigations and risk mitigation for individuals, businesses, insurance companies and brand owners across the country. Santoni staffs a team of highly trained, licensed, professional investigators and certified background screening consultants who consistently produce timely and accurate information to help our clients make crucial business decisions. Santoni  is nationally known with a global reach. 

For more information please visit santoniservices.com or call 949-900-3400

Trends 2019 From Tim Santoni

Trends 2019 – From Tim Santoni

In our business we work with businesses and their trusted advisors (Lawyers, CPA’s, Commercial Insurance Brokers, Business Brokers, Human Resources Consultants, Brand Managers, Marketing Teams & Consultants).  Our investigation and background checks are really just a tool to help mitigate risk in the hiring process or develop evidence and information to make an informed legal or business decision. As we enter the 4th quarter, I wanted to point out some trends that I have observed as a result of our work and interactions with our clients.

Investigations

In the information age that we live there are vast amount of data and information available online through free and paid providers.  The parsing through and verifying of this information is now the challenge.  Online research tools and Open Source Intelligence (OSINT) are becoming the standard to conduct background research on litigants and people injured at work and in automobile accidents.  The open source tools offering by OSINT and other providers have been maliciously hacked and were forced to be taken down. Many of the free tools available are now protected behind paid sites or software offerings.  As far as new searches go, the Vehicle Sighting Reports is an amazing tool to track down where someone is living, working and who they might be associating with.  If at all possible insurance carriers would forego the expense related with surveillance/subrosa and activity checks if they can get more cost effective information obtained through databases.

Background Screening Trends

Industries with forced compliance such as, Finance/Banking, Information/Technology (IT), Construction & Healthcare are consistently in need of custom background screening programs to meet the requirements of their contracts with state and government agencies.  Employers are also looking into continuous monitoring of criminal activity so they are alerted when current employees have runs in with the law.  Proper authorizations and disclosures are a key focus of plaintiff attorneys looking to files cases against employers and  background screening companies which are often referred to as CRA’s.  Electronic Authorizations and Disclosures are emerging as a great solution to decrease turnaround time on background checks while maintaining compliance.  

IP & Brand Protection

Trademark clearance and registration related investigations are on the rise with increased Trademark Applications being filed.  Trademark applications from Chinese based applicants have really spiked. There is an increasing need to identify rogue sellers of infringing and counterfeit products on sites like Amazon that often give counterfeiters an identity shield. We are seeing an increased need for evidentiary “undercover” buys from sellers that are not having their sales fulfilled by Amazon and other e-Commerce providers in an effort to identify and enforce. The removal of domain name ownership records, commonly referred to as “WHOIS” data is making it more and more difficult for brand owners and their attorneys to identify the operators of rogue sites that are selling counterfeit/infringing products.  The lack of WHOIS information is also impacting the ability for online brand protection providers to send automated C&D letters as the first step in the enforcement process.

Risk Mitigation

Open Workers’ Comp Claims are still an ongoing concern for many California employers.  Businesses are frustrated with the lingering claims that are costing them time and money.  They are also fighting back to show their employees that they do not pay out on exaggerated and fraudulent claims.  Trade Secret & IP theft is now a concern for all types of employers. We are seeing an overwhelming need to upgrade and update IT policies so that when internal theft of IP occurs it can be investigated and tied to the perpetrator.  If employers are hit with Trade Secret, IP Theft and Employment Practices lawsuits they need to look at having an on-demand computer forensics partner to forensically preserve the data in a timely manner to avoid spoliation and overwriting.

 

4 Misconceptions You Have About Password Protection

 

GUEST BLOG – By Jack Warner – General Manager, TechWarn

 

Cybersecurity is becoming more and more prevalent by the day. Passwords are a popular choice when it comes to user authentication, but new innovations are pointing to new alternatives. Numerous tech specialists are currently investigating another world past keyword validation. A portion of the rising options incorporates multifactor authentication (MFA), biometrics, and behavioral analysis, among others. Shockingly, some online content can make you accept a horde of misconceptions about passwords and the fate of authentication. When all is said and done, most accounts are hacked because of weak, poorly managed, or guessable passwords. That is as indicated by a 2017 Data Breach Investigations Report. Along these lines, here are the common misconceptions about passwords that you’ll discover on the web:

#1: Regular Password Changes Enhances Security

Today, pretty much every company has set down standards to oversee periodical password changes. Some will even confine the age of a password. More often, there is a minimum number of characters that you should change when renewing your password. This approach originates from the conviction that passwords start to leak as they age. As much as the methodology is addressing one part of the issue, most users will neglect to observe other password necessities, which can give hackers some starting point. It’s undeniably viable to train users about creating a strong password and why it’s essential to avoid password sharing.

#2: Biometrics Can Solve All Security Problems

With progressions in innovation, biometrics have picked up a solid intrigue to numerous users. Rather than attempting to recall a few long passwords, you just place a finger on a tab and obtain access to your account. It’s an exceptionally secure technique for verification as long as you have a solitary factor validation. Hackers will find it difficult to access your accounts since your fingerprint or retina sweep is only comprised of 0s and 1s. Presently, if somebody gets hold of your fingerprints by whatever means, the consequences can be devastating. They’ll access each and every account you’ve verified with your fingerprints, including your bank accounts and credit cards. Getting another set of fingerprints is even unimaginable.

#3: Complex Passwords are Better than Lengthy Passwords

It is important to make your password withstand different strategies utilized by hackers. Brute force attacks, for example, are utilized to hack more passwords other than dictionary passwords. More often, we assume that hacking a password with complex characters like “Kl*&@3@3P^%$??” is practically impossible, which is further from reality. In reality, a longer but memorable password can be harder to hack than a shorter complex password. You should simply abstain from utilizing words from your own data like your surname, pet’s name, and so forth. Also, it pays to blend characters and lexicon words while keeping away from any phrase that points to your actual account. On the off chance that you include “Twitter” to a secret word, any hacker who figures out how to get to your password through brute force attack may essentially tell that your Facebook, eBay, and a lot more will follow a similar trend.

#4: Online Password Checkers are Accurate

Numerous sites today will reveal to you how strong your password is. When setting up an online account, you’ll get a rating showing whether your password is very weak, weak, strong, or very strong. The site may likewise give you proposals to blend numbers, letters, and unique characters to improve your password quality. In any case, the website may not know precisely what arrangement exhibits the most secure password. Studies have demonstrated that numerous individuals utilize a capital letter at the beginning of a password and numbers in the last part of the password. That implies that blending things up on the grounds that an online password checker tells you so probably won’t give you the most grounded protection.

A strong password portrays a secret set of characters that is hard to guess by humans and PC programs, adequately shielding information from unapproved persons. A solid strong password comprises of 16 characters (and the more characters, the more grounded the password) that are a blend of letters, numbers, and special characters (@, #, $, %, etc) whenever permitted. Passwords are commonly case-sensitive, so a strong password contains letters in both capitalized and lowercase.

Indeed, even with the developing patterns in user verification, passwords still stay one of the most secure and successful strategies. Simply ensure that your password is long, unique, and fuses a blend of letters (both capitalized and lower case), numbers, and special characters. Furthermore, include an additional layer of assurance through two-factor authentication (2FA).

Tim Santoni, President/CEO of Santoni Investigations

Tim Santoni was a recent guest on “Workplace Perspective”, a podcast series for employers and employees. Tim and SAFFIRE LEGAL PC’s founder and principal attorney Teresa McQueen discussed the importance of employers conducting employment background checks and how they are used when hiring employees.

Thank you to Teresa for inviting Tim to be a guest on her show. If you have any questions about background checks or compliance, please leave them in the comments below.

 

 

Process Server Daily Podcast Tim Santoni

 

 

Tim Santoni recently spoke with Michael Reid on his podcast “Process Server Daily” about life as a Private Investigator and President/CEO of Santoni Investigations.  Michael and Tim discussed many topics including IP/Brand Protection , Anti-Counterfeiting Investigations, Surveillance and Risk Mitigation  . Also covered were the many ins and outs of both the Private Investigation and Background Screening businesses. Our thanks to Michael for having Tim on his show.

Due Diligence Background Checks Competitive Advantage

 

Our partner I-OnAsia recently posted an article about a success story with regard to Due Diligence Background Checks and one of their clients.  This story illustrates how when you dig deep you can remove obstacles and concerns that can shut-down deals.

James Tunkey, COO of I-OnAsia shared this story…  

I’m pleased to announce that earlier this year one of our clients acquired a multi-billion dollar portfolio of assets, proceeding with a deal that we performed Due Diligence on.

The deal involved an international aspect that our client’s competitors were unable to get comfortable with. But our client saw a potential opportunity: doing the deal might deliver a healthy ROI, and lead to a better stock performance.

We got to work, going beyond Standardized Checks for regulatory compliance. Deep Dive Diligence looked at the backgrounds and reputations of key individuals and entities, and the drivers for potential future success. The result was an authoritative report submitted to the Board that explained away misconceptions, identified upside opportunity,  and repriced the risk.  

The massive acquisition has been very well received in the marketplace.  Not every deal involving foreign entities is always right to do. But not every deal should be shied away from either.

 

Risk Mitigation TV has Launched

I am happy to announce the launch of RISK MITIGATION TV!!!!

I believe that businesses must be proactive in order to mitigate exposure to; Embezzlement, Fraud, Workers Comp Claims, Trade Secrets theft, Employment Claims, Counterfeiting, Theft Internal/External, Contract Disputes, etc. In today’s litigious environment you cannot eliminate risk and lawsuits, but you can implement strategies and best practices to reduce overall exposure.
The goal of Risk Mitigation TV is to provide YOU with strategies and tips to mitigate risk in your business and protect you from those in your inner circle.In my 15 years and over 30,000 cases I have gained insights that I am looking to share with you.
I look forward to sharing stories and insights.  If you have a topic you would like us to cover or if you are interested in making a guest appearance please connect with me.
I look forward to building a community of Risk Mitigators!!
Tim Santoni

 

The 3 Types of Background Checks3 Types of Background Checks (1)

At our private investigation and background screening company, our most frequently ordered service is the background check. Our first question to a potential is, “what kind of information are you looking for and what is the situation that is triggering you to look into someone’s background.”  There are three (3) types of background checks and we are going to talk more about what they can uncover, what situations they are best used for and which ones can be done discreetly without authorization or notice to the subject.

Obtaining background information on an individual often occurs in these three situations.

  • Before you hire an employee to work at your company.
  • At the onset of litigation it is common to look at the background of the plaintiff, witnesses and any parties that will be deposed or testify as their credibility is crucial.
  • During the M&A (Merger & Acquisition or when you are looking to acquire a company it is important to understand the background of the owner and key executives.

While looking into someone’s background is an excellent business practice, not all types of background checks are made the same. Some of them are extensive and verify the person’s previous employment, location, assets, litigation history, and so on. Others will simply see if the person has ever been convicted of a crime. And sometimes, that little bit of info is all you need to make a decision.

So how do you figure out how much information you need? How deep do you really need to go in order to get the job done?

Here are the three main types of background checks and what is usually involved with them.

 

Pre-Employment Background Checks / Employment Background Checks

This background check is sort of self-explanatory. It is primarily used to determine if a potential employee is a good fit for a company. Plain and simple.

There are some important things you need to know about pre-employment screening, though.

  • Should ONLY be conducted by an employer seeking to hire the applicant as an employee
  • You have to get permission from the person being screened before you can do anything
  • There are a set of rules that must be followed from the FCRA. Check them out here
  • The employee is entitled to obtain a consumer copy once the background check is completed

A pre-employment background check typically involves searching for criminal records, pulling a driving record, verifying employment and education.  This type of background check is the lowest priced of the three we will review. A typical employment background check will range from $30 to $100 per applicant. The variability in price will come from how wide you look in terms of counties searched and whether or not you conduct verifications of employment or education.

A very basic background check that only looks for criminal convictions can be turned around in 24-72 hours or less.

Background Checks for Litigation

If you are involved in litigation it is crucial that you understand everything you can about all of the parties (Plaintiff, Defendant, Witnesses & Experts).  The credibility of the parties will play a huge role in the outcome of the case.  In these situations a background check can be conducted without authorization or notice.  This allows you to discreetly look at everything from criminal records to social media.  A typical litigation background check might include the following;

  • Verification of Information (Name/Alias, SSN, DOB)
  • Address/Residence History
  • Criminal Court Searches (State & Federal)- Counties/States of Residence
  • Civil Court Searches (State & Federal)- Counties/States of Residence
  • Multi-state Criminal search with watch lists and sex offender searches
  • Patriot Act Watch List
  • Sex Offender Search
  • National Security & Terrorism Watch Lists
  • OFAC (Office of Foreign Asset Control)
  • Interpol Most Wanted List
  • OIG
  • General Services Administration Excluded Parties System List
  • Denied Persons List
  • Corporate & Business Affiliations
  • Consumer Public Filings
    • Bankruptcies
    • Judgments
    • Liens
  • Professional Licenses
  • News/Media Searches
  • Social Media

The information that you uncover in a litigation background check can give you the upper hand or maybe even the evidence you need to swing the scale of justice in your favor.

Social media is especially revealing. A lot of people don’t realize how incriminating some photos they post can be. Pictures of consuming alcohol inappropriately, being around certain people or places that they shouldn’t, or even saying things that they shouldn’t.

Every legal case is different. Because of that, a background check can be tailored to focus on finding the information you need for litigation purposes. You don’t necessarily need to know every unlawful thing a person has done, just the stuff that is relevant to your case.

These investigations can be a little bit more expensive than a pre-employment check. The starting price is usually in the $300 to $1,000 range and can take anywhere from a couple days to a couple weeks to complete.

If you need a litigation background check be sure to partner with an investigation firm that has the resources, experience and databases required to uncover the necessary information.

Due Diligence Background Checks

If you are looking at acquiring a business, partnering with a business or engaging in M&A activity a due diligence background check can be your friend.  Due Diligence Background checks can be done discreetly and the can be conducted on individuals and businesses.

The components of a due diligence background check would include the elements referenced in the Litigation – Legal Background section, but they will also include the following;

  • Assets
  • Related Entities / Subsidiaries
  • Licensing/Regulation Checks
  • Trade Journal / Media Research
  • Corporate Filing Review
  • Regulatory Sanctions
  • Interviews
  • Business / Professional License (review/verification)
  • Domain Names

The information uncovered in a Due Diligence Background Check will tell you if the acquiring company will be able to successfully operate the succeeding business.  It will tell you if the buyer is bankable and can secure the necessary financing required to operate the business.  You will learn about litigation, both civil and criminal that can impact credibility. A snapshot of social activities and relationships will be evident in reviewing social media and potential family law cases.

In the end you will have a full profile of owners, executives and key employees of a business you are looking acquire.  This will help you in structuring and negotiating a deal after all of the facts are on the table.

5 Mistakes that Elevate Risk in Your Business

When you’re the head of a small or middle sized business, you have a dozen hats to wear and never enough time to take care of everything. These 5 mistakes that elevate risk in your business can be avoided.  Learn these 5 tips and keep your company, employees, partner and clients safe.

It’s inevitable that some things will slip through the cracks.

1) Not Conducting Background Checks

 

To some people, this may seem obvious.

Before you bring someone on-board, make sure they are who they say they are.

Unfortunately, there are a staggering amount of employers who think that they don’t need to run a background check. They liked the person who showed up at the interview and will hire them without hesitation.

How could this possibly be dangerous?

Conducting a background check gives insight into the applicant’s behavior and patterns.

We had a client that hired a nice young woman based on her experience as a CPA. Come tax season, she stole the social security numbers of all the employees. Then she used them to commit tax fraud and collect their returns.

When our client ran a background on her, they found several counts of theft, harassment and arson.

Even if there aren’t any white collar crimes to report, there might be other things lurking in the shadows.

A DUI, for example, is no laughing matter.

Having a charge on your record displays a pretension for irresponsibility. If they’re not wise enough to not drink and drive, how do you think they’ll act within your company?

What about assault and battery charges?

During the interview, the prospective employee might seem charming and be a perfect fit. Then you find out, a month or two down the line, that they have problems handling their anger. They could potentially take out their issues on your employees.

People like that have a record of patterned behavior.

Solution: Check out their background before giving them a job offer. You might be surprised by what you find.

 

2) Blind Trust with your IT Personnel

Since we are in the digital age, most everything a business does occurs over the web.

You’ve put the necessary precautions in place – installing anti-virus software on your main computer and hired an IT staff to handle everything else.

You’re set, right?

Not necessarily.

Just because you’re working with an IT company doesn’t mean they automatically know how to protect your business.

A good IT firm will have recommendations about security protocols to put into place as soon as you sign up with them. These protocols that protect you, your employees, your customers and your vendors from having their information stolen or corrupted.

Unfortunately, just putting the protocols into place doesn’t inherently stop the bad guys from getting into the system.

Security measures have to constantly be updated, monitored and tested in order to really protect you.

An anti-virus program from 2010 will not stand a chance against a virus or malware software from 2016.

You have to remember that a cyber-attack is always around the corner and can happen anytime, anywhere and to any company.

Just ask Target, Sony, GoDaddy, Staples, Anthem Insurance, and Experian about cyber crime.

These are big name companies with a lot of money to put into cyber defense. Yet, they were hit hard and suffered massively when attacked.

If these massive corporations can be knocked down by a hacker, it would be even easier for a small business to be broken into.

Solution: Ask your IT people what they’re doing to protect you and your company from these threats.

 

3) Lack of Education About Workers’ Compensation


One of the banes of owning a business is when an employee gets injured on the clock.

According to the US Department of Labor, every year in California, 9,000 to 11,000 employees file for workers comp.

In 2015, this amounted to $438,000,000 in compensation and medical bills paid for by business owners.

The odds of encountering a claim skyrocket if you operate any type of business that deals with heavy machinery, transportation and construction.

In order to protect yourself and properly care for your employees, education is key.

They need to know what to do if they are injured and you need to make sure everything is filed correctly. A workers’ comp claim can take years to settle or close.

The only way to speed up the process is to be as compliant as possible. Make sure that the employee fills out the right paperwork and  is seeking out medical attention.

If you suspect fraud, however, talk with your business insurance provider. They will probably send out an investigator to look into it. Depending on what you find, the claim might continue or be closed based on the evidence.

Still, you don’t want to have to rely on catching the employee somewhere down the line.

Educate your employees on the consequences they face if they file a fraudulent claim.
Solution: Take every workers’ comp claim seriously and make sure your employees know how a claim can affect the overall bottom line.

 

4) Failure to Preserve Electronically Stored Information (ESI)


Not only do you have to worry about threats from the outside world, but also inside your own company.

Imagine this scenario: You’ve have a poorly performing employee who needs to be cut from payroll. They’re enraged and can’t believe you’re firing them.

They leave and you continue finding someone to replace them.

Unbeknownst to you, the employee can access work email and other cloud services via their personal cellphone. And even though the employee is no longer at the office, they can still get their hands on sensitive information.

Because you don’t know they have this access, you turn over their computer to the employee who replaces them.

Now, let’s say that the former employee wants to trade the information they have about your company with your competitor so they can get a new job.

You find out about this later and file a lawsuit against the former employee for corporate espionage.

During the course of the lawsuit, you need to prove the former employee’s guilt because the information they gave to the competitor was only on their computer.

You might find this difficult to prove, because the new employee has the computer with all the information on it.

Unknowingly, you just ruined your case. Or, at the very least, jeopardized your chances of winning.

By not immediately locking out the terminated employee from all access to the company, you’ve exposed yourself to risk.

Solution: Preserving electronic data is really as simple as swapping out an old hard drive for a new one.

The next step is to change passwords on email addresses and other places of logging in. This creates a barricade that, while not impenetrable, can help protect you from harm.

 

5) Not Really Knowing Your Supply Chain


Any time you bring in a third party to support your business, you’re putting yourself at risk.

Once you expand your business outside of the corporate office, you’re putting the fate of your company into others’ hands.

Sometimes, you find out after the fact that the people you do business with aren’t as reliable as they seem.

Take a look at these causes and effects that impact business owners’ every day.

Delays in Production:

Cause: Unstable suppliers who can’t meet your needs

They could be too slow at producing the final product or they’re not checking the product as it passes through various layers of production. This can lead to a defected product at the end, needing to be thrown away and start over.

Effect: Upsets purchasing managers, distributors and customers. Lag time on deliveries causes delays in revenues.

Solution: Work with the manufacturer to make sure the best processes are in place to make the product.

Keep an open flow of communication so they let you know when they run out of material or have broken machinery.

Delays can happen. Knowing about them as they arise gives you breathing room to plan around them.

Counterfeiting & Diversion:

Cause: Rogue distributors & manufacturers exploit your IP & Brand.

Effect: Upsets authorized distributors and consumers leading to brand erosion, customer confusion and loss of profits.

Solution: Conduct frequent audits on your manufacturers. If they aren’t compliant, don’t work with them.

IP & Trade Secret Leaks

Cause: Failure to protect your tangible and intangible IP.

Just because your office is secure doesn’t mean your manufacturer’s office is. Their computer systems can be broken into and your company information could be leaked to a competitor or counterfeiter.

Effect: Patent designs and secure information can get into the hands of counterfeiters. They can distribute low-quality products that look just like yours.

Solution: Ensure your manufacturers have up-to-date security protocols in place. Encourage them to work with an IT company that can protect their business from attack.

 

Hopefully this helped you understand how protect yourself internally, in the cyber world, and from white collar sharks.

If you put up the right defenses, it will show others that you’re serious about your business. It will show hackers that you’re not one to mess with and to go pick on someone else.

But most of all, put the right procedures in place so you can focus on what matters: expansion, revenue, and being the best in your industry.

According to the Association of Certified Fraud Examiners, a typical fraud case costs the business 5% of its annual revenue. Many instances of fraud are not discovered until some time later due to a lack of internal audits that gives the employees committing the fraud a false sense of security. Your business may require fraud investigations if you notice any of the following signs occurring.

5 Signs of Fraud in Your Business#1. Accounting reports are regularly not completed on time

Accounting reports that are rarely completed on time could indicate an employee is committing fraud, and using the delay to cover up his or her actions.

#2. Your profit margin is significantly lower than what you expected it to be

Just because your profit margin is slightly off doesn’t necessarily mean that someone is committing fraud. However, if it is significantly lower, there could be a problem, particularly if you haven’t had a sudden decrease in sales.

#3. There has been a sudden increase in balance sheet accounts

A common method of committing fraud involves creating “ghost” accounts for someone to funnel money into. If you notice a large number of new accounts, especially ones you cannot identify, this could be a sign that something is amiss.

#4. Certain transactions correspond with a particular employee’s schedule

Do you tend to have more returns whenever a certain employee is working? Do customers complain about past due notices after stating they have submitted payment to a particular individual? If unusual things seem to happen more often whenever a certain person is working, this may indicate you need to watch that individual a little closer.

#5. You have an employee who is possessive over his or her job duties

Your business could also be a victim of fraud if an employee regularly works long hours, never takes a vacation, and insists on handling all your accounting functions. Your employee may worry that if responsibilities are shared, he or she will no longer be able to perpetrate fraud, or that others will discover past misdeeds.