Category Archives: EMPLOYMENT

Nearly all companies still can’t spot incoming cyber attacks

Almost all organisations are vulnerable to hackers due to lack of cyber security staff or tools, report states.

cybersecurity-with-lock symbol image www.intelagencies.com

Businesses know of cyberthreats – but lack the resources to adequately monitor them

Four out of five businesses lack the required infrastructure or security professionals with relevant skills to spot and defend against incoming cyberattacks.

According to a new report by US cybersecurity and privacy think tank Ponemon Institute on behalf of cybersecurity firm BrandProtect, 79 percent of cybersecurity professionals say that their organisations are struggling to monitor the internet for the external threats posed by hackers and cybercriminals.

Just 17 percent of respondents say that they have any sort of formal process in place for intelligence gathering which is applied across the whole company.

The report found that 38 percent of organisations don’t have any policy on threat intelligence gathering at all, while 23 percent have an approach that is ‘ad hoc’ at best. A further 18 percent say they do have a formal process in place, but it isn’t applied across the entire enterprise.

The Ponemon Institute claimed that businesses are on average experiencing more than one external cyberattack a month, with these repeated security breaches resulting in an annual average cost of around $3.5m.

But while many companies are failing to properly monitor external threats, the majority do recognise that they should be carrying out activities such as monitoring mobile apps, looking out for social engineering and phishing attempts, and keeping an eye on cyber threats – around 60 percent of respondents listed these activities as essential or very important to their business.

So why aren’t more organisations actively pursuing these leads in the interests of protecting themselves against hacks and data breaches? The study reported that there’s an insufficient awareness of risk across whole organisation.

Half of respondents suggested that this was one of the main barriers to achieving effective cybersecurity, while almost as many described a lack of knowledgeable staff and a lack of tools as barriers to this goal – echoing previous reports of a severe lack of cybersecurity professionals and understanding of the risks caused by poor defences.

f4y

Henry Sapiecha

Inside Jobs and Outside Vendors Among Biggest Threats to Corporate Data Security, Survey Reveals

spying_guy image www.intelagencies.com

Corporations seeking to avoid costly data breaches might want to worry less about foreign hackers and more about the new employee in accounting. That’s one of several instructive takeaways from a comprehensive global survey of corporate privacy professionals that identifies employees and vendors as two sources of risk that corporations are failing to manage properly.

“We’ve all seen the damage that data breaches can inflict on corporations,” said David Perla, President of Bloomberg Law, which commissioned the survey from the International Association of Privacy Professionals (IAPP). “It’s time to go beyond the headlines to understand privacy issues at a deeper level, and the revelatory findings in this survey are a step in that direction.”

Coinciding with the survey, Bloomberg Law today launched a new, innovative tool — Bloomberg Law: Privacy & Data Security — for attorneys, in-house counsel, and compliance professionals whose work touches on this area of exponential growth and concern.

“It’s a data-driven world, and this important survey data demonstrates how privacy professionals actually perceive and handle risk in the real world,” said J. Trevor Hughes, President and CEO of IAPP.

Survey participants identified “buy-in” from corporate leadership as the most important factor in mitigating the risk of a data breach, with 89% considering it “important” or “very important.” While respondents rated their employers’ performance relatively strongly in that regard (55% considered it excellent or almost excellent), they issued considerably lower scores for their employers’ performance on two other significant sources of risk: employee monitoring (35%) and vendor management (30%).

When asked who within their organizations were responsible for evaluating privacy risk, respondents identified general counsel more frequently than any other individual. This was even truer in the United States (where 61% said that general counsel were involved in privacy risk evaluation) than outside the United States (43%). One of the survey report takeaways suggests that the difference may be due to the fact that “compliance is more difficult to discern in the U.S., where there may not be any specific law governing how data can be used.”

Bloomberg Law: Privacy & Data Security features a number of time-saving practice tools, including “chart builders” that assist counsel in comparing laws on breach notification, medical privacy, and other issues across jurisdictions. In addition to statutes, case law, regulations, agency guidance, and a news “heat map,” it also contains practical documents and forms for practitioners as well as detailed information on upcoming legislative enactments in the U.S. Congress, state legislatures, and in foreign countries.  Practitioners can keep abreast of global privacy laws, regulations, and enforcement actions through Bloomberg Law: Privacy & Data Security’s detailed country profiles, treatises, and portfolios crafted by expert practitioners.

“The data security environment is changing on an hourly basis,” said Craig Newman, chairman of the privacy and data security practice at Patterson Belknap Webb & Tyler LLP, the New York-based law firm. “Staying truly informed in this area requires substantial effort. Privacy attorneys will welcome any tool that’s effective in marshaling information for ourselves and our clients.”

Consistent with the survey’s findings on the importance of counsel in assessing privacy risk, respondents identified outside counsel as the most common third-party product or service on which they spent funds.

“In light of the current threat environment, organizations want quick, practical answers on data security,” said Lisa Sotto, head of the global privacy and cybersecurity practice at Hunton & Williams LLP. “This is an area that carries huge reputational and financial risk. With so much on the line, companies need resources they can turn to for fast and accurate information.”

The survey results are based on the responses of 347 corporate privacy professionals, including nearly 250 based in the United States. The full study, titled “Assessing and Mitigating Privacy Risk Starts at the Top,” can be accessed here.

www.clublibido.com (8)

Henry Sapiecha

This licensed Private Investigator has had sex with 60 prostitutes – Sydney’s ratepayers footing the bill

Someone's gotta do it. Fred Allen is paid to use the services of suspected brothels image www.intelagencies.com

Someone’s gotta do it: Fred Allen* is paid to use the services of suspected brothels. Photo: James Brickwood

Three years ago Fred Allen* was a taxi driver working 12-hour shifts to make ends meet.

Today, he is a gun for hire, having received tens of thousands of dollars from Sydney’s metropolitan councils in exchange for crucial evidence that is presented in court to help expose and close underground parlours. In short, Mr Allen has paid sex with prostitutes and ratepayers foot the bill.

“Never in a million years would I have imagined a job like this existed, let alone me doing it,” the 60-year-old said, with a hint of a smirk. “It’s a strange world for sure.”

Mr Allen confirmed he had completed more than 60 jobs at locations across Sydney www.intelagencies.com

Mr Allen confirmed he had completed more than 60 jobs at locations across Sydney. Photo: James Brickwood

When Sydney-based Lyonswood Investigations advertised for a “brothel buster investigator” in 2011, it was inundated with resumes from as far afield as Finland.

But while all applicants were willing to engage in paid, undercover sex, the agency’s managing director Lachlan Jarvis confirmed Fred was the only suitable candidate for the niche role. “He had his private investigator’s license, his oral and written English was excellent, he was willing to appear in court if needed … and he was single.”

Mr Allen’s maiden mission involved an undercover visit to an unlicensed brothel reportedly masquerading as a massage clinic. “I had never been to a brothel in my life so I was feeling quite nervous and apprehensive,” he recalled.

“I didn’t know what to expect. I reminded myself that this was a legal job exposing illegal activities. As far as first days at work go, I enjoyed myself.”

Since then, a core group of approximately 10 Sydney councils have called on his services. “The drill is always the same, he explained. “An email arrives in my inbox providing the name, address and description of the premises. I then head in, get the information required and file a written report to the office, which is forwarded to the council.”

Mr Allen confirmed he had completed more than 60 jobs at various locations across Sydney. In nearly every case, the establishments were “clean and comfortable” environments staffed almost exclusively by Asian girls who were in Australia to “study English”. Sexual services were given in all but three of the businesses he has visited, he said.

“The jobs flow in, on average, once every three weeks. If it spreads out that way, it’s perfect,” he said.

“But there are occasions when they all arrive at once. For instance, I was given three jobs to complete, for the same council, in the same week … and I’m not as young as I used to be.”

While Mr Allen said he enjoys the thrill of going undercover, he doesn’t believe there’s a book in his adventures.

“I’d like to recount a series of hair-raising adventures and humorous anecdotes but, the truth is, it’s all pretty run of the mill,” he said. “I’m hired as your regular, everyday customer who walks in, requests a service, pays the money, and then leaves with a smile. I’ve never had a knife drawn on me or anything.

“I can assure you, it’s far safer than being a taxi driver. It’s better paid too.”

Though their paths have never crossed, he is aware of one other agent like him in Sydney. Far from feeling threatened, he is “heartened” by the likelihood of there being more. “It would be nice to meet them one day,” he said.

To date, he has only shared his secret with one other person: “I told one of my mates … he was a bit incredulous and a bit envious, too.”

While Mr Allen acknowledges his work is not the sort of job you want everyone knowing about, he has grappled with the idea of coming clean with his two adults sons.

“I’m in a quandary,” he said. “I’ve considered sitting them down and telling them. Alternatively, when I kick the bucket, they’ll go through my paperwork and discover for themselves.

“Either way, I hope they have a good chuckle.”

* not his real name

Henry Sapiecha

THIS PROFESSIONAL SOFTWARE WILL ALLOW YOU TO MONITOR & RECORD ALL CALLS & TEXTS MADE BY YOUR EMPLOYEES & OTHERS

phone-texting by man image www.ispysite.com
PhoneSheriff is a mobile employee control software that allows you to monitor and restrict the smartphone and tablet activities of your employees with ease. You will finally be able to track their activities. You will be able to block those you see unfit.

Protecting your company is as simple as installing the software onto the compatible smartphone or tablet. The program will record SMS text messages, calls and other activities and then silently upload the data to your private online account using the Internet.

PhoneSheriff for Business (12-Month License)

look arrow

More info here

     PHONE SHERIFF SPYWARE BOOK COVER IMAGE www.ispysite.com

Do you need to monitor your child’s iphone or ipad? Then use the Phone Sheriff Investigator

 but don’t want to Jailbreak it?

Now you can thanks to the new PhoneSheriff Investigator Program. All you have to do is enable the iCloud service on the iPhone or iPad, then login to the PhoneSheriff online control panel to configure your Apple ID settings. Once the iPhone backs up to the cloud, you can then go to the online control panel to check your child’s activities and GPS locations.

look arrow

More info here

PHONE SHERIFF INVESTIGATOR SPYWARE BOOK COVER IMAGE www.ispysite.com

Henry Sapiecha

flashing-bright-blue-line-300x5

THIS SITE IS UNDER CONSTRUCTION-WATCH THIS SPACE

Welcome to Acbo Call Centre

UnderConstruction

Henry Sapiecha

pi spy glass line-13