LP Magazine

JUL-AUG 2019

LP magazine publishes articles for loss prevention, asset protection, and retail professionals covering shrinkage, investigations, shoplifting, internal theft, fraud, technology, best practices, and career development.

Issue link: http://digital.lpportal.com/i/1146652

Contents of this Issue

Navigation

Page 45 of 76

UNRAVELING THE MYSTERY OF THE DARK WEB 45 LP MAGAZINE | JULY–AUGUST 2019 - Organized Retail Crime (ORC) - see more details 5 visits across 3 locations. Last visit: 10 days ago. Prior shoplifting conviction observe James Brown Retail Loss Prevention Join forces with BlueWave Technologies and achieve the highest level of operations and results in the industry with our patent-pending, secure and scalable solution called FaceScope™. Real-time analytics and matching at the rate of 1.1M images per second. Fully - integrated 'No-trespass' script and audio recording feature. Automatically embed recordings into mugshots, making proof-of-action and and future access a snap. Built-in search feature. Integrate with compatible existing eye-in-the-sky camera systems. Integrate any third party or existing data base of mugshots. www.bluwavetek.com 800-636-1428 P o w e r e d b y like pressure from competitors or law enforcement activity. When these illicit marketplaces gain visibility, their operators often simply move outside the United States. In fact, most of the most prolific fraud sites technically exist on the surface web and often don't bother with the dark web. They use top-level domains based in countries with lax fraud policies, such as Samoa (.ws), Cameroon (.cm), Cocos Islands (.cc), or Oman (.om). Protecting Yourself from Cyber Crime Fighting back against cyber crime is really a war, and as in any war, you need to have a strategy. It is important to prepare a plan for deterring cyber crime and responding to an attack. This can make all the difference between a minor incident and a major financial and public relations nightmare. Understand your company's information systems. Use data inventory and data mapping to gain a thorough understanding of what you are trying to protect. Include all the obscure data sources that are easy to overlook. Classify the data. Some information is highly sensitive and valuable, while other information is not. You must create a clear process for distinguishing the various level of information sensitivity. Create clear guidelines for data access. Not every employee needs to have access to all the information in a company. Structure this access based on need. Secure the data. Use encryption and passwords to protect your information, regardless of its level of sensitivity. Define cyber crime clearly, so everyone understands. All employees must be aware of current threats and issues, including those affecting the company's customers. What reaches them could eventually reach you, so if they understand and report cyber Fighting back against cyber crime is really a war, and as in any war, you need to have a strategy. It is important to prepare a plan for deterring cyber crime and responding to an attack. This can make all the difference between a minor incident and a major financial and public relations nightmare.

Articles in this issue

Links on this page

Archives of this issue

view archives of LP Magazine - JUL-AUG 2019