Global Investigators & Security Consultants
0333 6000 300

Monthly Archives: August 2015

Anti-Counterfeiting – More Crucial Than You Might Imagine!

  • August 26, 2015
  • 3 comments
  • The impact of counterfeiting on consumers and legitimate businesses is well illustrated in an short article on LinkedIn Pulse by David Howell, a brand protection and anti-counterfeiting expert.  Although it is written from a U.S. perspective his comments are universal as counterfeiting is a worldwide problem that affects all of us.

    AAEAAQAAAAAAAAKIAAAAJGM5ZGExM2MzLWJhNzgtNDIyMy1hOTQ2LWVlYTBjMTQ5MGNhZQDavid explains that counterfeits don’t just affect high end consumer products.  Virtually everything we buy and use can be faked, with knock-on effects to organised crime, employment and health.  If you want to gain an insight into counterfeiting and what can be done to counter this ever growing threat then this article is for you.

    https://www.linkedin.com/pulse/hot-topic-anti-counterfeiting-more-crucial-than-you-david-howell?trk=hp-feed-article-title-like

    read more
    by dave

Property and Equipment Seized at London Counterfeiter’s Premises

  • August 12, 2015
  • 3 comments
  • Surelock, acting on behalf of TRAP and together with officers from Southwark Trading Standards and Police, raided Unit 13, Matara Mews, London SE17 3DW, the premises used by the prolific eBay seller “elgenuk2014” who had been selling numerous counterfeits of our clients’ brands.  All offending stock, screen printers and equipment were dismantled and seized.

     Surelock will assist Southwark TS put together an evidence package in order that a prosecution may be considered.

     SAM_1467

     

    read more
    by dave

Controlling and Protecting Company Data in a Mobile World

  • August 5, 2015
  • 3 comments
  • In this increasingly data-driven world, corporate security is more important than ever before. This concept is even more prevalent with the rise of the modern smartphone. Although these devices are quite convenient, the chances of proprietary information becoming lost, corrupted or stolen have dramatically increased. An employee could leave a company and no longer be authorised to view private data or a phone may be lost and fall into the hands of criminals and similar fraudsters. Intellectual property theft is therefore a very real concern. When we combine these threats with ever-advancing mobile phone hacks, it becomes clear that powerful solutions need to be put in place. What are some of the latest systems designed to mitigate the risks of this data loss?

    XenMobile

    Like many other systems, XenMobile addresses the issue of mobile device management (MDM). Secure email, document sharing, cloud-based solutions and the ability to effectively wipe all data should a device be lost are some of the techniques that this software employs.

    Symantec Mobility

    This mobility suite offers protection at important data access points such as the device, the application and the data layers themselves. Proprietary systems help to ensure that threats such as malware, unauthorised viewing and leakage are adequately addressed. Another key benefit here is that company-centred applications can be located alongside personal apps; neither of which will interfere with the other.

    Druva

    Enterprise-grade security is a defining feature of the enterprise mobility systems provided by Drupa. Cloud-based storage is shielded from third-party eyes through the use of two-factor encryption. This will prevent any unauthorised individuals from viewing important data. Remote deletion capabilities as well as location monitoring can effectively deal with any threat as soon as it becomes known. All of these features are backed up with centralised monitoring; offering management and the end user superior levels of transparency.

    IBM MobileFirst

    IBM MobileFirst offers a number of security solutions which are based around the needs of the business. These include device security and content security. Furthermore, both applications and communications can be hidden from prying eyes thanks to robust levels of encryption alongside systems such as multi-factor authentication (amongst other methods).

    ManageEngine

    This company offers a framework known as Mobile Device Manager Plus. Permissions based upon the role of the employee, the ability to immediately wide remote data, geolocation tracking and the blocking of commercial applications while on company premises are a few mobile security solutions offered by ManageEngine.

    The Critical Concept of Encryption

    All of these systems share one thing in common. Each employs a proprietary encryption system to dissuade and prevent intellectual property theft from a mobile device. This is important, for many employees may use passwords that are considered to be rather weak. Should an employee copy data onto his or her phone and their PIN number be similarly vulnerable, fraud and theft are an even greater possibility. Whether accidentally or to view this data from the convenience of home with no bad intentions, the threat is just as real.

    In these and other cases, encryption will always play an important role. Not only should peer-to-peer (P2P) encryption systems be used, but there can also be times when the data itself is encrypted. This will require another password in order to be viewed. Such a concept is an excellent redundant security feature and many systems will make use of multiple levels of encryption.

    Increased Threats

    Ultimately, mobile security and intellectual property theft are both growing concerns. Due to the sheer number of these devices and the presumption that their presence within the corporate world will continue to grow, companies should take these possibilities very seriously. What also should be mentioned is the rise of 4G connectivity. As this allows massive amounts of data to be downloaded, the potential of such information to be compromised obviously increases. Whether from the loss of a device or an intentional breach of traditional firewalls, more innovative solutions need to be put into place. The examples that we have seen are only a handful of the solutions that now exist. Still, their methods will continue to evolve alongside the threats that will likewise advance.

    Mobile device management is an area that must be taken quite seriously by any company. Theft, fraud and data corruption can cost an enterprise untold amounts of money while placing their proprietary information in jeopardy. These solutions are effective ways to address and nullify such threats within real-world scenarios.
    Surelock Global Investigators and Security Consultants are also well qualified (with a wealth of experience and knowledge) to provide advice in matters of corporate and personal security.

    read more
    by alex

Government is Reviewing the Bribery Act

  • August 4, 2015
  • 3 comments
  • The Government is reviewing the Bribery Act after business leaders claimed it was making it difficult for British firms to export goods.

    The Business Secretary, Sajid Javid, is inviting companies to comment on whether the tough anti-corruption measures are “a problem”.

    Critics fear it is a way of weakening the law at a time when the Government should be clamping down on existing loopholes, and supporters of the Act say they are surprised by the move.

    Letters sent by the Department for Business, Innovation and Skills (BIS) invite industry leaders to comment on whether the Act has had an impact on their attempts to export. They also ask if guidance issued to help business people avoid problems under the Act is useful and for suggestions to clarify the information. BIS officials said the guidance that accompanies the Act, rather than the law itself, was the main focus.

    pg-1-bribery-3Following widespread international criticism of the UK’s failure to reform its ineffective anti-bribery laws, the Act was regarded as one of the most controversial laws passed by the last government.

    The Coalition boasted it was the world’s “toughest” anti-corruption law. But the Confederation of British Industry led fierce criticism of the Bill and argued it would restrict economic growth.

    Opponents continued to lobby against aspects of it after it passed into law in 2011. They claim UK law goes “above and beyond international standards” and puts British business at a disadvantage against their competitors.

    But the anti-corruption campaigner Transparency International said that corporate lobbying appeared to be the basis for the review rather than evidence. It said that 89 per cent of companies surveyed in the Government’s own research, released earlier this month, reported that the Act  had no impact on their ability to export.  The activists point out that no one has yet been prosecuted for facilitation payments in the UK and that there is a low risk of prosecution.

    But Neil Carberry, CBI director for employment and skills, welcomed the review.

    “Bribery is morally and legally wrong and businesses have been supportive of the principles of the Act. With the majority of other countries’ rules more flexible than the UK’s, some businesses are being put at a competitive disadvantage when operating in global markets,” he said.

    “That’s why we are pleased that the Government has decided to review the impact of the Act, which we’ve long been calling for. It should focus on how to tackle corruption while protecting the UK’s competitiveness.”

    Full article: http://www.independent.co.uk/news/uk/politics/anticorruption-campaigners-furious-as-government-considers-softening-bribery-act-10425362.html?origin=internalSearch

     

    read more
    by dave

10% of EU Clothing and Footwear Sales are Counterfeit

  • August 3, 2015
  • 3 comments
  • A new study by the Office for Harmonization in the Internal Market (OHIM) states that counterfeits account for nearly 10% of the total sales in the EU textile and clothing sector.  This equates to more that EUR26bn (US$28.8bn) and up to 363,000 jobs being lost per annum due to counterfeit clothes, shoes and accessories.

    The European apparel and textile confederation Euratex is urging the EU to take action in the fight against counterfeiting and piracy by combating the problem both within the EU and by ensuring that imported counterfeit clothing are intercepted and perpetrators brought to justice.

    Full article: http://www.just-style.com/news/fakes-take-10-of-eu-clothing-and-footwear-sales_id125841.aspx

     

     

    read more
    by dave

Stay Safe: Three Simple Ways to Improve Your Personal Security

  • August 1, 2015
  • 3 comments
  • No matter where you live in the world there are potential threats to your home, to your personal security on the streets, and to your identity online. You only have to turn on the news or read the papers to see the increasing number of security issues the we face these days. However, a few simple adjustments can make all the difference to you and your family’s security. Read on for some simple yet highly effective preventative strategies that will help you to stay safe.

    Protect Your Home

    Home security is a serious issue as break-ins not only put your belongings at risk of theft, but they can also pose a safety risk for you and your family. An estimated 33% of burglars gain access to a property through the front door and 7% of all burglaries result in violent crime against someone who was in the home. Some simple measures will help to update the security of your home and make it less of a target to thieves. You can start by making sure that all windows and doors have a secure locking system. An alarm system along with CCTV cameras on the exterior of your property will further help to deter people from breaking in. You can also use security lights around the perimeter of your property. These security lights can be motion activated in order to illuminate the area as soon as someone comes within range.

    Stay Safe Online

    It’s important that you take measures to stay safe when using the Internet too. A study by CIFAS reported that of all recorded fraud cases, a massive 47% of those were some form of online identity fraud. You can stay safe online by avoiding giving out personal details like your address or birth date. Make sure that your personal social media pages, such as your Facebook are set to private so only close friends and family can see your personal updates and photographs. Ensure that your passwords are hard to hack by choosing a selection of letters and numbers and avoiding using simple passwords such as one word dictionary letters, names and places. It is also a good idea to have different passwords for different accounts so that if one does happen to be hacked the rest of your accounts remain secure.

    Internet users should also be aware of phishing scams. These are where a fake email is sent asking for personal information such as pin codes, dates of birth or addresses. A bank will never ask for personal information via email. If in doubt, stay safe and contact the company who you think the email is from directly, and report the email to your service provider if necessary.

    Be Street-Wise

    Be street smart by choosing to walk in well-lit safe areas, and by avoiding walking in dark places alone at night. Keep valuables, particularity mobile phones and digital devices out of sight when walking alone, and be wary of keeping wallets and purses in your pocket in busy areas, as you could be easily pick pocketed. If you have concerns over your safety when travelling then it may also be worth taking self defence classes in order to better protect yourself should you be involved in an incident.

    These are just a few of the many things that you can do in order to stay safe in your home, on the streets and online. Surelock are one of the leading companies in the personal and business security field. They provide a range of services including surveillance services and private investigation services in harassment, blackmail and kidnap and burglary, arson attacks and stalking cases. They also provide protection against violence training courses for your security needs.

    read more
    by alex