Sexual Assault Awareness and Stories of 4 Victims of Sexual Assault

Sexual Assault Awareness (1)

Sexual Assault is a silent pandemic in our contemporary society. It involves sexual actions that are carried out without the consent of the other party. It is a crime, and sexual assault affects the victim all around. This, sexual assault awareness must be carried out by you and me. Sexual Assault Awareness involves teaching people how to protect themselves from sexual assault, heal from sexual assault, and educate people to not be perpetrators of sexual assault. Read this article to read about sexual assault, sexual assault awareness, and stories of victims of sexual assault.

How To Prevent Workplace Theft

Workplace theft what your organization should know and do (1)

Workplace theft is a nightmare to every business owner. This threat refers to a property crime which occur within a work setting with intent to run down the business. It may involve company or personal property. For instance, if a customer’s car was stolen from a company’s car park regardless a cautionary disclaimer; it is a workplace theft. Similarly, if a business keeps experiencing inventory shrinkage at its warehouse, organized stealing is active there. As a business open its doors to different individuals who are perceived to have values that would assist to drive goals of such business, chances are some persons with ulterior motive will likely mix up, if the process is not watertight to detect the attempt. It is said, a thief at workplace will steal as much as the business permits. Workplace theft oftentimes is an organized crime. It requires well thought-out organized strategy. Business owners, insurance managers, corporate security risk managers’/asset protection practitioners, law enforcement agents, statutory courts, etc. have continue to device controls and mechanisms against this threat however, its trend has remained unabated. In most cases, criminal actors who are involved in stealing at workplaces are successful because of many factors which prominently include opportunity, motivation and rationality. Here are some hard beliefs about workplace theft: Thieves steal as much as the business permits. Workplace theft can be curtailed to barest minimum. Workplace theft is a craft, mastered by some persons. Employees and others steal from business for various reasons. 10% of workers may never steal from your company, no matter the condition. 80% of worker might steal from your company, if given the opportunity, or under motivation and rationality. 10% of worker will actively look for ways to steal from your company. There are about 90% chances that stealing would happen at your organization.  What may contribute to workplace theft include: Opportunity to steal Pressure from various sources Perceived chance of detection Workplace security culture Job satisfaction Personal greed Vengeance Rationalization Socialization/subculture Tone from the top -TFT Available markets for stolen items what can be stolen? Physical assets Sensitive information Money Time Peace Potential victims of workplace theft: Business owner Risk manager Employees Management team Your organization can approach this threat through prevention, detection & response. See brief highlight. PREVENTION: Carry out background checks on workers and other stakeholders Make the workplace ethical & friendly Show genuine care for workers Promote job satisfaction and job security Activate functional security controls through people, process & technology DETECTION: Maintain functional security controls Carry out periodic audit RESPONSE: Have a strong policy and standard Workplace theft must never be romanced Be consistent and firm in implementing the policy and standard In concluding this piece: note that thieves will always be amongst the workforce who prowl the labour market to seek hire. If your business grants them the opportunity, they would come in and settle.  These thieves, having settled at the organization can steal only as much as the organization permit through available or created opportunity. The recommended strategies to manage this threat should be built around prevention, detection and response. Opportunity for stealing at business place must be consciously blocked. ALSO READ: Benefits Of Employee Background Check

Cybercrime of identity theft

ImgResizer 20240727 2211 51816

Cybercrime is any criminal activity that takes place through the use of computer devices and the internet. The growing trend of identity theft has been a source of concern to many people, especially business owners who stand to risk losing so much whenever they suffer any attack from cyber criminals. There are many types of cybercrime but this article will focus on and briefly introduce one known as identity theft. And proffer some guidelines on how to avoid being a victim of it. IDENTITY THEFT: this is defined to mean fraudulently using someone’s personal information to obtain benefits in different forms; at the expense of the owner of such information. Some examples are; using another person’s personal information to get attention, and from it collect loans and credits, using another person’s information to have access to the person’s online banking or mobile banking application, then transfer monies belonging to such person to another bank account owned or controlled by the criminal, etc. This phenomenon is increasingly gaining popularity especially in cyber space where many innocent and ignorant people expose themselves. Another reason it is common in our modern society is because many people who reside in urbans and cities own bank accounts, and use more online transactions than physical one. It is also very common now to see people spend more time on computers, especially mobile phones doing different things. While using these computers, they sometimes give out many personal information such as date of birth, national identity number, bank verification number known as BVN, password and codes. Criminals in cyberspace are always hunting for this sort of information. When they have them; the owner’s identity will be stolen; theft and other crimes will be committed against such owners. Every act of fraud (that is, crime) thrives on weak controls which is called opportunity. With this in mind, the dark web guys (the criminals) prowl on cyber space; spying, hunting, exploiting and experimenting with many of the weak links. Oftentimes, they are successful. To avoid being a victim of identity theft see below; a few recommended guidelines. Use 2-factor authentication in all online accounts, including social media. Avoid accessing shared links from strangers + reconfirm shared links from a known sender. Avoid use of public wifi; if you must, do not use personal information while there. Avoid sharing personal information publicly on social media. You may wish to patronize software which provides security protection against identity theft. Do not rush to contribute to “social media solicitations” from your circle seeking help for emergency or other issue – make voice calls to the solicitor for confirmation. Do not share personal information or “sent code/pin” to those who would call on phone and claim to be agents from your bank or financial service provider. Do not disclose or click a shared link/code/pin from strangers who would claim to be “Admin” from a WhatsApp group you belong to. Call the Admins to reconfirm. Do not rush to send money to persons who would call you and claim there is “serious health emergency” involving your friend or family member. Request name and address of the hospital handling such emergency – if given, send some nearby whom you know to go for physical confirmation, otherwise ignore. Maintain situational awareness (that is, alertness) at all times. Identity theft is real. It is very common in cyber space where contemporary presence is more dominant. ALSO READ: Ethical Issues Of Artificial Intelligence In Healthcare