This page contains a Flash digital edition of a book.
are obtained via hacking or social engineering—where someone talks an individual into giving out information he or she normally wouldn’t, and this can be avoided through properly train- ing employees on how to better protect the information. According to Nagle, several cases


on this issue in the last couple of years have stemmed from an individual at a company being tricked or hacked into giving up account credentials, which are used by the criminals to access the corporate account online and make large wire transfers. Te bank—see- ing the proper credentials have been used—approves the transfers and may not reimburse the amount lost upon report of the theft from the business. Often, banks are protected against these situations in the account agree- ments with the business client. Nagle said the cases and outcomes


Companies’ social media policies have come under scrutiny by the National Labor Relations Board. conditions of employment?


• Is protection for the communi- cation or activity lost because it included threatening or abusive language or behavior?


Cybersecurity Policies When your personal credit card


information is stolen online and you report the theft or unauthorized charges to your bank, it most likely will reimburse most if not all of the charges. Businesses, however, do not enjoy the same level of protection as consumers. According to Timothy Nagle, attorney for Reed Smith LLP, it is assumed that businesses have a level of competence and awareness that makes them more responsible against online criminal activity. However, small and midsize compa-


nies are increasingly becoming targets of online hacking and other criminal activity because they are dealing with larger amounts of money but often lack the sophistication of large corporations when it comes to cybersecurity. Te majority of metalcasting facilities in the U.S. have fewer than 100 employees and are considered small to midsize. “Everyone is a target, and if you are


a smaller company, some fraudsters will assume you are not prepared,” Nagle said. If your business is using online banking to pay bills, clear checks, do payroll, make wire transfers, etc., it is at risk. Usually it is the individual who has access credentials, such as the username and password, that unintentionally opens the business up to fraud. Accord- ing to Nagle, access credentials usually


vary but some considerations include: • Whether the bank offers options to the business to increase account monitoring or security


• Whether the employees were insuf- ficiently trained


• Whether the business’s banking practices and security were glar- ingly poor


• Whether the bank’s security or fraud monitoring practices were below industry standards or were not consistent with the terms of the account agreement or website


Businesses must have a proactive policy guarding against criminal activity involving online financial accounts and private company information.


April 2013 MODERN CASTING | 31


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60