Quantcast
Channel: News4Security
Viewing all 3496 articles
Browse latest View live

Jacksons Fencing help Eurotunnel

$
0
0

Jacksons Fencing Help Eurotunnel

Jacksons Fencing help Eurotunnel provide a safe and secure perimeter at their Coquelles terminal near Calais Jacksons Fencing one of the UK s leading designers, manufacturers and installers of security fencing and access control systems, has successfully completed 8.5km of security fencing and associated gates at the Eurotunnel Terminal, Coquelles, France as part of the Anglo French commitment to securing key parts of the site against illegal and dangerous migration activity. Located just 12.4km from the UK entrance to Eurotunnel in Folkestone and with a reputation for delivering certified and approved security fencing systems to other high profile sites of critical national importance, the family owned firm completed the project which included more than 40 pedestrian and vehicle gates over an eight week period, to meet a very challenging deadline. The initial project was for 5km of security fencing, the majority of which was originally specified to reinforce physical security measures already in place, while the remainder was to replace existing fencing.

The contract was awarded to two principal contractors with Jacksons responsible for 3.3km. However, due to the changing and escalating nature of threat posed by people smugglers operating in and around the Channel Tunnel railhead in Coquelles, Jacksons Fencing has installed a total of 8.5km in four key locations within the site which has a 41.8km perimeter.

The project involved Jacksons Fencing Contracts Manager, Steve Hancock, who oversaw the project from start to completion along with a 70 strong team, most of whom were based in Coquelles throughout the contract period. They were supported by Frederic Aubert, General Manager, Jacksons Cl tures, the company s operation in France, who ensured the fast and accurate exchange of communication between the British workforce and French client.

Peter Jackson, CEO of Jacksons Fencing commented; I don t believe that any of us involved in the higher end of the perimeter security industry subscribe to the idea of creating an anti-immigration fence as it has been dubbed by some, but rather to providing a protect and defend barrier which serves to keep everyone safe and Eurotunnel operating efficiently. Respective Governments have yet to arrive at a unified solution to the systemic causes for the global migration crisis. This new perimeter fencing is just one of many individual actions which collectively make a small but worthwhile contribution to help in what is a very real and ongoing humanitarian crisis and I m proud that Jacksons has playedits part in that.

Notes to Editors

About Jacksons Fencing:

Jacksons Fencing is a family business founded in 1947 in Kent.

Today, it operates from three UK locations; Ashford, Bath and Chester and employs over 240 people in the design, manufacture and installation of timber and steel fencing, gates, environmental noise barriers, bollards, automation and access control systems. Jacksons believe that by designing and manufacturing products for a long service life and backing them with industry-leading guarantees not only offers customers lowest lifetime costs but also benefits the environment in which we live.

www.jacksons-security.co.uk1

For further information:

Sam Harwood

sam.harwood@jacksons-fencing.co.uk2

+44 (0) 1233 750 393

References

  1. ^ www.jacksons-security.co.uk (www.jacksons-security.co.uk)
  2. ^ sam.harwood@jacksons-fencing.co.uk (www.professionalsecurity.co.uk)

The post Jacksons Fencing help Eurotunnel appeared first on News4Security.


Security advice at Christmas

$
0
0

The following security advice has come from our local Police Officer

Dear all,

Please, on the run up to Christmas make sure that you are security conscious. Please follow the following advice to make sure you have a Happy Christmas and a crime free one at that.

Most burglaries are carried out on the spur of the moment by opportunist thieves- they may see an open window or an easy entry point and take their chance.

Hiding spare keys outside your home is an open invitation to thieves. Avoid leaving keys in an obvious place near doors and windows.

When you go out, make sure you lock the doors and close your windows, even if you are going out for a short time.

Visible burglar alarms and security Lights are good deterrents to potential thieves.

Expensive items such as jewellery are attractive to thieves especially if they are on view from the outside.

Try to ensure that valuable items cannot be seen through windows. When buying new items like X boxes, tablets, DVD players or blu rays, don t leave the empty boxes on display near your bins.

Post coding your property can deter burglars because it makes it harder for thieves to sell. The police have a much better chance of returning property to its rightful owner following a burglary if it is marked.

Make a list of all valuable items and keep it somewhere.

Take pictures of all valuable items like jewellery and silverware and write down the serial numbers of your TV, video, hi-fi, home computer and camera equipment to help the police identify them should they be stolen and recovered.

Taking steps to increase security of your home will reduce the chances of being burgled, but should you return home and notice signs of a break in, don t go in or call out- there is a possibility the intruder may still be inside.

Go to a neighbour s house to call the police or use your mobile.

Have a great Christmas and New Year.

Regards

Pc 1146 Paul Le Pla

Rutland Police

Please help other local people find this page

Related

.

The post Security advice at Christmas appeared first on News4Security.

Dallas, Fort Worth orchestras cancel 2016 European tours

$
0
0

Dallas, Fort Worth Orchestras Cancel 2016 European Tours

Jaap Van Zweden conducts the Dallas Symphony Orchestra during its performance of Mahler s Third Symphony last May. (Ron Heflin/Special Contributor)

Updated at 11:30 a.m.: Revised to include full details of cancellations.

Both the Dallas and Fort Worth symphony orchestras have canceled European tours planned for next spring.

The DSO cited security concerns in postponing a two-week April tour in the Netherlands, Germany, Austria, Switzerland, England and Scotland. The FWSO said it s canceling a six-city tour of Spain because of presenters financial problems.

An official statement from the DSO noted an elevated risk to the safety of our musicians and their families, guest artists, DSO personnel and traveling patrons in making the decision.

Music director Jaap van Zweden also weighed in with this: As an individual, I continue to travel around the world for my various conducting engagements. However, I respect the decision that has been made, as the safety of our DSO musicians and our extended touring group is primary.

The tour was to have included performances in Amsterdam; Edinburgh, Scotland; Birmingham, England; Stuttgart, Germany; Basel, Switzerland; Vienna; and Madrid.

Repertory would have included concert performances of Act 1 of Wagner s Die Walk re, with soloists Michelle DeYoung, Clifton Forbis and Kristinn Sigmundsson; and the Shostakovich Leningrad Symphony.

The FWSO s Spanish tour would have been its first international excursion since a tour of Spain in 1989.

Stops were to include Alicante, Madrid, Murcia, Oviedo, Vitoria-Gasteiz and Zaragoza.

FWSO president Amy Adkins said several cities that had agreed to present the orchestra in their halls had backed out because they didn t get government funding they were expecting.

Naturally, the safety of our musicians, staff, families, artists and patrons are of the utmost importance to us, and this matter was under discussion, Adkins said, but that security concerns became moot.

As of three weeks ago, we learned that only two cities remained confirmed, and we required a minimum of five concerts for the tour to be viable, she said.

The FWSO has had money problems of its own, with management pleading reduced income in demanding salary cutbacks for the orchestra s musicians.

The musicians have been playing without a contract since the start of the current season.

The DSO cancellation had nothing to do with financial considerations, said Denise McGovern, its director of communications.

Scott Cantrell, former classical music critic of The Dallas Morning News, has also written for The New York Times and numerous music magazines.

The post Dallas, Fort Worth orchestras cancel 2016 European tours appeared first on News4Security.

LG’s robotic vacuum cleaner doubles as a security guard

$
0
0

LG's Robotic Vacuum Cleaner Doubles As A Security GuardBI Intelligence

LG introduced its latest robotic vacuum cleaner, the Turbo+, this week to compete with Roomba s and Dyson s robotic vacuums, Engadgetreported1 . The Turbo+ has a couple of new features including a Home-Joy feature, which allows users to direct the vacuum to clean a specific area through a smartphone app . The user just takes a picture of the area they want cleaned, and the Turbo+ cleans it.

LG also took a note from the from China-based Jisiwei s S+ robotic vacuum cleaner by turning the vacuum into a home security system .

The Turbo+ features three cameras, and sends photos to the owners’ smartphone if it detects movement while they re away . Turning the robot into a home security system makes sense given that home security is one of the most popular categories of smart home devices.

This story was originally sent to professionals just like you in this morning’s IoT INSIDER Newsletter by BI Intelligence, a subscription research service from Business Insider. Get 14 days risk free 2

Interested in getting in-depth analysis on this topic and others like it ? Here are a few ways to access our exclusive research:

  1. Purchase & download comprehensive research reports from our research store. >> Purchase & Download Reports Now3
  2. Try our INSIDER Newsletters risk-free .

    Every morning the BI Intelligence team will deliver you a daily newsletter covering everything you need to know in your digital industry.

    >> Start Now Risk-Free4
  3. Subscribe to an All-Access pass to BI Intelligence and gain immediate access to ALL of our expertly researched reports . As an added bonus, you’ll also gain access to all future reports and daily newsletters to ensure you stay ahead of the curve and benefit personally and professionally. >> Learn More Now 5

LG's Robotic Vacuum Cleaner Doubles As A Security GuardBI Intelligence

PS . Did you know…

Our BI Intelligence INSIDER Newsletters are currently read by thousands of business professionals first thing every morning .

Fortune 1000 companies, startups, digital agencies, investment firms, and media conglomerates rely on these newsletters to keep atop the key trends shaping their digital landscape whether it is mobile, digital media, e-commerce, payments, or the Internet of Things.

Our subscribers consider the INSIDER Newsletters a “daily must-read industry snapshot” and “the edge needed to succeed personally and professionally” just to pick a few highlights from our recent customer survey.

With our full money-back guarantee, we make it easy to find out for yourself how valuable the daily insights are for your business and career. Click this link to learn all about the INSIDER Newsletters today.6

References

  1. ^ reported (www.engadget.com)
  2. ^ Get 14 days risk free (bii_www.businessinsider.com)
  3. ^ Purchase & Download Reports Now (www.businessinsider.com)
  4. ^ Start Now Risk-Free (bii_www.businessinsider.com)
  5. ^ Learn More Now (intelligence.businessinsider.com)
  6. ^ Click this link to learn all about the INSIDER Newsletters today. (bii_www.businessinsider.com)

The post LG’s robotic vacuum cleaner doubles as a security guard appeared first on News4Security.

How to Respond in the Event of a Major Incident Advice

$
0
0

Samantha Hancock (Police, Crime Prevention Unit Manager, Nottinghamshire) writes: Recent events around the world remind us all of the terrorist threat we face, which in the UK is considered as SEVERE , meaning an attack is highly likely.

Police and security agencies are working tirelessly to protect the public but it is also important that communities remain vigilant and aware of how to protect themselves if the need arises.

The four minute film, Stay Safe: Firearms and Weapons Attack sets out three key steps for keeping safe.

The film is accompanied by an online information leaflet.

The film and leaflet advise that if you are caught up in an incident to run, hide and tell guidance which can be applied to many places and situations.

Link to video and advice page : http://www.npcc.police.uk/NPCCBusinessAreas/WeaponAttacksStaySafe.aspx1

Remember:

How To Respond In The Event Of A Major Incident Advice

Source: Broxtowe Community email.

References

  1. ^ http://www.npcc.police.uk/NPCCBusinessAreas/WeaponAttacksStaySafe.aspx (www.npcc.police.uk)

The post How to Respond in the Event of a Major Incident Advice appeared first on News4Security.

Shaky Leaves : John Penisten household, 1900 census Madison …

$
0
0

Found the 1900 census record of my maternal 3rd-great grandparents, John and Jane A. (Alderman) Penisten in the 1900 census of Monroe Township, Madison County, Indiana through Ancestry.com1‘s hints on my LeMaster & Allied Family Tree.

Shaky Leaves : John Penisten Household, 1900 Census Madison ... 1900 US census, Madison County, Indiana, population schedule, Monroe Township, enumeration district (ED) 96, SD 67, sheet 11B, dwelling 226, family 241, ; digital images, Ancestry.com (www.ancestry.com : accessed 20 December 2015); National Archives, Washington, D.C.. John was listed as a 62 year old farmer, born December 1838 in Indiana, who rented his farm. He could read and write and spoke English. Both of his parents were born in Ohio.

His wife, Jane, was 58, born September 1843 in Indiana. She could read and write and spoke English. Her father was born in Ohio and mother in Indiana.

She was the mother of 3 children, two of whom were living.

Until I looked at this record, I didn’t realize that there was a third child of this couple who wasn’t alive by 1900.

They had two daughters, Clara born March 1869 and Jessie born September 1870.

If you have any additional information on this family, I would love to hear from you.

References

  1. ^ Ancestry.com (ancestry.com)

The post Shaky Leaves : John Penisten household, 1900 census Madison … appeared first on News4Security.

Graver News | Latest Alternative News Headlines

$
0
0

1

Carey WedlerDecember 22, 2015 On November 13th, Colombian Minister of Health, Alejandro Gaviria, announced the upcoming government decree.

In addition to legalizing marijuana for medical and scientific use, the government promised to set specific guidelines for production, commercialization, and possession.

In 2012, the country decriminalized possession of up to 20 grams of

References

  1. ^ (gravernews.com)

The post Graver News | Latest Alternative News Headlines appeared first on News4Security.

Job Detail | Brand Manager – Buckinghamshire, UK

$
0
0

Brand Manager Buckinghamshire, UK

Company: Hobson Prior1
Location: Buckinghamshire
Reference: OD398982-QX
Closing Date: 21 Jan 16
Type: Permanent
Salary ( ): On Application
Benefits: 52K – 55K

Job Summary:

Would you like to work for an ambitious, international pharmaceutical company that is dedicated to investing in its employees?

An exciting opportunity has just arisen for a Brand Manager to join our client s business, offering extensive career progression opportunities and excellent benefits.

Requirements:

Would you like to work for an ambitious, international pharmaceutical company that is dedicated to investing in its employees?

An exciting opportunity has just arisen for a Brand Manager to join our client s business, offering extensive career progression opportunities and excellent benefits.

This is a permanent position, located in Buckinghamshire, UK.

As a Brand Manager you will:

Ensure that business objectives are met by operating marketing plans efficiently
Keep up to date knowledge of competitors activities and prepare the marketing and branding plans according, considering the factors that can affect the company s performance
Ensure budgetary objectives are met by monitoring and controlling promotional expenditures
Conduct and manage the promotional campaigns to meet regional objectives
Supervisor and measure the affect of company s brand on customers and improvement opportunities
Ensure that field teams deliver effective campaigns by engage and motivating
Ensure all the customer s issue are addressed and resolved as soon as possible
Liaise with office and field staff emphasising more on HELMs, MSKs and SF to prepare brand plans and drive company s brand performance
Ensure effective communication of brand strategy and values to internal and external brand stakeholders

Skills and Qualification:

2+ years of experience in branding in Pharma industry (experience in UK will be an advantage)
Good knowledge of use of all marketing tools
Sound interpersonal skills, communications and presentation skills
Ability to manage the skilled staff

Contact:

Please apply for the role of Brand Manager using the form below, or get in contact for more information.

Apply for more jobs on the Hobson Prior website2

Contact Information:

References

  1. ^ Hobson Prior (www.pharmiweb.com)
  2. ^ Apply for more jobs on the Hobson Prior website (www.hobsonprior.com)

The post Job Detail | Brand Manager – Buckinghamshire, UK appeared first on News4Security.


Cyber security in 2016: Cyber extortion, data breaches and legal reform

$
0
0

Cyber Security In 2016: Cyber Extortion, Data Breaches And Legal Reform

A lot has changed in the security industry over the past 12 months, including a rise in cyber attacks against high-profile firms1, the genesis of global cyber peace deals2 and the harsh realisation that no-one is safe from online threats.

Meanwhile, experts warned that cyber crime is no longer a problem for the IT department alone . It is a boardroom issue and it became apparent in 2015 that the consequences of a major hack can include financial ruin, job losses, extortion and loss of reputation.

The cyber crime statistics are hardly comforting . The UK government estimated that online crime now costs the country 27bn a year3, while a recent report by PricewaterhouseCoopers4 indicated that cyber incidents have risen by 38 percent since 2014.

Carl Leonard, principal security analyst at Raytheon/Websense, said that 2015 was a “watershed year” for information security. “Many of the evolving threats and security practices now emerging will be directly attributable to events in this past year,” he warned.

To this end, V3 asked a range of security experts and industry professionals about the security trends likely to emerge in 2016.

Breaches will continue
TalkTalk, Ashley Madison, Target, VTech, Experian and JD Wetherspoon make up only a small proportion of the businesses hit by breaches in 2015 .

It’s a list that no chief executive wants to join.

Unfortunately, the trend of consistent and destructive cyber attacks is going to continue into the next year. “This year we have seen major attacks against large enterprises, government agencies and even dating sites,” explained McAfee security expert Bruce Snell in a 2016 prediction report5.

“We’re no longer talking just about defaced homepages . Personal information, including credit cards, Social Security numbers and addresses, for millions of individuals have been stolen this year alone.”

Bharat Mistry, security expert at Trend Micro, agreed, warning that hackers and cyber criminals will develop more sophisticated techniques over the next year.

“In 2016 threat actors will seek to better understand user psychology than the technical nuances of an attack . These cyber criminals are primarily driven by a need to shorten the distance between them and their goal: money,” he told V3.

Cyber extortion
The rapid expansion of online tools available for purchase on the dark web, including ransomware and denial of service (DoS) programs, will increase the threat of extortion.

“Ransomware and DoS attacks will increase in frequency in the next year .

There have been a growing number of blackmail attempts, threatening a company’s resources with distributed DoS attacks if they do not paid a sum of money,” warned Andrew Tang, service director at MTI Technology.

“They do not demand high levels of technical ability and the rewards can be great . Many companies cannot afford lengthy downtime on their servers and will pay the sum demanded, even without any guarantee that the attackers will not return.”

Sean Sullivan, security adviser at F-Secure, concurred with this assetment, believing Windows-based threats will be more prevelant.

“I think cyber extortion will definitely continue to trend strongly in 2016, largely driven by Windows-based crypto-ransomware,” he told V3.

“We’ll definitely see more experimentation and I won’t be surprised if a stable scheme develops as a result . Recent encryption/extortion attacks aimed at Linux servers is a very worrying development.”

Politics will play a greater role

Cyber Security In 2016: Cyber Extortion, Data Breaches And Legal Reform

Countries including the UK, the US, China and Germany all met to discuss peace agreements in 2015 designed to curb cyber espionage6 and theft of intellectual property.

Paul Farrington, senior solution architect at Veracode, told V3 that politics will continue to play a vital role. “We will look to our leaders, think-tanks, trusted institutions and even brands for clarification on this issue and help to protect us in cyber space,” he said.

“In the UK, the government is currently weighing up individual liberties and freedoms against the need to secure the population, but there are contradictions in this discussion between advising people to use secure cryptography such that our communications can’t be monitored if necessary.”

Pravin Kothari, founder and CEO of security firm CipherCloud, explained that European politics will also play a bigger role in cyber security.

“Regulators have had much success defining privacy principles that shape how businesses will handle citizen information, for example the forthcoming Data Protection Regulation and the Safe Harbour suspension,” he said.

“The recent escalation in terror activities is also reviving policy-maker scrutiny on national security practices .

This has resulted in revived calls for weakening security tools and expanding surveillance powers.”

The Investigatory Powers Bill is currently facing scrutiny7 in the UK parliament and is expected next year.

Legal reform will take hold
Ross McKean, partner and head of data protection law at law firm Olswang LLP, said that the new General Data Protection Regulation8 (GDPR) will be one of the biggest changes next year.

“With publication of the final regulation expected early in 2016, the clock will start ticking on the introduction of the most significant changes to data laws for a generation across Europe in 2018,” he told V3.

“Revenue-based fines and mandatory breach notification laws are on their way . A paradigm change is required in the way organisations collect and use data and that will take time and effort.”

Greg Day, chief security officer at Palo Alto Networks, agreed that new security laws will affect many firms’ cyber strategies in 2016.

“The Network Information Security Directive and GDPR reform will have a material impact on cyber strategies in 2016,” he said.

“Businesses, whether part of critical national infrastructure or those that handle more than the expected 5,000 EU citizens’ records, will be required to have security capabilities aligned to current state-of-the-art capabilities, the latter regulation being aligned to their risk profile.”

The expansion of artificial intelligence
Mike Turner, vice president and chief security officer at Capgemini Consulting, explained that more practical use cases for artificial intelligence (AI) in security will emerge in the next year.

“AI has the ability to anticipate issues before they arise through threat analysis, threat detection and threat modelling,” he said.

“If a human manually checks systems monthly, depending on the timing of the attack it could be 30 days before analysis begins and complex logs would still need days or weeks to analyse.

“AI can ensure the company does not lose any further data and can react to the breach much quicker . The potential for AI’s development in this area is huge, but the biggest barrier in the year ahead will be how much we’re prepared to let it take control.”

The strengthening of passwords

Cyber Security In 2016: Cyber Extortion, Data Breaches And Legal Reform

There will be a bigger uptake of two-factor authentication and a wider use of biometrics in 2016, according to Mark James, security specialist at ESET.

“We will see a bloom in Internet of Things technology and uptake .

With the increase in mobiles and tablets keeping us connected in every way possible, a lot more devices will end up being connected and sending information to all corners of the globe providing a wealth of data waiting to be plundered,” he warned.

“I think we will have to see a bigger uptake of two-factor authentication, including a wider choice of all types of biometrics.”

Smartwatch security
More people will bring smartwatches and wearables into the workplace next year, which experts say could be a cause for concern.

“As more devices become connected, the security implications will grow .

Most of these devices will not be looked on as a security risk, but they can, and will, be exploited as any other connected device,” said Garry Sidaway, senior vice president of security strategy at NTT Security.

“Most companies have controls and processes in place to manage bring-your-own mobile devices like phones and tablets, but wearables and connected devices are not yet typically considered part of an organisation’s risk management strategy.”

Whatever happens in the security industry over the next 12 months, it is clear that companies need to be aware of the risks and prepared for the inevitable cyber crisis9.

References

  1. ^ V3: Top 10 cyber breaches 2015 (www.v3.co.uk)
  2. ^ V3: US-China cyber peace treaty on the horizon as Chinese hacking slows (www.v3.co.uk)
  3. ^ The Cost of Cyber Crime Report (www.gov.uk)
  4. ^ he Global State of Information Security Survey 2016 (www.pwc.com)
  5. ^ Threat Prediction Report 2016 (www.mcafee.com)
  6. ^ V3: UK-China cyber peace deal a ‘PR stunt’ that will do little to stop rising security threats (www.v3.co.uk)
  7. ^ V3: Snoopers’ Charter: Mozilla, TechUK and privacy groups challenge controversial bill (www.v3.co.uk)
  8. ^ V3: Tailored response to cyber crime needed as data protection overhaul looms (www.v3.co.uk)
  9. ^ V3: Tailored response to cyber crime needed as data protection overhaul looms (www.v3.co.uk)

The post Cyber security in 2016: Cyber extortion, data breaches and legal reform appeared first on News4Security.

Wales sees rise in number of people taking an entrepreneurial route …

$
0
0

Over 4,300 new businesses started with the support of the New Enterprise Allowance

More than 4,300 new businesses have been started by entrepreneurial jobseekers in Wales according to new official statistics released by the Department for Work and Pensions (DWP).

Figures reveal that a total of 4,320 new businesses in Wales have been created using the Government s New Enterprise Allowance (NEA) since it was introduced in April 2011.

In Wales the top five local authorities for start-ups being created are:

  1. Cardiff 580
  2. Swansea 440
  3. Carmarthenshire 380
  4. Caerphilly 280
  5. Neath Port Talbot 250

Across Britain 76,960 new businesses have been set up under the NEA scheme, which provides benefit claimants who have a solid business idea with seed funding and a business mentor.

The NEA helps jobseekers, lone parents and people on sickness benefits with a good idea to set up their own business.

People on the scheme get expert help and advice from a business mentor who will help them to develop their business idea and write a business plan.

If the business plan is approved, they are eligible for financial support payable through a weekly allowance over 26 weeks up to a total of 1,274.

Employment Minister, Priti Patel, said:

We want everyone in all parts of Britain, including Wales, to benefit from the opportunities being created by our growing economy.

Starting up in business requires funding, support and advice, which is exactly what we offer through the New Enterprise Allowance scheme.

This scheme helps claimants with a good business idea to become their own boss so they can support themselves and their families, and turn their lives around.

Secretary of State for Wales, Stephen Crabb said:

From antiques shop owners to coastal caf entrepreneurs, thousands of people in Wales are now achieving their dreams of becoming their own boss with the support of the New Enterprise Allowance.

This Government is giving the employers of the future the support they need to move away from a life on benefits and realise their entrepreneurial ambitions.

They are helping to steer Wales economic recovery in the right direction, creating more jobs for our country and more security for Welsh families.

The post Wales sees rise in number of people taking an entrepreneurial route … appeared first on News4Security.

Shdaow IT culture

$
0
0

Shdaow IT Culture

Shadow IT where IT is built and used inside businesses without explicit organisational approval is becoming increasingly widespread. In fact, Gartner claims that Shadow IT regularly surpasses 30 per cent of a company s IT spend and is the top concern for CIOs in 2016 due to its ability to lead to compliance failures and business risks.

The security issue is unfortunately not only a critical one but a cultural one, according to an IT security product company. When an employee casually uses an application such as Dropbox to transfer files there is likely to be little thought about the risk of potentially sensitive data whether that is customer contact details, financial information or intellectual property falling into the wrong hands.

Steve Watts, co-founder of SecurEnvoy1, pictured, says: Shadow IT is here to stay.

It is a cultural problem that needs to be addressed. Yet, shutting it down is now impossible; in fact, policies punishing the use of third-party apps would more likely push rogue users deeper into the darkness. The battle that can be won is to better educate staff and make Shadow IT an integral part of the company s wider security awareness program.

When CIOs search for other security layers to protect sensitive data within an organisation, it is best to turn to technologies familiar to their staff, the firm sauggests.

One such example is two factor authentication (2FA). The use of the technology has become widespread in the consumer realm, with consumers well versed in how to use 2FA and the importance of it to keep their own private data safe from prying eyes. The latest solutions incorporate near field communication (NFC) used in Oyster Cards and by Apple Pay allowing users to simply tap their smart devices to gain access to the information they need.

The company points out that many of the shadow IT applications downloaded by staff such as Dropbox, Skype and TeamViewer already have the option for 2FA.

By not only adopting 2FA for all BYOD and work devices, but reminding users to add this layer of security to the applications they are using for their business dealings too, would give IT managers piece of mind and is the answer to Shadow IT that until now has itself resided in the shadows, adds Watts.

References

  1. ^ SecurEnvoy (www.securenvoy.com)

The post Shdaow IT culture appeared first on News4Security.

Resolutions for security

$
0
0

Resolutions For Security

The New Year is a good time to get your house in order and check that your security is up to scratch. Dr Steffan George, pictured, development director of the Master Locksmiths Association (MLA1) a trade association for locksmithing suggests New Year resolutions to keep your home safe.

Resolution one: Carry out a full security check

Before you begin your home security, take some expert advice by asking a professional MLA-approved locksmith to carry out a security assessment.
This will involve inspecting the exterior of your property for any damage to doors or windows, and checking that all locks and any fitted security alarms are working properly and meet your insurance requirements. An MLA licensed locksmith may carry out this initial check free.

To find an MLA locksmith in your area visit www.locksmiths.co.uk2.

Resolution two: Home maintenance is vital

Any kind of visible disrepair like broken windows will stand out to would-be thieves, and could act as a marker identifying your property as a potential target.
Maintenance is vital as rusted locks and chains, cracked panes of glass, rotten frames and sills are items that opportunistic thieves look out for so it s essential to perform a thorough maintenance check.

Resolution three: Security investment can pay off

Finances are stretched over Christmas and throughout January, but it is worth remembering that investing in quality security items now may save money in the longer term by preventing a burglary. Dusk-till-dawn lights deter thieves and alert neighbours to any unwelcome activity, whereas indoor light timers effectively give the impression that someone is at home (ensure one is used upstairs). Make sure that any security features you invest in are of good quality, saving you money in the long-term and increasing the longevity.

For a list of security products that have been independently tested to help secure your home, visit: www.soldsecure.com.

Resolution four: Spruce up the exterior

Get out the shears, power saw and trimmer and cut back overgrown hedges, trees and bushes that can provide cover for burglars attempting to gain entry to your home, outbuildings and garden. Consider using exterior motion sensor lighting to expose anyone lurking around your property. It might even be worth considering gravelling a drive as the noise underfoot attracts attention and could deter intruders.

Resolution five: Don t make it easy for thieves

Lock any tools and items like ladders, garden tools etc.

that can be used to break into a property securely away. It is also worth considering when your locks were last replaced, where past owners or tenants may still have access to your home and if anyone might have copied keys without your knowledge. If you re worried, ask a professional locksmith to change your locks.

Burglars know to look for the hidden door key near the front entrance so don t hide spare keys under rocks or flowerpots, or above door ledges.

Instead give the spare key to a trusted neighbour.

References

  1. ^ MLA (www.locksmiths.co.uk)
  2. ^ www.locksmiths.co.uk (www.locksmiths.co.uk)

The post Resolutions for security appeared first on News4Security.

Sea change in data protection rules

$
0
0

Posted on December 23, 2015

Sea Change In Data Protection Rules

Leading Cornish law firm Stephens Scown LLP has warned businesses that they will need to ensure their data protection processes are robust enough to meet tough new rules which have just been agreed by the EU to unify data protection rules across the region.

Stephens Scown1 advises that almost all businesses will need to change how they deal with customer data in light of these new rules and that it is highly unlikely that any business will be compliant due to the scope of the changes.

The new General Data Protection Regulation is expected to be formally agreed early next year and come into force within two years. The regulation was agreed earlier than expected, taking some commentators by surprise.

Measures include higher fines for data protection failings up to 4% of global turnover or 20 million, whichever is the higher and mandatory reporting of any data privacy breaches within 72 hours of the incident.

Jowanna Conboye, intellectual property solicitor at Stephens Scown LLP, said: These new rules send out a clear message that every business must take data protection extremely seriously. The regulations call for privacy by design in other words, businesses must put privacy at the heart of their processes, not regard it as something that they bolt on at the end.

The data protection rules cover all aspects of data relating to both customers and employees and the use that companies make of personal details to build up customer profiles.

With companies conducting ever more business with customers online, privacy and security have become critical issues.

Conboye added: The steady succession of cyber security incidents that have hit the headlines has propelled data protection up the business and indeed political agenda.

It s crucial to appreciate that it s not just your own company s website and systems that need to be secure it has to reach along the chain to any partner businesses that process your data, such as website hosting companies and payment processors.

Companies need to review all of these arrangements and ensure that the contracts they have in place with partner businesses are robust and that responsibilities and liabilities are clear.

There is also a clear responsibility for businesses to ensure that they are open and transparent with customers about how their data may be used, and that they get consent for this where appropriate.

Companies that get their data protection wrong will be counting the cost the new fines could amount to very significant sums which could hit a business hard.

Because the new rules are a regulation rather than a directive, they will come into force directly in each country in the EU.

There will be no scope for individual countries to make any changes to them to water down the rules, although more stringent regimes may be introduced.

References

  1. ^ Stephens Scown (www.stephens-scown.co.uk)

The post Sea change in data protection rules appeared first on News4Security.

Cycle theft reminder

$
0
0

Cycle Theft Reminder

A bicycle will be on many children s wish-lists this Christmas; but it s also on many criminals hit-lists too. Bikes are ideal targets for thieves especially if they have been left unsecured or inside unlocked sheds. It takes minutes for an opportunist thief to spot an unlocked bike and make off with it and hundreds of pounds worth of Christmas present can be gone.

BikeRegister1, a UK national cycle database, is urging everyone who is considering buying cycles as Christmas gifts and those who already own bikes to take steps to keep them safe and protected from thieves.

James Brown, MD of BikeRegister, said: Don t let thieves ruin your Christmas and take action now to stop thieves from stealing your bikes.

You can register your bike for free at www.bikeregister.com2 and purchase one of our marking kits for added protection. Marking your bike with a unique code ensures that Police will be able to trace your bike back to you if it is stolen and recovered.

BikeRegister is a police-approved marking scheme with over 450,000 bikes already registered. The kit is the Metropolitan Police s preferred bike marking product and is used by officers at the many bike marking events that take place in all 32 boroughs across London (pictured: Hillingdon).

Insp Titus Halliwell, from the Met s Roads and Transport Policing Command, recommends the following tips to protect your bike over the Christmas and into 2016:

1) Property mark all bicycles in your household and register those details online with BikeRegister (www.bikeregister.com) keeping a note of those details safely for future reference.

2) Only use Gold standard accredited Sold Secure locks ensuring that the frame and both wheels are securely locked to a designated cycle parking stand

3) Remove all easily removable items such as lights and saddle pouches before leaving your bike unattended.

4) In the unfortunate event that your bike is stolen, report it to police in as much detail as possible including the frame number and ensure your BikeRegister account is updated which will flag the theft, sending out an automatic bike stolen alert via social media.

5) Only buy second-hand bikes from a reputable dealer.

Remember; if the price or offer is ever too good to be true, it probably is!

References

  1. ^ BikeRegister (www.bikeregister.com)
  2. ^ www.bikeregister.com (www.bikeregister.com)

The post Cycle theft reminder appeared first on News4Security.

Hello Kitty Website’s Security Leak Is Fixed

$
0
0

A security leak which exposed the personal information of 3.3 million Hello Kitty fans has been fixed, the brand’s Japanese owners have said.

Sanrio Co said it had “corrected” a security vulnerability on the SanrioTown.com website, which features the iconic white cat and a host of other characters.

The leak was discovered on Saturday by a security researcher, and an investigation is under way to find out how it occurred.

The Hong Kong-based company said that anyone who knew the internet addresses of “specific vulnerable servers” could have accessed personal information such as names and birth dates.

It said that encrypted passwords were also available, but no credit card details were at risk .

No information was stolen.

In a security advisory posted on its website, Sanrio said: “We investigated the problem and applied fixes, including securing the servers identified as vulnerable.”

The site is an online community for Hello Kitty enthusiasts and lets users play games, watch videos and keep up with news on their favourite character.

Almost 200,000 of its members of minors.

It is the second major data breach involving children in the past month.

VTech reported a breach that exposed the personal information of 6.4 million children around the world.

Police in the UK have arrested one man on hacking-related charges in that case.

The post Hello Kitty Website’s Security Leak Is Fixed appeared first on News4Security.


Phishing finding

$
0
0

Phishing Finding

Most, 87 per cent of employees who opened a phishing simulation email did so on the day it was sent. That means organisations have little time to catch a targeted attack aimed at multiple employees, it is suggested by an anti-phishing email product company.

PhishMe Inc released a report after data was gathered from eight million phishing simulation emails sent to 3.5 million employees of enterprise, to provide analytics showing how susceptible enterprise employees are to falling victim to phishing attacks the most common cyberattack vector in use, the US firm says. Also, the report suggests training can condition employees over time to spot, report and help defend their organisations against phishing.

The findings included:

67 per cent of those who responded to a phishing email are repeat offenders and likely to respond to another phishing attempt.
Business communication themed emails were most effective at phishing; those with the subject lines File From Scanner (36 per cent) and Unauthorised Activity/Access (34 per cent) had the highest penetration rates.

Through training, the firm suggests, employees can be turned into security assets that can serve as a layer of intelligence and defence against attacks.

Behavioural conditioning decreased susceptible employees likelihood to respond to a malicious email by 97 per cent after just four simulations.

Rohyt Belani, CEO and co-founder, PhishMe, said: Analytics resulting from the report reveal three very pertinent conclusions that enterprises remain vulnerable to phishing-driven compromises, they need to place more reliance on employees to help them defend their organisations, and consistent training turns employees into informants that can spot attacks before they turn into catastrophes.

About the study

University of Cambridge and London School of Economics and Political Science contributed to the report with analysis of data samples collected from more than 400 PhishMe customers, having conducted over 4,000 training simulations, during a period of 13 months.

To view the full findings, visit http://phishme.com/enterprise-phishing-susceptibility-report/.

The post Phishing finding appeared first on News4Security.

US retail fraud survey

$
0
0

US Retail Fraud Survey

Theft by employees, of stock and cash, is now among retailers top three areas of concern, according to the US Retail Fraud Survey 2015.

The survey suggests that alongside online fraud and return fraud, internal theft is a major area of concern for retailers and the biggest area of store loss. Concern about employee theft of stock has risen from 18pc in 2012 to 38pc in 2015. While recognising that cash theft is a problem, the study reveals that it has only increased from 24 per cent to 26pc this year and comes in second, administrative third with 23pc and shoplifting fourth with 11pc.

Published by Retail Knowledge1 and sponsored by intelligent cash handling product company Volumatic, the US Retail Fraud Survey 2015, now in its third year, covers the systems, processes and strategies of the US s top retailers.

Paul Bessant, Founder of Retail Knowledge who commissioned the survey, said: North Americans are more up front about insider fraud than their retail colleagues in the UK.

Its UK sister publication noted that internal loss in the UK may be under reported and comes in second as a concern, after outsider shoplifting.

James Harris, Commercial Director of Volumatic, added: Cash and merchandise losses caused by internal fraud are only part of the story.

When you factor in the costs and time spent in investigations and disciplinary procedures, not to mention the damage done to internal morale and external reputation the cost of insider fraud can be up to three times as much as the original losses incurred.

About the study

It represents 91 retailers with annual sales totaling $844.6 billion; 18pc of the total North American retail sector by sales value and encompassing 102,550 stores.

References

  1. ^ Retail Knowledge (london.retail-knowledge.com)

The post US retail fraud survey appeared first on News4Security.

Carmarthenshire Planning Problems and more: 2015

$
0
0

Another year has almost passed in the weird and wacky world of Carmarthenshire Council. I’m not writing an in-depth review of 2015, everything I have covered is available on this blog so a brief summary, or, to be honest, a bit of a ramble, will suffice.
This time last year the chief executive was rubbing his hands at the prospect of a 446,000 pay off1, safe in the knowledge that he, and a couple of his colleagues had got off scot free over the illegal payments scandal.

All that remained, was to mangle the 39 WLGA2 recommendations into something acceptable to themselves and ignore the call for a change to the toxic culture. All smugly achieved through death-by-powerpoint at the Extraordinary meeting3 in June.

Prior to that, as we know, the Labour group, as part of the ruling Labour/Independent administration, announced shortly after last Christmas that they (but not dear Meryl of course) would block any golden handshake for Mark James. Nothing to do with the approaching general election of course… Funnily enough, Mr James then decided to grace us with his presence for a bit longer and decided to stay4.

Entirely by coincidence, I’m sure, Kevin Madge was then knocked off the Leadership post and Labour crumbled. With Meryl and Mark refusing to countenance Labour’s Jeff Edmunds as leader (slightly too honest), and with Plaid Cymru eager to take power, Emlyn Dole stepped in, did a deal with the devil, or devils, and took the poisoned chalice. From a hopeful and promising opposition, the Plaid group soon assimilated themselves into the Mark and Meryl gang with new leader Cllr Dole even having his own little scandal, of the planning variety this time, to weasel out of.

That episode brought into focus yet again the vagaries and ineptitude of the planning process in the county and did nothing to improve public confidence. Recent opposition challenges to Plaid over their standard of leadership, as well as questions over the alleged fraudulent misuse of EU Coastal money, including the doctoring of evidence, were treated with a liberal coat of denial, subterfuge and whitewash. My question5 regarding, in my opinion, the wholly fraudulent payment to the Scarlets, in the form of ‘allowable expenses’ fell on equally disengenuous ears.

The Plaid leadership seemingly happy to trot out the pre-prepared script. To be fair, much of this pre-dates the present Plaid administration and the reported ill-treatment of whistleblowers has been a constant issue at Carmarthenshire Council. In fact allegations of this very nature, including, for that matter, the alteration of documents can be traced back even further into the mists of time, to events at Boston Borough Council, which I mentioned in this earlier post here6.

In my view, as long as Cllr Dole doesn’t decide to put the kibosh on any future golden handshake for the chief executive, or rock any boats, he’ll probably cling on until 2017. The rot set in years ago but with Mark James and the political arm of the regime, the Independents, still holding firmly onto the reins it continues to fester. The council have made moves over the year to outsource various services from Leisure to Social Care and Housing and currently have all ninety-six parks and playgrounds up for grabs.

Various invitations for ‘expressions of interest’ are currently simmering quietly away with the aim to hive off assorted services, with no guarantees that terms and conditions for transferred staff would remain the same. I expect this trend will continue and needs to be watched closely, Carmarthenshire is not known for it’s due diligence or transparency when it comes to its ‘preferred partners’. The proposed ‘wellness centre’ should already be ringing huge alarm bells for those familiar with County Hall vanity projects.

It’s also worth remembering as that council borrowing is already well in excess of a quarter of a billion, costing over 14m per year in ‘servicing’ and interest payments. The budget consultation is underway (ends on the 3rd January) and the cuts (let’s not use the word ‘savings’) are based on the council bean counters’ prediction of a 3.3% cut in the money they receive from the Welsh Government. This turned out to be 1%.

How this will translate remains to be seen but is causing confusion and uncertainty and makes one wonder if the public consultation is even more pointless than usual. There was no uncertainty however a few weeks ago when councillors rejected7 a paltry 10% cut to the allowances of a handful of their executive board colleagues. The usual budget pattern, as I’ve mentioned once or twice, is for a couple of red herring proposals to be initially included or, as a commentator in this week’s Herald eloquently puts it; “The usual form in Carmarthenshire is for Mark, Meryl and Co to announce impending plagues of boils, famine and compulsory slaughter of the first born every year, only for them to announce in February that the first born will be spared thanks to the heroic efforts of officers and the executive board”

As not all cuts had been identified, leaving a 2.1m black hole this year, the difference between the Cardiff/Carmarthen figures may be used to plug the gap. Alternatively, a 5% Council Tax increase had been factored into this budget, so maybe there’ll be room for manoeuvre here, giving Plaid some well needed PR in the new year. The massive 18.2m cut to the education budget over the next three years was somewhat unexpected and deeply alarming, and even more surprising given the recent announcement that the Welsh government was continuing to protect this budget.

Presumably this doesn’t apply to Carmarthenshire Council which likes to cherry pick when it comes to suggestions from Cardiff.. In addition to this are cuts to special education, the closure of libraries and adult learning centres. At a scrutiny meeting earlier this month, a Motion put forward by Labour councillors to defer consideration of the budget proposals until the situation became clearer was defeated.

The County Hall Ministry of Spin is, as ever, likely to escape the worst of the cuts with no sign yet that the ‘Carms News’ will be consigned to history. As a council led publication they have managed to involve the limited resources of no less than six other public bodies, apart from the police who withdrew their funding in 2014, preferring to support media of the independent and democratic variety. Whatever happens with the budget, and there will be more on all this in the very near future, I doubt if anything will become clear until after the festivities, in the cold light of January, or February.

For schools trying to plan ahead this must be a nightmare. You can be assured however, of plenty of spin, particularly with the Assembly elections fast approaching. On the upside, webcasts for full council are now well established and were joined this year by Planning and Executive Board meetings.

It’s just the starring cast which needs to change. Still no sign of the ePetitions page though, having been promised around twelve months ago. March 2015 saw the last communication8 I have had with Mr James and his solicitors, demanding the counterclaim damages (with interest) with vague threats of further action.

I remain resolute that I will not pay him a penny. With Mr James having secured a charge on my home, this will continue to be an issue, whether he’s an employee of the council or not.
In recent months he’s turned his legal attention to a couple of councillors who remain determined to ask searching questions, not something tolerated by Mr James. The unlawful ‘libel indemnity clause’ remains in the constitution albeit in ‘suspended’ form, with, I am informed, no plans9 to delete it any time soon.

2015 was also notable for the appearance of the independent Carmarthenshire and Llanelli Heralds, their investigative articles and observant opinion pieces have been a very welcome development for those struggling to hold County Hall to some sort of account. Their arrival has not been warmly welcomed by the council though, who have been, shall we say, a little uncooperative to say the least. So much for the ‘revised’ press protocol; the priority remains to bury bad news.

At least the track record of bullying local reporters and attempting to control editorial content has fallen on deaf ears with the Herald. I wish them all the best for 2016. We also saw the last post from Cneifiwr’s blog back in June, though eagle-eyed readers will I’m sure have spotted a few articles popping up here and there in that unmistakable style…the blog is still accessible of course and who knows, it may return one day….Pat Racher’s West Wales News is still going strong though, as is the blog of county Councillor Sian Caiach.

It would be great if a few more Carmarthenshire residents, or even councillors, picked up the blogging pen, or keyboard.

Whilst I’m here, if you have a spare few minutes, and agree with the sentiments, please sign my petition to abolish prayers at full council10, and there’s another petition available to sign11 for a few more days to curb unelected power and restore local democracy, a particular problem in these parts. I would like to wish all those who visit this blog (now approaching its seventh year) a very Merry Christmas and a healthy and happy 2016. Nadolig Llawen a Blwyddyn Newydd Dda
Diolch yn fawr iawn

Jacqui

References

  1. ^ 446,000 pay off (carmarthenplanning.blogspot.co.uk)
  2. ^ 39 WLGA (carmarthenplanning.blogspot.co.uk)
  3. ^ Extraordinary meeting (carmarthenplanning.blogspot.co.uk)
  4. ^ decided to stay (carmarthenplanning.blogspot.co.uk)
  5. ^ question (carmarthenplanning.blogspot.co.uk)
  6. ^ here (carmarthenplanning.blogspot.co.uk)
  7. ^ rejected (carmarthenplanning.blogspot.co.uk)
  8. ^ communication (carmarthenplanning.blogspot.co.uk)
  9. ^ no plans (carmarthenplanning.blogspot.co.uk)
  10. ^ petition to abolish prayers at full council (www.change.org)
  11. ^ available to sign (www.assembly.wales)

The post Carmarthenshire Planning Problems and more: 2015 appeared first on News4Security.

Is Amtrak at risk to a terrorist attack?

$
0
0

Is Amtrak At Risk To A Terrorist Attack?

Is Amtrak Security Failing Moving into 2016

Recent terror attacks in California and Paris have all of us talking about security in public places, but there is one vulnerable target in Boston and throughout the Northeast that is potentially being overlooked.

It s just before sunrise at a busy Station, already there s a reminder of the threat of terrorism.

Armed Homeland Security Police officers make an unannounced inspection.

They are part of VIPR (Visual Intermodal Prevention and Response) Transportation Security Administration Team and are working with Amtrak Police and their bomb sniffing dogs, looking for suspicious behaviour and explosives. Each officer carry s a radiation detector.

This periodic security operation, which takes place unannounced at train stations in the US raises an important question.

How likely is it that there will be a terrorist attack in the US on a train?

We have to expect it. That s the bottom line, said Sean Burke, head of the Centre for Resilience Studies at Northeastern University and a former Homeland Security official.

Train attacks are happening overseas and Burke said there is nothing in place to guarantee it won t happen in the US.

The passenger rail system is designed to be open, Burke said.

It s specifically put in densely populated areas, it s a system that is vulnerable really from the beginning of its trip to the end of its trip.

There is open access to stations across the US everywhere you look. There are no check points, security lines or baggage checks, like there are in airports. And passengers don t even have to present identification before they board, just a ticket.

The entire Amtrak system encompasses more than 21,000 miles of unprotected tracks and the rail line between Boston and Washington DC, the Northeast Corridor, carries the majority of Amtrak s passengers.

That is the heart and soul or our rail system in the U.S., said Congressman Stephen Lynch (D-MA), who has studied many of the terrorist attacks on trains around the world since 9-11.

If the terrorists were trying to disrupt and terrorise, that would be a prime target of those individuals, Lynch said.

When you see there are rail attacks in France or Russia or Japan or Spain or Britain that should be a message to us.
It is estimated that five times as many people ride the rail system as fly in airplanes every year nationwide, and experts say if you tried to install airport style security and screening in train stations it would bring the entire rail system to a screeching halt.

Solutions to the problem of passenger rail security may not be easy.

A 2011 Inspector General s report criticised how Amtrak and the Department of Homeland Security were spending security money, concluding the traveling public remains at risk for a potential terrorist attack at Amtrak s high-risk stations.

We need our security officials to be frank about the issue that the Department of Homeland Security, our first responders, they re not always going to be able to keep us safe, said Burke.

Like on the train in France this past summer, when it took the courageous acts of three American passengers to subdue an armed terrorist.

They are the first line of defense, Burke said.

It is every day citizens who are inevitably going to be the first responders.

A spokeswoman for Amtrak Police said the agency has partnerships with dozens of law enforcement agencies around the country and even employs two of its own intelligence analysts to assess and help respond to terrorist threats.

In addition, Burke said that private companies are in the process of developing new technologies to scan trains for explosives and chemicals before they are boarded.

Congressman Lynch is planning to host a rail security summit early next year, the details of which are still being worked out

Tags: , , , , 1234

Category: TERRORISM5

References

  1. ^ (www.mike-buss.com)
  2. ^ (www.mike-buss.com)
  3. ^ (www.mike-buss.com)
  4. ^ (www.mike-buss.com)
  5. ^ View all posts in TERRORISM (www.mike-buss.com)

The post Is Amtrak at risk to a terrorist attack? appeared first on News4Security.

Refund for 93-year-old hit by £23,000 bank card distraction theft …

$
0
0

The 93-year-old victim of a distraction theft has had the 23,000 stolen from him refunded by his bank.

The man was doing his banking at an ATM in the NatWest branch in St Peter’s Hill in Grantham, Lincolnshire, earlier this month when he was targeted by three men.

In a carefully-timed swoop by the thieves, the victim was distracted by one of the men, as another obtained the pensioner’s PIN number and switched his bank card as it came out the machine.

It was days later when the man tried to use his cards that the theft was uncovered and reported to police.

Officers from Lincolnshire Police said the victim’s cash was withdrawn from the account hours after the theft at about 2.55pm on December 14.

Today, the bank said it had refunded the pensioner’s money adding the elderly man had been the victim of “callous” thieves.

A spokeswoman for NatWest said: “Unfortunately our customer fell victim to a callous distraction technique whilst using an ATM.

“We have refunded all the money to the customer and continue to do everything we can to help the police identify the criminals.

“The safety and security of our customers is of utmost importance to us.”

Detectives, who released CCTV of the incident in a bid to trace the culprits, said the theft had been well organised and those involved had carefully selected their victim before striking.

Anyone with information is urged to contact the police by calling 101.

The post Refund for 93-year-old hit by £23,000 bank card distraction theft … appeared first on News4Security.

Viewing all 3496 articles
Browse latest View live




Latest Images