Skip to main content
All Posts By

robintek

Risks of Doing Business Online

By Risk Management Bulletin

rr-0316-3Over 40 percent of the world’s population uses the Internet. Your potential to reach your existing and new customers expands when you get online, too. You’ll be able to sell your product anywhere you can ship it, meet virtually with clients from around the globe, connect personally with customers and share important information about your business, including the hours you’re open or your menu. Today, being online is almost essential for a small business, but there are risks. Before you run to set up a website, social media accounts and e-commerce site, learn about the risks of doing business online.

Internet Security

When you collect personal information, including addresses and credit card numbers, you have the responsibility to protect that data. Hackers who target your website could gain access to sensitive information and put you at risk for a lawsuit. Understand firewalls and other protections you need and have them in place before you open for business.

Legality

Depending on what goods and services you offer, you may be prohibited from selling or shipping to certain areas. You’ll also need to collect and pay taxes, which vary by country, state and even city. Be sure you understand the laws before you do business online.

Fraud

Accepting credit cards or bank information over the phone is risky. You don’t know if the person buying the item actually owns that financial information. You also could also receive false shipping information, which means you lose that merchandise and its income.

Time Commitment

Remember that you’ll need to update your online profile regularly so that your information is fresh and accurate. Be prepared for trolls, too, as your audience expands. These activities require time, so decide now if you have enough time to handle an online presence.

Searchability

Your website, blog and social media posts compete with thousands of other voices for attention. If you don’t use the right keywords, no one will find you, and you’ll be wasting your money. Be sure you have the right resources to maintain your company’s searchability before you commit to going online.

Ongoing Cost

In addition to paying for your website and web hosting, you’ll need to pay someone to update your online presence regularly. Consider whether or not you can afford this expense and if it will improve your bottom line.

Your small business can benefit from a website, e-commerce site and social media accounts. Know the risks and prepare accordingly to ensure you and your customers are protected.

Three Careless Conversations That Threaten Your Small Business

By Risk Management Bulletin

rr-0316-2Like a small leak can cause a major flood if it’s not caught soon enough, careless conversations can ruin your small business. It only takes one casual comment or discriminatory joke to set off lawsuit and ruin your company and reputation. Take note of three types of conversations and avoid them as you communicate with your employees, partners and clients and protect your livelihood.

    1. Empty Threats

      It may be tempting to motivate employees by threatening to demote, suspend or terminate them if they don’t meet sales or performance goals. However, those threats are considered bullying if you don’t plan to follow through or are legally not allowed to follow through with the threat.

      Rather than make empty threats, be sure to spell out the expectations you have for employees and the consequences in your employee manual. Refer to that manual when you deal with your employees, and make sure your managers use it, too, as you prevent bullying and empty threats.

    1. False Promises

      To boost morale or encourage team members to perform at their best, you may say things like “I see a future for you here” or “You’re going places.” These remarks could be considered contracts whether they’re made in writing or verbally and even if you said them but don’t intend to follow through.

      Making these false promises could result in a lawsuit if the employee is fired or does not receive the promotion. Rather than make a false promise, set up a tangible reward system with extra bonus pay, time off or branded products for your employees who achieve specific goals. This system boosts morale, employee retention and productivity without making false promises.

  1. Inappropriate Comments

    A simple joke or comment about someone’s race, sexual orientation, disability, age, religion or gender might be funny in the moment. You won’t be laughing, though, when you’re sued.

    Be vigilant about avoiding any kind of conversation that could be considered offensive or insulting to your employees, customers and anyone. If you’re not sure about what’s considered inappropriate, refer to the Equal Employment Opportunity Commission’s website.

Water cooler conversation, private emails and even casual remarks made in passing could be the downfall of your small business. Set an example for everyone in your company by modeling the right conversation. Make sure your managers and supervisors are aware of these three conversational threats, too. You should also do regular trainings for your entire company as you encourage others to avoid careless conversations and protect your small business.

Tips for Organizing Receipts for Your Tax Return

By Risk Management Bulletin

rr-0316-1Preparing for tax season can be overwhelming for a small business owner. A good system that organizes receipts makes a big difference and helps you file an accurate tax return and protect yourself in case of an audit. Try these tips this year.

Keep Every Receipt

The Cohen Rule allows taxpayers to provide reasonable estimates for expenses when they can’t produce actual records of their expenses. IRS Publication 463 also states that taxpayers don’t need to save receipts for expenses under $75. However, saving every receipt allows you to prepare an accurate tax return and helps you win an audit.

Take Notes on Your Receipts

To prevent you from mixing business and personal expenses, record the details of each purchase on your receipts. Note what you purchased, and include why you bought the item. This step is especially important for entertainment and meals where you need to prove that you took clients to lunch and talked about business.

Use a Business Journal

Vending machine coffee and certain other business expenses will not have a receipt. Use a business journal to track those random expenses. Take a few minutes at the end of each day to write down all your daily expenditures on your Google or Outlook calendar. Print those pages at the end of your tax year to show all the miscellaneous expenses you purchased throughout the year.

Don’t Depend On Credit Card Statements or Canceled Checks

You do want to save your credit card statements and canceled checks, but they don’t always prove an expense. For example, your statement could show that you spent $400 at Staples, but you need to have solid proof for the IRS that you used that money to purchase office supplies for your business and not invitations for your daughter’s birthday party.

Avoid Using Cash

Cash is easy to spend and difficult to track. Use your debit or credit card instead as you ensure good record keeping. If you do have to use cash, be vigilant about recording details on the receipts or in your business journal.

Scan and Store Receipts for at Least Six Years

The IRS can perform an audit up to six years after you file your taxes. Be prepared when you scan your receipts before they fade and then store them electronically. Be sure to save them to Dropbox, OneDrive or another cloud-based storage option instead of relying on a hard drive that could crash and take your receipts with it.

Your small business may never be audited, but you want to be prepared. Keep good records and organize your receipts this year as you reduce your risk of a high tax bill after an audit.

Trends in 2015 Claims

By Workplace Safety

wc-0316-4Knowing how the machine is working from every perspective in workers comp policy means that you can better make a budget and plans for the future. Workers comp has only existed since 1901, and you should be aware of the major reforms that have come since then. It’s clear around the country that we still have a long way to go before providing workers with the care they need in the most efficient manner.

The numbers rolling in from 2015 come with good news and bad news. One recent study in California showed that while workers comp claims were down, suggesting that both employers and employees were practicing smarter habits, the severity of the claims seems to be headed up. We’ll look at some of the numbers in context.

This report analyzed about 3,500 claims and found that costs for workers comp have declined slightly due to the number of people filing has declined. However, due to the serious nature of the injuries, it has not declined nearly as much as you might suspect. Between 2005 and 2014, paid claims increased by just under 5.5% due to the sever nature of the injuries. One theory of why this is happening could be because the work force in California is aging, with more people at risk for bodily harm in all types of working scenarios. The survey also shows that claims that go to court which are only about 20%, account for more than half of the total amount paid out for every claim. The whole point of workers comp is to eliminate lengthy lawsuits for the benefit of both the employer and employee.

Meanwhile in places like Florida, Michigan, and Illinois, there is a lot of attention being paid to how claims are processed and what’s contributing to the problems in the system. Flint’s water crisis has sparked debate, and talk of reform is up. Some see this as a political matter while others see it as a case of simple greed. This may or may not cause country-wide changes during this election year, but it suggests that there will be efforts to fix the holes in the future. Workers comp only gets so much attention, but that doesn’t mean that elected policy makers aren’t against reintroducing the topic when it seems fit to garner public attention.

Regardless of the trends, safety does need to be at the forefront of your mind for the upcoming years. If you do have an aging workforce, then you may want to invest in more gear and training to promote safety. Keep your communication level up with employees about major stories, and always be aware of new measures you can take to care for your employees.

Adjusting an Injured Employee’s Workload If They’ve Been Injured

By Workplace Safety

wc-0316-3There is no exact science for adjusting an injured employee’s workload, but there are factors to keep in mind before you start doling out the assignments. Your employee can and should return to the job even if they can’t perform their former job entirely, but not necessarily to their exact same role. Here are just a few tips before you begin the transition process.

Be Prepared for Some Bumps

This isn’t necessarily going to be easy, and it can get frustrating. You can’t shut down your whole operation just because one person needs special treatment. However, you owe it to the injured employee to work with them, not to mention you risk your chance of being sued for wrongful termination should you decide that the person’s work schedule or duties aren’t working out.

Rethink Your Schedule

This is where you need to practice some major flexibility. Can the employee work part-time or can the full scope of their duties be partially reduced? Can they perform work-related activities at their home to prepare for coming back to work? Talk to them, give some options and make it work.

Rethink Your Structure

If you don’t have hard and fast rules set for workers comp injuries, even if it’s never happened before, then you need to sketch out a plan. While every worker and injury is different, corporate guidelines (which hold true for everyone across the board) gives workers a sense of comfort in the process. Your rules should have timelines and extremely clear expectations. Also, they should not attempt to treat the worker like an invalid. Most employees aren’t trying to get out of doing their job. Increasingly giving them more work as they’re ready will encourage them to return to their full capacity sooner rather than later.

Involve Other People

You should be consulting with the employee’s doctor to get accurate information about their progress. Also, the employee themselves should be able to let you know what they’re capable of based on their personal recovery path. Once the employee feels needed and trusted again, this may motivate them and stimulate their ability to heal even faster.

Planning Ahead

A single claim can get expensive between time and money lost, and you may need to spend additional money for extra equipment or accommodations to an employee return. However, you likely can’t afford to fight an expensive lawsuit if you were at fault for an injury. Liable parties may be required to pay for care that stretches on for years. This is just the chance an employer takes, so you need to plan ahead with a conscientious budget for salaries, care and adjustments when they come back.

How Well Do You Know Your Coverage: Current Fraud Cases and You

By Workplace Safety

wc-0316-2Owning a business or even managing one comes with a huge set of responsibilities, but there are probably only a few that really get attention on a daily basis. Sometimes meetings are called to bring attention to this matter or the next, but it likely gets buried along with the information you don’t regularly use. How can you expect to know your workers comp coverage policies if it’s not something on the pressing list of concerns for the day? Here are a few tips to understanding more so you can have fewer exposures to fraud.

Workers comp is fortunately not extremely common, and the number of cases filed is down. Most people don’t know anyone who has ever filed, and you may have very limited exposure to it aside from forms full of words you’re likely never going to read. However, the most important factor here is that workers comp involves money which is a powerful incentive for people. Recently in California, there were doctors and providers who were uncovered in a large-scale fraud operation that involved receiving kickbacks for the treatments and prescriptions given to mainly Latino workers. This was all done via a highly advanced organization with employees all the way down the chain of command placing flyers in trucks to call a number if they’d been injured. There is also interpretation fraud discovered at the end of December with people billing for services that weren’t necessary for injured parties. And of course there’s fraud of employees faking an illness.

Obviously you can’t stop these types of things from happening, but if you think you’re not affected by all of this, then you’re mistaken. Fraud pushes everyone’s rates up and knowledge really can be the key to stopping it from happening at all. Understanding your policies can prevent fraud before it happens. When you keep up with new laws, reforms and the current political landscape, you increase the chance that you’re doing what you can do in terms of taking responsibilities for your employee’s welfare. It can also make you more likely to detect patterns that may signify something fishy going on.

In the case of the fraud operation, it was very well planned and everyone knew what was expected of them. However, the way they were caught is because they wanted to expand. Criminals are not above making a mistake, and your mindfulness can be just the key to noticing an anomaly in an employee. Also, you have rights guaranteed by your particular coverage which can also be your saving grace. You do not have to be a victim of fraud when you know your coverage and who your employees are.

Idle Hands: the Dangers of Injury If Employees Have Too Much Free Time

By Workplace Safety

wc-0316-1Employees who don’t have a lot to do will inevitably become bored which can then lead to frustration. It might cause them to make careless actions or resent the few tasks that they do need to do. The law is not entirely clear on what will happen if an employee injured themselves if they were goofing off or playing a game when there was nothing else to do, but it is best practice to keep them as engaged as possible. If not you could be in a war with a situation you don’t have time for.

Consider a case where laborers were on the job and found an old bowling bowl in Pennsylvania. One thing led to another when the bowling ball smashed and the shard hit someone’s eye. Or consider an employee who wanted to chill out in an air conditioned truck in South Dakota and convinced his co-worker to leave the vehicle for a while. Once the co-worker came back, the sufficiently chilled man decided to dodge his co-workers potential physical punishments by running away. When he tripped, he claimed workers comp for this.

Judges both awarded people compensation in these cases, though the bowling ball case was overturned by the workers compensation board. The bowling ball case had a mitigating factor of a supervisor who did tell the employees to stop messing around with the bowl before the injury had occurred. Had that supervisor not been there, the courts generally do not see a momentary mistake as a means to deny care for the employee.

Whether or not you agree with these decisions isn’t really the point. You need to ensure that employees do have productive tasks and that there are specific rules on horseplay. Busy employees not only are less likely to find trouble, but are also more likely to take pride in what they’re doing. This is not to say that people can’t blow off steam and have fun because sometimes that’s necessary in the workplace too. However, there needs to be guidelines in place as to what is and isn’t acceptable. If you witness employees being just a little careless on the job, then it can’t be ignored.

The bottom line here is that even you dispute and win a case over an idle employees hijinks, it can eat up a lot of time and money. Days should be structured with deadlines when necessary. When employees are waiting for machinery or certain processes to be complete, there should be a list of approved activities that they can do. Don’t try to limit their freedom entirely though as this will cause further annoyance and resentment.

3 High-Profile Hacking Stories Worth Reading

By Cyber Security Awareness

cyber-feb-2016-4If you know much about cyber security, then you know that hacking isn’t as exciting a subject as movies and television make it out to be. Most “hackers” are just guessing passwords or stealing credit cards. But, now and then, along comes a news story about hacking that can actually hold your attention. Here are some interesting high-profile cases in recent headlines:

British Agency Can Hack Any Phone With A Text

Whistleblower Edward Snowden has reported that British Intelligence Agency GCHQ can now hack smartphones by simply sending a text message to the phone. According to reports, there’s no way to prevent this hack, which allows the GCHQ to conduct audio surveillance through the phone, browse the owner’s files and web history, take pictures with the phone, and track the user’s GPS location. This is made possible, according to Snowden, through the “Smurf Suite,” which allows the agency to turn smartphones on and off, use the microphone and geolocation, and hide all of its actions from the user. Snowden says that the NSA has spent around $1 billion USD trying to develop similar technology.

Security Researcher Wins $24,000 Bounty From Microsoft

The general impression that we have of hacking is that it’s flat out illegal. In truth, hacking itself isn’t illegal at all. If you ever go into a “head shop,” they’ll let you know that they’re not selling “bongs,” they’re selling “water pipes.” Like a water pipe, hacking is just a tool, and what you use it for may or may not be legal. One of the legal things you can do with hacking is claim bounties from companies like Microsoft and Google, who offer rewards to people who can find security vulnerabilities in their websites, apps and services. A security researcher recently cashed in on a $24,000 reward for finding an easy hack through OAuth, the authorization code used for Outlook.com and Microsoft Live accounts. If you ever get tired of your dayjob, digital bounty hunting might be a fun career choice.

15 Year Old Gets 6 Months For Hacking NASA

A 15 year old hacker known as c0mrade made news last year after hacking NASA, leading to a 21-day shutdown of the computers supporting the international space station, and poking around in Pentagon weapons computer systems, intercepting thousands of emails and stealing passwords. After six months of plea-bargaining, he’s finally been sentenced to six months. Had he been tried as an adult, he’d be looking at quite a bit more time than that.

The everyday threats we have to deal with in cyber security are kind of ordinary, but these three stories prove that hacking really is just like the movies every now and then.

False Fears and Legitimate Threats

By Cyber Security Awareness

cyber-feb-2016-3The main thing to keep in mind when comparing real threats to false flags: The most boring interpretation of the truth is usually the one that’s closest to being correct.

Remember Y2K? Everyone was worried that turning our computer clocks over from 1999 to 2000 was going to crash the whole system and leave the world in chaos. Some companies even made a pretty penny by selling software that would make your system “Y2K compliant.” Then what happened when the clock actually turned over? Absolutely nothing at all.

All that wasted time and energy spent fretting over something as simple as a change of date, and the world just kept on turning.

We need to be able to distinguish between a real threat and an imaginary threat for the simple reason that managing those threats demands that we draw upon finite resources. The team that you have chasing after false alerts are going to be too busy to handle actual threats to your data. Skilled cyber-security professionals are in short supply, which means that even if you have it in the budget to double your current cyber-security staff, the candidates might just not be out there. You might need to make it work with the people you already have on board, and that means spending less time chasing after false alarms.

Here are some steps we can take towards wasting fewer resources in cyber-security:

  • Let the software do its job

Preventive antivirus software is a good start, but it’s also a good idea to cross-check with regular scans. This is common sense, but you’d be surprised at how many people don’t do this. A prevention-only based approach is going to lead to longer infection dwell time.

  • Follow your security team’s lead

You hire people so that you have less to do, and you’ve likely discovered that you tend to get the best results when you give your staff some breathing room and let them use their own judgment. Unless you’re a cyber-security professional yourself, there’s no reason to micromanage how your security team handles their responsibilities.

  • Don’t stress about far-fetched threats

You probably don’t have members of Anonymous working all day to crack your system. Don’t stress about it.

The truth is that cyber-security is something that a good security team and some professional-grade software can manage. It seems like every few years the business world goes into a panic about Y2K or hackers or some supervirus ravaging systems across the globe. The truth is that leaked passwords and garden-variety malware are your main concerns.

Are Phones and Devices High-Risk Points?

By Cyber Security Awareness

cyber-feb-2016-2Here’s the irony when it comes to phones, tablets and other wireless devices: They’re less likely to be hacked, and more likely to compromise your sensitive information.

Why? Well… they’re easier to lose.

Good luck losing a desktop computer. Besides the fact that we tend to leave those at home, you’re going to remember where you put that thing after you break your back lugging it around, and it’s not going to be easy for someone to snatch it up off of your desk when you’re not looking.

Smartphones and tablets, on the other hand, wind up causing leaks all the time. It’s probably safe to say that more leaks come from lost phones and devices than from actual hacking. That’s not to say that hacking and malware aren’t a threat, only that a wireless device’s relatively resistant nature to cyber-threats is not something that makes these devices any less high-risk than your office network or home computer.

But, let’s reconsider the assumption that devices are relatively impervious to cyber-attacks. Does this actually hold up, or is it just good marketing? Let’s take two key points into account:

  1. Devices haven’t been around for as long as laptop and desktop PC’s. This means that there are fewer viruses out there designed to attack Android and iPhone operating systems.
  2. That doesn’t mean device-hackers aren’t catching up.

The general shift in computer culture right now is away from the keyboard and the monitor, and towards the device that fits in the pocket or the purse. Even in techier circles, you might walk into an office and not find a single old-school PC, Mac or Laptop. More people are using devices, fewer people are using laptops and desktops, and this means that the hackers developing new malware and looking for security gaps are going to be shifting their attention towards devices. As of the time of this writing, phones and tablets are relatively strong against cyber-threats primarily because they have fewer threats to contend with, but this won’t be the case for much longer. The short answer is that devices are not especially high risk when it comes to cyber attacks, but we’ll see what 2016 has in store for us.

Right now, there’s not a whole lot we can do about this but practice the same common sense as you would on your PC or laptop. There are antivirus apps available for most phones, but the unfortunate truth is that developers are still learning how to keep these devices safe, so these apps aren’t always effective. This means that it’s down to the user to understand that passwords and other sensitive data aren’t that much safer on the Android than they are on the Asus.