#and they will ask your recipient for clarification so that you can remain anonymous!
Explore tagged Tumblr posts
Text
So, what is a DNW, and why do I want one?
A "Do Not Want" is a list of everything you don't want included in a gift for you. Your gifter is not allowed to break this! This may sound controlling, but trust me, it's a good thing.
For example, flashing lights are a migraine trigger for me. They can cause me a LOT of pain. So to make sure someone doesn't, for example, include a GIF with flashing in it, I put "flashing lights" in my DNW. That's super useful and important!
But DNWs aren't just triggers. They can be anything that would ruin a gift for you. I also sometimes include breakups because I don't like fics where one couple breaks up so another can get together. And I might DNW Romantic Sodex, because it's just not for me. And that's okay! Just be polite about it.
DNWs are both an accessibility tool, making it more possible for people with triggers to safely join exchanges, and a helpful tool for your gifter in creating something you'll like.
So putting together a DNW is a great idea, and it can include almost anything. The only things a DNW can't include are:
Things that are too broad or unclear (like "ship bashing." That can mean something different to everyone, especially in a fictional context. Instead, put something specific like "breakups," or even something more specific than that, like "toxic/unhealthy Sokeefe.")
Things that are rude. I can DNW "Romantic Sodex," but I can't DNW "Romantic Sodex, gross."
Things that try to force my gifter to make me something specific (like "nothing that isn't a Cinderella AU")
Everything else is fair game! From "hand injuries" to "Fitz and Keefe as siblings" to "witches" to "ice cream" to "cannibalism." If you do not want it, let your gifter know, so they can make the best possible gift for you!
#side note: if you get your assignment and find your recipient's dnw confusing you are totally welcome to message a mod--#and they will ask your recipient for clarification so that you can remain anonymous!#I did that multiple times in the last exchange I participated in because I really wanted to be sure I got it right#kotlc fairy tale exchange 2024#instructions
6 notes
·
View notes
Text
Salutations folks!
Let's spread some holiday cheers with this year's Secret Santa featuring our favorite polygon gal!
But first, a brief FAQ:
- What is a Secret Santa?
In short, everyone brings a gift and everyone receives a gift! In this case it means you will get assigned to make a gift for a random participant, and will receive a gift from a different participant.
❗️For clarification, the gift is mainly a fan-art piece.❗️
- What do i have to do?
You have to submit a form with 2 main questions:
1: [Your wish] -> here you will describe the gift you want to receive as clearly as possible, so that the person making your gift can provide something you will truly cherish. For example you can write "i wish for a drawing of Moony setting a Christmas tree on fire while Ena cries in the corner" etc. You can also add an alternative wish in case you got more ideas.
2: [What you are comfortable drawing] -> here you will provide whatever information describes what you are willing to/can create. Are you making the artwork digitally or traditionally? Are you comfortable drawing only specific characters? Are you okay with drawing more than 1 characters?
Information like this will help determine the best suited recipient for you.
- What if i want to ask my recipient a question about their wish?
you will have to either ask them anonymously or contact me to deliver your message.
- How do i submit my work?
There are 3 ways to submit your work after you finish:
google forms submission page
via e-mail at [email protected]
send to the organizer directly at discord [HoVen#8263]
- What if I'm not satisfied with the gift i received?
Unfortunately i am not responsible with the quality of the gift, you will have to talk it out with your gift maker. Though, i would like to mention that this event is mainly for giving rather than receiving, so please make sure you stay respectful of everyone's gift!
- What if i participate and end up not being able to make my gift on deadline?
In this case, you will have to contact me at either this tumblr page or any of the above ways (e-mail or discord) as soon as possible so i can inform the recipient about the possible delay.
TIMELINE
Sign up period: November 19 - November 28 [9 days]
Submission period: November 29 - December 20 [21 days] on December 10th i will check up on all the participants for their progress (you don't have to show any art)
Extension in case of delays: December 21 - December 24 [3 days]
December 25th: Everyone shares and receives their gifts!! (keep in mind that in the submission form you will have the option to choose whether you want your gift to remain anonymous and be sent to the recipient directly by the organizer)
Before signing up please read the rules!
[SIGN UP HERE!]
- Got a question that is not mentioned here?
Feel free to ask any questions here or the dedicated twitter post!
19 notes
·
View notes
Text
10 Easy Steps to Protect Your Workplace From Fraud
Business fraud can become a major issue for your enterprise, regardless of what size your company is, what you sell or where you operate.
Beyond the financial hardships that could occur as you deal with known instances of deception and prevent future issues, fraud problems could cause current and potential customers to lose trust in your business. Subsequently, they might decide they don’t want to support your brand.
Here are 10 practical steps to take that could make fraud less likely for your company:
1) Look for Suspicious Signs Associated With Credit Card Usage
There are some signs that a person attempting to use a credit card at your business may be doing so dishonestly.
If a person pulls their card out of a back pocket instead of a purse or wallet, that’s unusual. Moreover, if the individual seems especially rushed to complete the transaction and comes into the store near closing time, those two things could indicate a desire to pull the wool over your eyes.
Also, if the card itself seems tampered with or damaged, those characteristics should give cause for concern. The same is true if a customer tells you to type the card numbers into your payment processing system by hand and not bother using the chip-and-pin system or magnetic strip. They may even claim those parts of their card no longer function.
Of course, one strange sign alone does not guarantee a person is trying to commit credit card fraud. Be observant and trust your instincts. If something doesn’t seem right, don’t ignore what you notice.
2) Educate Your Employees About Business Email Compromise Fraud
Business email compromise (BEC) happens when a fraudster either hacks a corporate email account or sends an email from an address that’s almost the same as the real thing.
For example, if the genuine email contains the number one, a hacker might switch that digit for a lowercase letter L, hoping to fool people who only glance at the address portion of the email.
Then, the cybercriminal attempts to scam an email recipient and the business at large by asking for an urgent financial request, often related to wiring money. In a possible scenario, someone posing as the company’s CEO might ask the CEO’s assistant via email to send a large sum to a supposed new client to secure a contract.
In October 2019, Japanese media conglomerate Nikkei confirmed it was the victim of such a scam when an employee got fooled and transferred the equivalent of $29 million to someone claiming to be a management executive.
Employee education is one of the best BEC defenses available to you. Teach workers some of the features of fraudulent emails, but more importantly, instruct them never to act hastily, even if the sender demands it.
For example, it only takes a minute or two to contact the executive by phone instead of responding to the email. Verify the requested transfer first before proceeding. You may instruct that workers who have the authority to conduct money transfers seek such clarification for any amounts greater than $100, for example. That way, the business cannot be significantly tricked.
3) Be Aware of Loyalty Program Fraud
Loyalty programs can drive purchases by giving customers perks for remaining patrons of your company. Often, they earn points for each purchase and can redeem them for free things after accumulating enough.
However, loyalty program fraud is an issue that business representatives must tackle by remaining aware.
This kind of scam generally originates from three main groups:
Hackers — These people do not have direct connections to the loyalty program, but they are often part of organized criminal groups. The participating parties break into the accounts of legitimate loyalty program members and steal the points or use them fraudulently.
Insiders — The individuals in this group have access to information or tools that allow themselves or others to benefit from rewards programs. For example, if a business uses a punch card-based system, a person who has access to the tool that creates holes may invite friends to receive credit without buying anything.
Members — These are individuals who rightfully signed up for a loyalty program but are not using it according to the rules. For example, a person may try to associate their loyalty card number to a purchase they did not make. “Double-dipping” is another common practice, and it happens when people try to redeem points over the phone when speaking to a company representative, plus simultaneously online.
According to details published in 2019 within the Forter Fraud Attack Index, such loyalty program misuse has increased by 89% per year-over-year data. The company’s research also revealed that 1.5 million individuals with compromised loyalty program accounts had additional ones fraudulently opened in their names.
Beyond being aware that loyalty card program trickery exists, you can take strategic steps to prevent it from happening at your company.
Ensure that any online components are behind a secure infrastructure that’s not easily penetrable by malicious outsiders. Also, an anonymous tip hotline or email address could be instrumental in curbing known or suspected deceptions that occur internally.
You could reduce cheating from members by implementing a system whereby evidence of redeemed rewards or newly collected points does not immediately appear on the person’s account. Having that safeguard in place allows you to look for strange behavior or unusual trends possibly connected with fraud attempts. If you can look at account activity from the back end, such visibility could prevent fraud.
4) Partner With a Merchant Services Company That Offers Robust Protection for Credit Card Transactions
Home Depot and Target are some of the well-known brands that have suffered credit card breaches.
You can avoid being a part of that same infamous group of victims by relying on a merchant services company that provides thorough, trustworthy protection against breaches. For example, if a company uses tokenization and encryption for each credit card number, each number is substituted for a randomly assigned code instead of data that a hacker could use to make a purchase.
If a card’s information gets transformed into a randomized string and is stored with a merchant services company, the business does not have the burden of safeguarding the data. You can probably remember numerous times when companies affected by credit card breaches received blame from media sources and others for falling short in their duty to protect customer data. It’s crucial to prove you’ve done the right things.
The safest approach for your business to take is to insist on choosing a provider that can offer you complete, end-to-end protection. In other words, it starts when a person uses their card, continues through the transaction approval process and ends when you receive information saying the purchase finished successfully.
If you are choosing a merchant services company for the first time, prepare to discuss your must-have features associated with any services offered. Also, speak frankly about your budget and the number of transactions you anticipate handling per month or within another easy-to-measure timeframe.
5) Teach Employees to Protect Valuable Company Information
Workers can unintentionally facilitate business fraud if they do not take proper care when handling sensitive information that contains confidential data or information about the company’s plans that could benefit competitors.
Failing to take a step, such as shredding a document before discarding it or logging out of a computer database before you leave for a few minutes to use the bathroom, could cause unanticipated catastrophes.
Problems can also occur if a burglar steals a laptop from the seat of a car during someone’s business trip, for example. In one recent case, New Zealand’s Commerce Commission, also known as ComCom, dealt with the aftermath associated with the theft of a single laptop containing hundreds of meetings and interview transcripts, some dating back several years.
In that instance, ComCom only admitted that the laptop belonged to an “external provider.” That descriptor suggests an outside party, such as a contractor, may have been the person possessing the device. According to Kroll’s 2019 Global Fraud and Risk Report, a leak of private information was the most commonly cited business risk. As such, it’s a priority to remain mindful of regardless of what kind of business you have.
Also, data breaches sometimes happen with less-modern means of sending or holding information. In Ireland, the Data Protection Commission received nearly 100 reports of violations in 2019. Thirty of those instances were cases of passports sent to the wrong addresses. If a person opened the envelope containing such an identification document that they believed was theirs, a data breach would result.
Regardless of whether you work with contractors or only traditional employees, tell those people about some simple things they can do to stop data from getting into the wrong hands.
Information breaches do not only happen when hackers infiltrate a system. Sometimes they can occur because a worker forgot to take crucial precautions. Aim to establish a company culture where everyone feels like a vital part of a whole. Then, they may be more likely to exercise care.
6) Understand When to Make Code 10 Authorization Requests
Most people have been in the embarrassing situation of trying to use a credit card that’s rightfully theirs and hearing that the transaction was declined. As long as there is enough money available to you to cover the purchase, remedying this problem is often as easy as contacting the credit card issuer and getting authorization for that transaction.
Credit card providers often flag large purchases as potentially fraudulent. They may also do so if you make a purchase while traveling and forget to tell the credit card company you are away from home.
However, if you are on the other end of things and dealing with a customer who you believe is trying to make a fraudulent purchase with a credit card, there’s something you can do. Make a Code 10 authorization request by calling the card issuer’s voice authorization center. While doing so, you may be routed to your merchant bank and asked some questions about the suspicious transaction.
All questions posed to you will likely allow for “yes” or “no” responses. That way, you can give details without clueing the cardholder into what’s happening. If you are not comfortable with making a Code 10 request while face to face with the customer, you can also do it once they leave. That approach may stop any attempts of the person to use a card unlawfully at other merchants.
7) Watch Out for Timesheet Fraud
When employees manually record their work hours, the opportunities increase for them to engage in timesheet fraud.
The most common example of this is an employee claiming to work more hours than they genuinely did. Some extreme cases of this kind of lying have included workers saying they worked more than 24 hours in a day — a total impossibility.
Shift-related fraud can also crop up if a person in charge of scheduling gives their friends or favorite workers more hours those who are more or equally qualified. Timesheet errors can happen due to honest mistakes, as well as intentional dishonesty. However, a digital method of tracking hours can help company leaders detect when things are amiss.
For example, some time trackers used by people who work on computers take screenshots every few minutes to show the user’s activity. That feature means an individual cannot leave the clock running and let their hours keep adding up if they’re idle.
Digital trackers also typically have hour limits, meaning supervisors can receive notifications or the program may stop recording the hours if someone surpasses the threshold.
Most digital time trackers usually have metrics interfaces, too. Those can show which workers are most productive, or indicate whether available employees are not getting ample opportunities to work. Such information can allow people in authority to take action if the timing data isn’t adding up as it should or some other discrepancy becomes apparent.
8) Use Strong Passwords and Keep Them Protected
A password could give an unauthorized person nearly limitless access to your company and the service providers you use to keep operations running.
Unfortunately, Yubico’s 2019 State of Password and Authentication Security Behaviors Report revealed some startling conclusions that suggest individuals don’t understand the freedom passwords give to those who shouldn’t have them.
For example, the report showed that 69% of employees share their passwords with colleagues. They may think that doing so boosts productivity, but in reality, this practice erodes security.
Another one of Yubico’s findings was that 51% of respondents said they reuse passwords across personal and business accounts. Password reuse increases the total amount of access enjoyed when someone comes across a stolen password.
Coach your employees to set passwords that are hard for others to guess. They should not include pet names, favorite sports teams, a beloved band or any other detail about a person that’s reasonably easy to learn. Change passwords on a regular schedule and consider using password managers if workers complain that this approach is too cumbersome.
You should also warn people against phishing efforts that try to get them to part with their passwords. Cybercriminals often send emails that appear to be from banks, delivery companies, e-commerce providers or other parties that a business may interact with frequently.
The messages ask for people to enter their passwords, often to “update account information” or “confirm that the details on file are correct.” But legitimate businesses do not ask for passwords, and they remind customers never to give them out.
9) Research Influencers Thoroughly Before Partnering With Them for Campaigns
Influencer marketing could give your business the chance to break into a new market that previously seemed out of reach. It works when someone admired by thousands or more gets their followers to pay attention to your brand, boosting purchases and general interest.
Marketing with influencers is a modern way to increase your reach, and it seems set to continue as a viable option for the foreseeable future. However, reports of influencer fraud have tarnished the method and reminded marketing teams to dig deeper into an influencer’s history.
For example, high follower counts help influencers remain competitive and stand out to potential clients. However, evidence suggests some influencers have “bought” followers or relied on bots to falsely craft an image of success.
You can avoid complications related to influencer fraud by asking for examples of success associated with people or brands the influencer has worked with before. Also, use your common sense when studying an influencer’s information. If one of their accounts has 300,000 followers but only popped up two weeks ago, that could be a red flag, particularly if the person is not an A-list celebrity.
10) Stay on Alert for Insurance-Related Complications
Hopefully, you have business insurance to protect against the many catastrophes your business may face, whether robberies, natural disasters, burst pipes, and other unforeseen circumstances.
If your company operates in an area that was recently affected by a major storm such as a hurricane, be especially vigilant for contractors who may try to conduct scams by insisting they can do any necessary repairs and communicate with your insurer.
The ideal way forward is to contact your insurance company to report damage before hiring anyone. The insurer may send a claims adjuster to the property to verify the information you provided and authorize future payment related to fixing things. Remaining responsible for contacting the insurer yourself makes deception less likely.
Also, be aware that even if you have insurance, the policy may not cover some instances of fraud. There have been court cases where an insurer could prove that a policyholder was not covered for anything related to this crime because the documentation associated with the insurance confirmed that all-important detail somewhere in the fine print of the contract.
Furthermore, the insurer may only agree to cover fraud-related claims if you can prove your company upholds a minimum standard of cybersecurity and undergoes audits at least yearly to assess for weak spots, for example.
Do not be misled into thinking that business insurance is useless. It could stop you from shouldering the hefty financial burdens associated with potential fraud. However, the lesson to learn here is that you should always read every piece of information concerning your policy before entering an agreement. If there are aspects you don’t understand or topics not explicitly covered, ask for clarification instead of making assumptions.
Fight Back Against Business Fraud
The possibilities associated with business fraud should not frighten you so much that you are afraid to grow your company and seize new opportunities.
However, as this list of tips shows, protection against the damaging effects of deception is within your control. You cannot guarantee that scams will not impact your business, but taking precautionary measures can substantially reduce the chances of that happening.
The post 10 Easy Steps to Protect Your Workplace From Fraud appeared first on CareerMetis.com.
10 Easy Steps to Protect Your Workplace From Fraud published first on https://skillsireweb.tumblr.com/
0 notes