Page 29 - PWM2025_OCTOBER EBOOK
P. 29

TECHNOLOGY REPORT






      diverse risks that can lead to significant   employee to ‘lose’ something... steal it and report it as a loss and   ing, small consumables – such as stock-
      financial losses”.              sell it – especially as there are many routes for sale for stolen prod-  in-trade materials, office supplies, or
        Typically his firm sees crimes relating   ucts”. And where an employee makes the decision to steal or com-
      to external theft which will most com-  mit fraud then the costs can be significant, and more importantly,   raw goods – can disappear unnoticed
      monly involve trespassing and break-ins   it may go unnoticed.                   over time.”
      targeting valuable stock, machinery, and   Islam thinks the same. He too says it is surprisingly easy for   But why don’t directors see theft as a
      even fuel. He says that “it’s not uncom-  employees to ‘lose’ company property, and it may not always be
      mon for organised crime groups to begin   accidental: “In workplaces with weaker security measures, items   risk to their business? It’s very odd for as
      targeting businesses if they notice   like laptops, phones, tools, or even sensitive documents, are at risk   Kearns says, “there are simple, cost
      there’s a lack of effective security on-  of disappearing without a trace.”      effective measures they can introduce to
      site”.                            However, they’re certainly not the only thing that will get sto-
        And then there’s employee-related   len.                                       prevent, disrupt or detect such crimes”.
      theft, which will often target the   He points here to personal protective equipment (PPE) as   The problem is likely the feeling of
      removal of easy-to-conceal company   “another potential target that non-retail commercial environ-  invulnerability, until it’s too late; often a
      property.                       ments should be wary of; it’s not uncommon for workers or
        Dave Kearns, managing director of   thieves to take them for their own personal use, or for resale pur-  business will not know there has been a
      the Expert Investigations Group, sees   poses.”                                  theft or fraud until something happens
      three different vectors for attack.  Then there’s fuel which he considers probably one of the larger   to highlight it.
        The first comes through external play-  ‘non-conventional’ targets of theft though. As he outlines, “if com-
      ers who commit fraud or who perpetrate   pany vehicles are left unattended, it’s a perfect window for thieves   Take fraud. Kearns says that the fig-
      cyberattacks for financial gain by, for   – or even employees – to siphon fuel; this can be especially hard to   ures from the Association of Certified
      example, either obtaining monies via   keep track of if it’s done in small amounts”.  Fraud Examiners Report to the Nations
      false invoicing or supplier frauds. He   But as Kearns well knows, everything has a value, whether it is
      warns that “gaining access for data,   in a raw or finished state – “there is a marketplace and outlet for   2024 shows that (internationally) 19%
      including personal details, can enable   the sale of all stolen goods in one format or another”.  of fraud was found by accident and in
      fraudsters to use identification for other
                                        And he’s seen some big numbers at clients – the theft of
                                                                                       32% of cases, the internal controls had
 You couldn’t make it up  fraud or criminal means.”  £125,000 of vehicle parts in completed state. In this instance, an   been overridden .
        Next comes external physical theft by
                                      employee came on site, loaded a vehicle, used a forklift and drove
                                                                                         Fundamentally, he believes “there is
      what he terms the ‘typical criminal’
                                      the goods away. Another case saw high-value flooring worth
      through burglary, walk in theft, and
      criminal damage. He notes that it should   £90,000 loaded by employees into their vehicles and sold on   the opportunity for dishonesty in every
                                      eBay.
      be obvious what the initial effect that   And in a third, there was the theft of scrap metal by three   type of commercial or industrial busi-
      theft and burglary can have on a busi-  Saturday workers when there were no supervisors around; they   ness irrespective of its geographical loca-
      ness, but “one must also consider the   loaded their vehicles and went to a scrapyard each Saturday after-  tion, turnover, number of employees or
      loss of downtime and productivity as a   noon. The possible loss over many years was estimated to be
      result of the theft... this could be theft of   around £100,000.                 industry sector”.
      certain tools, computers or vehicles”.  Equally, Kearns reckons that not all cases have to be high value:
        Thirdly, Kearns highlights the risk of   “An employee who can steal £100 per week in some format or   The key to protection
      internal theft and fraud committed by   another will be happy with their gain and draw no attention to   Crime prevention measures such as
      employees. He adds that in “over 25   themselves.”
      years I have investigated in every type of   Similarly, Islam thinks low-value items are at high risk of loss   technology, zero-tolerance attitudes,
      commercial, industrial or manufactur-  and are surprisingly common targets. And this is because “low-  written policies and inventory tracking
      ing business. The offences and those that   value items often go unnoticed when missing, which makes them   are, in Kearns’ opinion, “the most
      go undetected are and have been com-  an easy target. But repeated theft of low-value items can add up to
      mitted at all hierarchal levels of a busi-  a significant sum over time.”        neglected area by businesses, managers
      ness”. He continues: “When several                                               and directors”.
      people are involved, or senior/board   Inventory loss                              He reckons that situational crime pre-
      members are involved, statistics show it   And what about losses of inventory in general? In relation to
      takes longer to identify the theft or   this Kearns is bothered that so few businesses put internal theft   vention should include IT and software
      fraud, and the median losses are higher   and fraud on the board’s agenda. As he says: “It’s only after a theft   systems, CCTV, access control, inven-
      than an individual working alone.”  or fraud that they are willing to accept the risk as real and put   tory and stock monitoring, perimeter
                                      measures in place to prevent it happening again – but this too
      Losing items                    late… a typical case of ‘closing the stable door after the horse has   security, lighting, housekeeping as well
        Theft goes beyond the obvious   bolted’.”                                      as a written managed protocols that is
      ‘removal’ of the physical as employees   Indeed, Islam sees losses of inventory, particularly consumables   disseminated to all employees. Such
      can also ‘lose’ items such as phones or   that are easy to resell, as being more widespread than many busi-
      laptops.                        ness owners realise or are willing to admit.     measures form layers of protection. This
        As Kearns outlines, “it is simple for an   As he comments: “Unlike high-value items that require track-  is a tack that Islam would take.



      www.printweekmena.com                                                                    October 2025 PrintWeek MENA 27
   24   25   26   27   28   29   30   31   32   33   34