ocean11

Jewelers Warned of Wave of “Ocean’s Eleven” Burglaries

September 18, 2024 – New York, NY

Howard Stone, vice president of global risk services and analytics for Jewelers Mutual, says the insurer started noticing an uptick in burglaries in June. “It doesn’t appear like they’re stopping,” he says.

Most of the thefts follow similar patterns. They generally occur on weekends. The gang members sometimes dress up as construction workers to avoid suspicion. They often come equipped with cellphone and Wi-Fi blockers. They usually cut the store’s power cables, and will sometimes wait for hours until the alarm’s backup battery runs out. On occasion, they’ll mount hunting cameras on the store, which act as motion sensors, to see if anyone’s coming.

The gangs are generally well prepared before they strike, gathering extensive intelligence about their targets.

“They usually roll into town for a week and do surveillance,” Guginsky says. “They scout out the store, follow the jeweler home. They often send someone in the store during business hours, with a camera on their hat and their shirt, so they have a sense of the layout.”

Even though they have similar M.O.’s, multiple crews are committing these thefts, Guginsky says.

“They’re all from South America and they are somewhat in communication,” he says. “But it’s a loose-knit group. It’s not like there’s a [mob boss] John Gotti coordinating everything.”

Guginsky notes that these gangs can function only when “jewelers are buying this stolen property.” (Fencing is, of course, a crime.)

To prevent burglaries, the JSA and Jewelers Mutual recommend jewelers take the following steps:

  • Be aware of any suspicious customers or people who could be casing the store or following you. If you suspect someone is targeting your store, report it to both the JSA and local law enforcement. Keep a logbook that notes the time and date of suspicious activities.
  • Regularly test security alarms and cameras.
  • Review and update your emergency contact list, and ensure every person on this list clearly understands their role. Emergency contacts should be available even on weekends and holidays.
  • Jewelers should notify the authorities about all alarm signals, including notices of communication errors or power interruptions. (Unexplained power cuts or cellphone outages are considered red flags.) Following an alarm, retailers shouldn’t enter the store alone but should wait for a police escort.
  • TL 15×6– and TL 30×6-rated safes are no longer considered adequate protection from burglars. The JSA recommends TRTL 30×6–rated safes.
  • Don’t position a safe on an outside wall or the wall of a neighboring office or store. That could enable burglars to penetrate the safe without entering the store.
  • Don’t leave merchandise—even inexpensive merchandise—in showcases at night. Either lock it in the safe or find another way to keep it out of sight.
  • Forge relationships with local law enforcement and mall security. Have them tour your store and identify potential vulnerabilities.

Article provided by Rob Bates, JCK Magazine. Click here to view the source of the article.

cyber

Safeguarding your business against cybercrime

Greensboro, NC – On November 13, 2023, the Southern Jewelry News published an article on titled, “Protecting Your Business: Safeguarding against the growing threat of cybercrime.” The article is posted below:

Protecting Your Business: Safeguarding against the growing threat of cybercrime

November 13, 2023

With cyber losses nearly doubling from 2021 to 2022 and trends continuing upward, it�s important to stay educated on cybersecurity best practices to be able to easily identify threats and help prevent them from occurring in your business.

Image of laptop, phone, and tablet

Understanding Cybercrime

Cybercrime refers to any criminal activity in the digital realm, spanning internet-connected devices, networks, and even bank accounts. These attacks are often motivated by financial gain but can also include influencing elections and espionage.

Common Cyber Attacks

  • Phishing: Phishing emails trick individuals into sharing sensitive information, clicking on a malicious link, or downloading malware.
  • Ransomware: Ransomware attackers hold data hostage and demand payment in exchange for its release, usually perpetrated through malicious links in phishing emails but can also be delivered through unpatched devices.
  • Business Email Compromise (BEC): This occurs when a cybercriminal compromises an organization�s email system or individual account for the purpose of fraud. A common example of this is a compromised vendor email system sending an invoice with incorrect payment instructions.
  • Identity Theft: Identity theft occurs when a valid user�s credentials have been compromised, leading to unauthorized access to sensitive information, such as bank accounts and policy information. Cybercriminals often use phishing attacks to obtain user credentials.
  • Supply Chain Attacks: These occur when a trusted third-party vendor software is compromised, injecting malware into the software. Once a business downloads the software, it also becomes compromised.
  • Insider Threat: Internal attacks are perpetrated by employees or former employees who have direct access to company information or knowledge of business processes, usually to sell information for financial gain.
Image of person holding a phone

Take Action to Secure Your Business

  • Cultivate a Security-Aware Culture: Establish a tone at the top to create a security-conscious environment.
  • Assess Trusted Partners� Security Posture: Understand the security posture of your trusted partners. Are they secure?
  • Build Relationships with Trusted Security Partners: Have experts on hand if a security incident does occur.
  • Employee Training: Continuously educate your staff on security awareness and safety best practices.
  • Control Employee Access: Manage information access appropriately.
  • Implement Strong Authentication:
    • Use strong passwords and avoid sharing them.
    • Avoid generic accounts, i.e., accounts used by multiple users and not assigned to a unique individual.
    • Utilize passphrases for extra security, i.e., a short sentence or phrase made up of 15 characters.
    • Implement multi-factor authentication.
    • Employ password management tools, e.g., Keeper and Bitwarden.
  • Strengthen Technical Controls:
    • Install anti-malware solutions.
    • Encrypt your data.
    • Implement a firewall.
    • Apply timely security patches to your systems and software.

Enhance Protection with Cyber Liability Insurance

You can also help protect your business with a cyber liability insurance policy that covers loss of money due to financial fraud and liability claims. Work with a Jewelers Mutual agent to help you find the right insurance coverage to fit your needs at jewelersmutual.com.

Get Free Training for You and Your Staff

Enroll in the online Safety and Security Academy for in-depth courses on how to keep your business safe from cyber threats and more at jewelersmutual.com/academy.

Want to learn more about how you can keep your jewelry store safe 24/7? Read Jewelers Mutual�s comprehensive Jeweler Security Guide at jewelersmutual.com/securityguide.

Source