Four things Aussie entrepreneurs wish they’d known before hiring their first employee

Four things Aussie entrepreneurs wish they’d known before hiring their first employee

Emma Koehn / Friday, September 22, 2017

Karen Justice from Just for Pets holding her dogJust for Pets chief executive Karen Justice. Source: Supplied

“I choose a lazy person to do a hard job, because a lazy person will find an easy way to do it.”

Those words are attributed to Bill Gates, and while Microsoft doesn’t seem to have encountered too many issues attracting top talent over the years, earlier stage businesses may well be more sceptical of his idea.

Hiring staff, especially for the first time, can be a daunting and emotional process: you typically want to avoid lazy workers and instead find the people you can trust with putting your hard work and ideas into action.

Then there’s the less exciting aspects of the process, from establishing workplace policies to creating a bulletproof recruitment process. If you’ve discovered you actually needed to hire someone yesterday, how do you make sure you’re ready to select the best candidate?

We asked startup and company founders to weigh in on what they wished they’d known before hiring their first employees.

You can’t train natural talent 

The idea of other people wanting to join your venture is exciting, says founder of Bedhead Hats Richelle Ellis, but that shouldn’t cloud your judgment when deciding whether someone is truly a suitable fit.

“Initially, I was so happy anyone would want to work for me that I settled for less-than-perfect mix of skills or experience for the role offered,” she explains.

Ellis says over the years she has found a worker can be trained in specific skills, but as a business owner, you won’t be able to grow natural talent if a candidate was never the right fit in the first place.

“The question I now ask myself when hiring is, ‘Will they do the task/s better than I currently can?’. The answer has to be yes,” she says.

When Ellis now fills a role at her baby and child sun hat business, the top questions are about what that person will add to the team, and how they will pull their own weight.

“If a hire proves not to have the natural talent for the role, it’s best for all parties to part ways and move forward,” she says.

Ask the right questions

Blisscare Health co-founder Igor Statkevitch says he has interviewed hundreds of candidates while building the aged care business. Over time, he’s has learned it’s important to go beyond the job description if you want to find people who will serve you long term.

“If I were to do it again, I would create a different set of questions to the candidates,” he says of his early days of searching for candidates.

Rather than asking interview questions that focused on hard skills, Statkevitch says it’s also important to talk to people so you can find out whether staff will be “ready for a battle to watch each others’ backs, people for a journey with integrity and humility, and people who are not afraid to go extra mile”.

Founder of online beauty retailer Adore Beauty Kate Morris agrees that finding staff to fit your values is the most important thing.

“I wish I’d known the importance of hiring for cultural fit, rather than skills or experience,” she tells SmartCompany.

“Once we got to about 25 employees, we realised it was going to be difficult to continue to be the sort of company we wanted to be without identifying and reinforcing the cultural values that were important to us.”

You should be taking the time to decide what values your staff should adhere to before you start building your team, Morris says.

Set the parameters first

“When I employed my first employee as a company owner, it was nothing like my past experiences, because I had nothing set in place,” says Karen Justice, chief executive of pet care buying group Just for Pets.

There’s a temptation to hit the ground running when you hire your first employees, but the problem with not setting up staff policies and limits first is there will be plenty of work to do later on, says Justice.

“The problem with creating rules and regulations as you go is that you identify an issue with a staff member — for example, using their mobile phone in work hours — then you have to create a policy to deal with the issue,” she says.

“Then you try and enforce it after the problem has existed for some time, and that is so hard.”

If she had her time again, Justice says when hiring for the first time at Just for Pets she would have been armed with a policy for “everything you can think of” before she started to see candidates.

If you know what the rules are before people have a chance to start establishing new behaviours, then it’s only a matter of enforcing the rules when problems come up, which is “so much easier”, Justice says.

You’re hiring your staff’s problems and perspectives, too

Tash Tan, co-founder of virtual reality agency S1T2, hired staff for the first time having only just graduated university himself.

Reflecting on his hiring processes, he believes businesses should remember there will be times that personal issues will come into the workplace, no matter who you’ve hired or how.

“Your staff and colleagues are humans, and the problems they bring to the workplace are part of being a person,” he says.

“What we perceive as a lack of productivity or disruption is more often than not a manifestation of a personal problem or state of mind.”

Chief executive of Girl Geek Academy, Sarah Moran, says startup founders also need to be prepared that their staff will bring “baggage” with them from their former roles.

“You need to retrain people from their last workplace; everyone brings cultural baggage. You need to be clear about the tone and culture you want to establish in your new operation,” she says.

Building an early stage business is “tough for founders and employees”, Moran says. She recommends founders focus on seeing their staff’s past experience and perspectives as valuable, even if your end game is creating a new and innovative environment.

“You also need to recognise that the past experience and perspective of your team members is highly valuable in offering you a fresh angle and a diverse perspective,” she says.

Tan says ultimately, a great employer will also help their staff find solutions to their problems too.

“Empathy is in a lot of ways the key to success,” he says.

Original article found HERE at SmartCompany.com.au

Posted in Business Investigations, Uncategorized | Leave a comment

Protect your business from fraud

Protect your business from fraud

Caltex / Friday, August 4, 2017

With yet another devastating cyber attack making headlines recently, managing security is top-of-mind for many business owners – and it’s not just about computer security.

With the Australian Cyber Security Centre reporting that there were 14,804 cyber security incidents affecting Australian businesses between July 2015 and June 2016, the security of all business services and the protection of sensitive information should be paramount for all SME owners in order to reduce the risk of cyber crime and fraudulent activities.

Here we talk to a cyber security and privacy expert about the importance of business security and ways you can keep all your sensitive information secure.

Michael McKinnon, an expert at leading Australian cyber security consulting practice Sense of Security, says while controlling access to business information is key, there’s also the need to classify that data.

“Businesses need to identify and understand what critical information they’re holding – they need to think laterally about how and why that data might appeal to an attacker – and take appropriate measures to treat all data according to the risk that holding it represents,” he says.

“And protecting confidential information doesn’t just mean keeping it private; there’s also the need in business to ensure the data cannot be tampered with by unauthorised parties.

“In terms of practical steps that businesses need to address, managing staff credentials is important as well as having password policies in place that govern how complex passwords need to be and how often they may need to be changed.”

He says awareness is central to avoiding the risk of fraud.

“Businesses need to be aware of any financial processes where obvious fraud can occur such as supplier payment systems, expense claims, payroll, discount vouchers, coupons and refund payments,” he says.

“More complex and less obvious examples can involve modifying stock levels in a database, or writing inventory off as damaged, but then selling it to second-hand buyers.

“Any assets that the business is in possession of that isn’t part of an asset register but that could be cashed-in quickly are at risk.”

Restricting access can reduce risk

Ensuring that only relevant staff members are approved to access company credit cards and accounts, fuels cards for the refuelling of fleet vehicles and internal databases, can reduce the risk of fraudulent activities.

Some fuel cards offer extra security in additional features that can track fuel usage and have a vehicle-specific PIN. They can also offer dedicated customer service for stolen cards.

Find out how Caltex StarCard can help protect your business from fraud.

McKinnon says keeping antivirus software up to date on office and employee computers, laptops and mobile devices should be part of a broader strategy.

“Using antivirus software can be helpful at detecting malicious software and apps, but it forms only one part of what should be a much larger strategy for protection,” he says.

“Keeping all office and employee computers and mobile devices up to date with the latest security updates, and running the latest operating system versions that have been patched against known vulnerabilities is critical.

“In the recent WannaCry ransomware outbreak, for example, the devices mostly affected were Windows 7 computers that had not been updated in the preceding two months. ‘Patch management’ – the process that businesses should be employing to manage how they’re updating their computers – should be treated as a default requirement of every IT department.”

Keep it safe

The Federal Government’s Stay Smart Online initiative offers the following checklist to assist in business security and fraud prevention.

* Create cryptic passwords to ensure the online safety of your business.

* Regularly back up all your business information including accounting files, invoicing and quoting systems, letters and emails, information and resources, and even your website files.

* Stay vigilant and up to date with news on the latest scams and threats.

* Know who has access to your business information and make sure employees have their own logins and passwords. By limiting access on a need-to-know basis, you reduce the risk of an ‘insider’ accidentally or maliciously releasing confidential information.

* Ensure you have anti-virus software that is automatically updated, and don’t trust wi-fi networks you don’t control.

* When it comes to mobile phones, keep them locked when not in use in case of loss or theft. Also try to limit the business information stored on them, including email.

Original article found HERE at SmartCompany.com.au

Posted in Uncategorized | Leave a comment

Queensland Police shut down three more “fake trader” barbecue websites

Queensland Police shut down three more “fake trader” barbecue websites: How to keep customers’ trust amid scam concerns

Emma Koehn / Wednesday, September 13, 2017

Queensland’s financial and cyber crimes group has shut down three more “fake trader” websites advertising barbecues and fitness equipment, three months after two Latvian nationals were arrested for their alleged roles in setting up a range of similar sites.

Australians continue to be caught out by websites advertising sales on large outdoor items like barbecues and complaints have been made to the Australian Cybercrime Online Reporting Network (ACORN) from shoppers who had been scammed sites promising the delivery of goods, according to Fairfax.

On Tuesday Queensland Police confirmed it had shut down three shopping websites it has identified as fake: www.barbecuecity.com.au, www.gardenoutdoorsales.com.au, and www.topmarineoutboard.com.au.

Investigations into the area of fake trader sites continue after two Latvian nationals were arrested by Queensland Police in June, after allegedly defrauding customers of $250,000 through fake shopping websites.

Fairfax reports the police do not believe the same pair are directly behind the new websites, but are considering links between the newly closed websites and so-called “fake trader” sites that have previously been uncovered.

The three sites closed this month asked for payment details from shoppers but did not deliver the advertised goods, say Queensland Police.

“Anyone who wanted to purchase these items were asked to provide credit card details and also offered a further discount if payment was made via direct bank to bank transfers. Customers who paid the money never received the equipment,”  Detective Acting Inspector Brad Hallett said in a statement.

Police advise any shoppers who believe they may have been affected by a similar scam to contact ACORN directly, and recommend only using trusted websites and those that provide buyer protection when making purchases online.

SmartCompany contacted ACORN and Queensland Police for further comment but did not receive a response prior to publication.

Brand trust is key

When the issue of fake trader sites was raised by police earlier this year, Small Business and Family Enterprise Ombudsman Kate Carnell said there was “no doubt” such websites are costing small businesses money.

SMEs can be affected by these sites in a number of ways, she said, from being caught out by scammers themselves, to the effect of shoppers being reluctant to trust online shopping sites more generally.

“For a small business legitimately trading online, you don’t want any reduction in the confidence consumers have with online traders,” she said.

Director of InsideOut PR Nicole Reaney says stories like this present a significant challenge to new online sellers, because establishing brand trust can be difficult if a business enters the online market with no existing reputation.

Smaller operators can overcome these concerns by using a couple of approaches, she says.

The first is to jump on any negative news around online shopping and warn your networks that this occurs.

“Legitimate brands can embed a trusted position by communicating this consumer concern to its existing customers and encouraging them to be careful and share this information,” she says.

The second approach is to make sure there’s an opportunity for customers to connect with a real person through your business page, so customers can feel assured they are dealing with a legitimate person.

Checking in with your shoppers will ensure they feel connected throughout the process, Reaney says.

“A simple voice on the other end of the phone is enough to put minds at rest and alleviate any concerns.”
Original article found HERE at SmartCompany.com.au
Posted in Uncategorized | Leave a comment

Poisoned water holes: the legal dangers of dark web policing

Poisoned water holes: the legal dangers of dark web policing

Ian Warren, Deakin University; Adam Molnar, Deakin University, and Monique Mann, Queensland University of Technology

This article is part of a series on how law enforcement is fighting crime across digital borders.


Australian police are using “poisoned watering holes” to investigate crime on the dark web. By taking over illegal marketplaces that traffic in child pornography or drugs, law enforcement are collecting information about criminals all over the world.

Of course, crimes that occur on the internet often cross international borders, but this situation is creating troubling new standards in transnational policing.

Research, including our own, indicates that as police operations move into online environments, new rules for digital evidence collection and exchange must be developed to assist prosecutions while preserving due process and human rights.


Read More: Spyware merchants: the risks of outsourcing government hacking


Investigations on the dark web readily transcend geographic demarcations fundamental to the use of search warrants and the admissibility of evidence.

Some enforcement agencies have conducted online investigations and attempted to access or transfer information outside existing domestic and transnational legal frameworks. This is common in cases involving dark web sites that distribute child exploitation material (CEM).

Without proper checks, police could have significantly expanded scope to search homes and computers around the world, even in cases not involving CEM.

Watering holes and network investigative techniques

The techniques used in online investigations can have potentially problematic legal standing.

Playpen was a dark web site used to distribute CEM. The FBI seized the site in 2015, and obtained a warrant to continue its operation on a government server.

The FBI used a Network Investigative Technique (NIT), also known as Computer Network Exploitation, to identify Playpen users. This distributed malware onto any computer used to log into the site.

The NIT enabled the FBI to identify the IP addresses, log-in times, and operating systems of around 150 computers located in the United States and more than 8,000 computers located in 120 countries. Up to 215,000 registered Playpen users globally could be affected.

 

A Fast Explainer Of The Dark Web.

 

According to the Electronic Frontier Foundation, Playpen is the largest known US government hacking operation. But it was authorised by a single warrant issued in Eastern Virginia.

Specialist online units in Australia, such as Task Force Argos in the Queensland Police Service, have also used “poisoned watering hole” tactics.

Australian convicted child sex offender Shannon Grant McCoole, who administered “The Love Zone” site, was apprehended after a tip from Danish police. Task Force Argos investigators then effectively ran the site “while feeding information to international law enforcement colleagues”.

The investigation identified many users located in other countries, including several who were prosecuted in the United States.

Details of the warrant used in this investigation are unclear, which is common in cases involving CEM that result in guilty pleas.

Darkweb investigations and the law

There are some established methods for law enforcement sharing information across borders.

Mutual Legal Assistance Treaties (MLATs) are similar to extradition treaties. States seeking access to digital evidence located offshore must first issue a formal request.

MLATs aim to protect the legal rights of people suspected of transnational or offshore offending. However, available US cases involving The Love Zone do not appear to mention MLAT procedures.

This has troubling implications for the right to a fair trial.

It’s possible Task Force Argos informally communicated the IP addresses of US-based site users directly to US authorities. Queensland Police declined to comment on the warrant.

The geographic scope of the Playpen NIT warrant, on the other hand, is extremely unclear. Some US courts have declared the NIT warrant to be valid only within Eastern Virginia.

At least one US court has ruled that warrants to search homes and seize computers outside of this district produced evidence viewed as the “fruit of the poisonous tree”.

In other words, because the dark web’s infrastructure could only enable law enforcement to uncover the locations and identities of suspects through the defective NIT warrant, any physical evidence seized from a subsequent warrant to search a home was inadmissible.

However, some US courts seem willing to admit evidence from the Playpen NIT because the FBI is regarded by the courts as acting in good faith in both seeking and executing it.

Legal geographies of online investigations

Law enforcement agencies are keen to maintain secrecy of dark web CEM investigations. But there is concern from legal experts that informal police networks routinely operate outside of established MLAT procedures.

The MLAT process is slow, technical and cumbersome. This may fuel the acceptance of questionable NITs and exchange of data between police to streamline transnational dark web investigations. But it could also undermine complex cyber-prosecutions and the fairness of criminal trials that rely on electronic evidence.


Read More: Inside the fight against malware attacks


The informal exchange of criminal intelligence and use of malware is understandable where child welfare is at stake. But these investigative methods undercut current attempts to preserve due process and digital security standards.

The ConversationSuccess in these types of investigations cannot solely be measured by prosecution and conviction rates. It should also be measured by the legality, ethics and transparency of transnational investigative procedures and the rules that underpin them.

Ian Warren, Senior Lecturer, Criminology, Deakin University; Adam Molnar, Lecturer, Criminology, Deakin University, and Monique Mann, Lecturer, School of Justice, Researcher at the Crime and Justice Research Centre and Intellectual Property and Innovation Law Research Group, Faculty of Law, Queensland University of Technology

This article was originally published on The Conversation. Read the original article.

Posted in Uncategorized | Leave a comment

Police warning over private rentals as cannabis growhouse discovered

 

Police warning over private rentals as cannabis growhouse discovered

Sophie Foster

16 AUG 2017

 

Police vision of a cannabis crop in a house in Hea 

Police vision after a cannabis crop was seized in Heathwood. Picture: Supplied

POLICE have warned property investors not to rent homes out privately after seizing $850,000 worth of cannabis plants from one house.

A statement from Queensland Police said a “significant cannabis growhouse” was located at a Heathwood address, about half an hour from the Brisbane CBD.

Detective Inspector Lance Vercoe of the Drug and Serious Crime Group warned such occurrences were not uncommon.

“We are seeing this type of hydroponic setup more often, with criminals paying cash to rent directly from the property owner,” he said.

“The offenders have caused tens of thousands of dollars’ worth of damage to the property, breaking through doors and walls in order to grow the cannabis.

“Members of the public who seek to rent their properties should be extremely wary of renting their properties out privately and should consider taking the appropriate steps to protect your property.”

The two storey house was unoccupied when detectives executed a search warrant. The search was conducted after a tipoff from members of the public.

Original article found HERE at The Courier Mail.

Posted in Uncategorized | Leave a comment