<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; Christine Meyers</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/author/meyersc/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Why Companies Ignore Fraud Prevention Failures</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/why-companies-ignore-fraud-prevention-failures-2/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/why-companies-ignore-fraud-prevention-failures-2/#comments</comments>
		<pubDate>Thu, 01 Aug 2013 14:18:39 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Enterprise Fraud]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=256</guid>
		<description><![CDATA[Failure to recognize or respond to workplace fraud costs U.S. businesses millions each year. While circumstances leading to fraudulent behavior vary widely among companies, recent studies may reveal why some institutions ignore illegal activity – even when it’s happening in plain view. Here are some reasons companies turn a blind eye to expensive, systemic insider [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Failure to recognize or respond to workplace fraud costs U.S. businesses millions each year. While circumstances leading to fraudulent behavior vary widely among companies, recent studies may reveal why some institutions ignore illegal activity – even when it’s happening in plain view.</p>
<p>Here are some reasons companies turn a blind eye to expensive, systemic insider fraud:</p>
<p><strong>Trust &#038; Seniority</strong></p>
<p>Let’s say you suspect a senior colleague may be guilty of workplace fraud. What if that person has already built trust with your department for over a decade? What if you feel at risk for professional or personal reprisal were you to report your suspicions?</p>
<p>What if the suspect is your boss?</p>
<p>According to a recent Symantec report on insider intellectual property (IP) theft, a majority of IP thieves are males in their mid-30s. Their positions are high enough in the corporate value chain that their own signatures regularly appear on IP agreements, and many are managers.</p>
<p>Similarly, a 2011 global fraud analysis by KPMG finds that fraudsters have typically been with their employer for over 10 years with more than half in upper management or board positions. With so many guilty parties in positions of authority, it’s no mystery why many of their colleagues choose to ignore dubious activity.</p>
<p><strong>Ignorance of Warning Signs</strong></p>
<p>Of course, not every fraudster operates in the company’s upper echelons. What’s more, many instances of unreported fraud may not be intentional but due instead to a lack of knowledge about fraud’s warning signs.</p>
<p><strong>KPMG’s report names certain “red flag” behaviors that could indicate an employee is committing insider fraud. The employee’s colleagues simply must be aware of what those behaviors are. Some of them include:</strong></p>
<p>•	Maintaining exclusive relationships with vendors<br />
•	Refusal to take leave or time off for holidays<br />
•	Unexpected disappearances from the office<br />
•	Not producing certain records or information upon request<br />
•	Excessive lifestyle for his or her income<br />
•	Developing a serious addiction to alcohol, drugs, or gambling</p>
<p>A better understanding of these behaviors by all employees – especially those in HR departments – could go a long way toward averting future fraud prevention failures.</p>
<p><strong>Lack of Prevention Policies</strong></p>
<p>The absence of effective fraud protocols is another big reason companies brush aside fraud prevention failures.</p>
<p>Developing and enforcing fraud prevention policies isn’t just a formality – it’s an investment in the continued prosperity of your company. The specifics of that policy will depend on the types of fraud to which your organization is most vulnerable, and many may choose to build enterprise fraud management software into their long-term strategies.</p>
<p>After all, software may very well identify suspicious activity that employees – for fear of reprisal or otherwise – fail to report to management.</p>
<p>Creating teams of legal and HR experts, implementing fraud education programs for employees, and a performing a thorough evaluation of your unique fraud risks are preventative measures all organizations should take. </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/why-companies-ignore-fraud-prevention-failures-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Reasons Why Corporate Compliance is Good for Business</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/uncategorized/why-companies-ignore-fraud-prevention-failures/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/uncategorized/why-companies-ignore-fraud-prevention-failures/#comments</comments>
		<pubDate>Thu, 20 Jun 2013 14:10:17 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[hitech]]></category>
		<category><![CDATA[omnibus]]></category>
		<category><![CDATA[pci dss]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=250</guid>
		<description><![CDATA[Collecting data and preparing reports for an auditor can seem burdensome and confusing. With so many regulations in place, the paperwork never seems to end. But the regulatory process is actually good for your business. After all, regulations were put in place by industry groups and government agencies to protect the public and shareholder interests. [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Collecting data and preparing reports for an auditor can seem burdensome and confusing. With so many regulations in place, the paperwork never seems to end.<br />
But the regulatory process is actually good for your business. After all, regulations were put in place by industry groups and government agencies to protect the public and shareholder interests. Those protections have benefits for your organization:<br />
•	The public, aka your customers, will trust you to continually guard their confidential and financial information. These relationships are the heart and soul of your business.<br />
•	A compliance system reduces your risk. It protects you from the people who can access your sensitive information and operations in the course of doing business every day—your employees, consultants and partners.<br />
•	It safeguards your reputation by preventing security breaches that play out in the public’s eye.<br />
•	The process of meeting reporting requirements can present an opportunity for streamlining disparate business systems for collecting and reporting data.<br />
The ABC’s of Corporate Compliance<br />
You most likely need to comply with multiple regulations, but the good news is that all of them require the same basic data:  a complete and accurate trail of user access to confidential information.<br />
With Attachmate Luminet fraud management software, you can do that and much more. It enables you to track all user activity on an application-by-application basis, then store that information in a secure repository, allowing you to analyze and detect violations, and to efficiently generate specific reports for various regulatory bodies.  Here are the details.<br />
Observe and Capture Data of User Activity Across an Enterprise Network<br />
Fraudulent behavior typically takes multiple steps and involves several applications. Capturing this data on an enterprise network is tricky. Every large organization has a mix of legacy and new applications and databases. For example, a user might access a sophisticated CRM database to update a user account, then share related information on an intranet via an ancient web-based app. Tracking all user activity in these conditions requires pulling log data (if an application even creates it) from numerous applications; then the data must be correlated with user authentications and behaviors— what a mind-boggling task.<br />
Luminet erases the need to piece together data from multiple applications and databases. It captures data from user activity on an application level in real time, which allows fraud investigators to visually replay user actions, screen-by-screen and keystroke-by-keystroke. </p>
<p>Analyzing Data to Detect Fraud<br />
Luminet stores user-activity data in a secure, digitally signed repository. Its powerful analytics engine lets you search its store of current on recorded activity to identify suspicious behavior based on business rules that you define. When Luminet uncovers potentially fraudulent activity, it generates an alert to warn you to immediately evaluate the behavior. </p>
<p>Generating Reports for Auditors<br />
Two aspects of an audit are guaranteed. First, you won’t know the exact format a report will take until the auditors ask for it.  And secondly, you will know auditors will also expect comprehensive, detailed information on how thousands of employees access sensitive customer information.<br />
Since Luminet stores data from user activity on an application basis, you can easily provide auditors with the specific information they need.  And, if an auditor asks for a different view into the data, there’s no need to pull more data from disparate application log files. You adjust your business rules and let Luminet’s reporting capabilities generate new charts, graphs, dashboards, and reports.<br />
Creating a Culture of Integrity and Transparency<br />
Instituting a corporate compliance program sends the message that you care about protecting your customers’ personal information. With Luminet fraud software, you can ensure all data stays private and your business realizes the benefits from putting a process in place. Luminet will help you better manage risk of exposing sensitive data; streamline systems and operations; and help compliance personnel be more efficient.<br />
Yes, regulatory compliance takes work. But we believe the pain is mitigated by gain.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/uncategorized/why-companies-ignore-fraud-prevention-failures/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>HIPAA and HITRUST for Healthcare: What&#8217;s the Difference?</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hipaa-and-hitrust-for-healthcare-whats-the-difference/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hipaa-and-hitrust-for-healthcare-whats-the-difference/#comments</comments>
		<pubDate>Sun, 10 Feb 2013 23:13:59 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=207</guid>
		<description><![CDATA[Healthcare institutions are working hard to map audit and compliance efforts throughout their organization&#8211;especially across critical applications and mainframe systems with legacy applications. All of this effort will result in more secure EHRs and improvements in patient privacy protections. But in a world of constrained resources, where should care providers focus the bulk of their [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Healthcare institutions are working hard to map audit and compliance efforts throughout their organization&#8211;especially across critical applications and mainframe systems with legacy applications. All of this effort will result in more secure EHRs and improvements in patient privacy protections. But in a world of constrained resources, where should care providers focus the bulk of their improvements? Oftentimes, it comes down to priorities&#8211;the organizational objectives&#8211;that will drive the process.</p>
<p>As related in a recent whitepaper from Coalfire, Andrew Hicks shares the following distinctions:<br />
&#8220;HIPAA and HITRUST assessments each share the common objective of safeguarding healthcare information, however the similarities end there. A HIPAA Security assessment will provide an organization reassurance that when all audit recommendations have been resolved, the organization will be compliant with the HIPAA requirements. </p>
<p>A HITRUST assessment and certification, on the other hand, takes a more risk-based approach, scaling the requirements to the risk characteristics of the organization and focusing on controls related to the leading causes of breaches in the healthcare industry. This approach also considers compliance with regulations such as HIPAA, allowing organizations to take a more holistic approach towards protecting sensitive information.&#8221;<br />
(To access this whitepaper, look for &#8220;HIPAA versus HITRUST &#8211; FAQ&#8221; by Andrew Hicks, MBA, CISA, CCM, CRISC, HITRUST CSF Practitioner Director, Healthcare Practice Lead, Coalfire Systems, Inc. www.coalfire.com)</p>
<p>For leading healthcare institutions, checking the box for HIPAA compliance is often not enough. These organizations focus instead on addressing risks to patient information and potential security violations. In cases where the priority is protecting patient data and safeguarding access to EHRs (electronic health records) is paramount, the priority shifts to address risk across the organization.</p>
<p>In one of our recent engagements, a major care facility in the north east was seeking to understand access to patient records. Here are some of the things they wanted to be able to examine as part of their approach to risk:<br />
•	VIP record snooping<br />
•	Executive record snooping<br />
•	Patient / employee record snooping<br />
•	Family member and self -examination of records<br />
•	Neighbor record snooping<br />
•	Identity Theft<br />
•	Medical Identity Theft<br />
•	Areas of potential non-compliance with federal and state regulations</p>
<p>Monitoring for these indicators and correlating that data across multiple systems was well within Luminet’s capabilities. In addition to capturing EPIC, Kronos, Cerner, Meditech, and other log data, the Luminet solution was able to monitor the existing mainframe applications and correlate that information so that is alerted on suspicious activity in real-time.</p>
<p>Then, as part of a comprehensive risk approach, we were able to add visibility into the hospital’s accounting and payroll systems. Luminet’s ability to monitor Lawson and other accounting systems enabled a new level of visibility and added clarity to the financial operations side of the house. This benefit wasn’t available with other monitoring systems focused exclusively on EHR and patient data.<br />
When considering whether to address HIPAA or HITRUST concerns, organizations would be well served to take a long view and invest in systems flexible enough to meet their present and future needs. A number of modern systems can address HIPAA, PCI-DSS, state regulations like SB 1386, Meaningful Use, and Accounting of Disclosure.  But if it is time to make an investment, wouldn’t it be best to select a technology partner and a solution that can help address risk across all your critical systems? </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hipaa-and-hitrust-for-healthcare-whats-the-difference/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Presidential Memo on Insider Threat: Big Brother or Sound Policy?</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/presidential-memo-on-insider-threat-big-brother-or-sound-policy/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/presidential-memo-on-insider-threat-big-brother-or-sound-policy/#comments</comments>
		<pubDate>Wed, 05 Dec 2012 04:00:07 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=215</guid>
		<description><![CDATA[Recently, an Executive Memo was released addressing the vexing issue of insider threat within departments and agencies of the federal government. This presidential memorandum,“National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs,&#8221; was issued on Nov. 21, 2012. The text of the memo is captured below: This Presidential Memorandum transmits the [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Recently, an Executive Memo was released addressing the vexing issue of insider threat within departments and agencies of the federal government. This presidential memorandum,“National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs,&#8221;  was issued on Nov. 21, 2012. The text of the memo is captured below:</p>
<p>This Presidential Memorandum transmits the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs (Minimum Standards) to provide direction and guidance to promote the development of effective insider threat programs within departments and agencies to deter, detect, and mitigate actions by employees who may represent a threat to national security. These threats encompass potential espionage, violent acts against the Government or the Nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems.</p>
<p>The Minimum Standards provide departments and agencies with the minimum elements necessary to establish effective insider threat programs. These elements include the capability to gather, integrate, and centrally analyze and respond to key threat-related information; monitor employee use of classified networks; provide the workforce with insider threat awareness training; and protect the civil liberties and privacy of all personnel.</p>
<p>The resulting insider threat capabilities will strengthen the protection of classified information across the executive branch and reinforce our defenses against both adversaries and insiders who misuse their access and endanger our national security.</p>
<p>SIGNED: BARACK OBAMA<br />
<a href="http://www.whitehouse.gov/the-press-office/2012/11/21/presidential-memorandum-national-insider-threat-policy-and-minimum-stand" title="Read the official memo here."></a></p>
<p>For such a brief memo, it has not been without controversy. Some pundits have stated that it will put a chill on whistleblowers while others have argued that such a statement indicates that &#8220;Big Brother&#8221; has landed. I just don&#8217;t see it that way. </p>
<p>The ability to monitor employee interactions with company data has long been available in the private sector. Organizations regularly monitor access to critical or protected information&#8211;and if they aren&#8217;t, they should be. Insider threats, abuse and misuse of data, and malfeasance are common in companies all around the globe. Why should we expect the same is not true in our federal, state, and local governments.  I, for one, feel safer with a &#8220;trust but verify&#8221; approach for the data we all share with federal agencies.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/presidential-memo-on-insider-threat-big-brother-or-sound-policy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>HITECH, Meaningful Use and the 5 Pillars of Health Outcomes</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hitech-meaningful-use-and-the-5-pillars-of-health-outcomes/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hitech-meaningful-use-and-the-5-pillars-of-health-outcomes/#comments</comments>
		<pubDate>Thu, 08 Nov 2012 15:07:27 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=225</guid>
		<description><![CDATA[The Meaningful Use program was first established by the U.S. Federal Government as part of the 2009 HITECH Act. The goal was to foster the creation of the infrastructure needed to support healthcare reform. As the 2014 deadline for Meaningful Use Stage 2 draws closer, organizations are planning now for improvements in the way they [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The Meaningful Use program was first established by the U.S. Federal Government as part of the 2009 HITECH Act. The goal was to foster the creation of the infrastructure needed to support healthcare reform. As the 2014 deadline for Meaningful Use Stage 2 draws closer, organizations are planning now for improvements in the way they provide privacy protection and data security for PHI. While moving toward these goals is important, it might be good to take a step back and consider how we got here.</p>
<p>According to the CDC, the original concept of meaningful use rested on the &#8217;5 pillars&#8217; of health outcomes policy priorities. These are: </p>
<p>1.  Improving quality, safety, efficiency, and reducing health disparities<br />
2.  Engage patients and families in their health<br />
3.  Improve care coordination<br />
4.  Improve population and public health<br />
5.  Ensure adequate privacy and security protection for personal health information </p>
<p>To encourage the transitions necessary to create greater efficiencies, improved information sharing, and better protections for patient privacy, an incentive program was established to support the &#8220;meaningful use&#8221; of a certified &#8220;Electronic Health Record&#8221; (EHR). This initiative was rolled out in stages:</p>
<p>Meaningful Use Stage 1:<br />
The first stage of Meaningful Use emphasizes proper data capture and data sharing&#8211;primarily focusing on the transition from paper records to electronic records generally referred to as EHRs or EMRs. </p>
<p>What are the Requirements of Stage 1 Meaningful Use?<br />
• Reporting through attestation; Reporting period is 90 days for first year and 1 year subsequently<br />
• To meet certain objectives/measures, 80% of patients must have records in the certified EHR technology</p>
<p>Eligible Professionals must complete:<br />
• 15 core objectives, 5 objectives out of 10 from menu set<br />
• 6 total Clinical Quality Measures (3 core or alternate core, and 3 out of 38 from additional set)</p>
<p>Hospitals must complete:<br />
• 14 core objectives, 5 objectives out of 10 from menu set<br />
• 15 Clinical Quality Measures </p>
<p>* For a complete listing of these objectives, refer to: http://www.healthit.gov/sites/default/files/pdf/FINAL_MU_RECOMMENDATIONS_TABLE.pdf</p>
<p>As hospitals increasingly move toward electronic records, it is assumed that the first four pillars of health outcomes policy will improve. However, the fifth pillar, ensuring adequate privacy and security protection for personal health information, may require additional actions by hospitals and care providers.<br />
Specifically, organizations must take additional measures to safeguard patient records and guarantee privacy. Leading institutions and others must consider how to move beyond “checking the box for compliance” and move toward addressing risks to patient data. In our next post, we’ll discuss how that can be done and how it becomes increasingly more important as organizations address Meaningful Use Stages 2 and 3.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/hitech-meaningful-use-and-the-5-pillars-of-health-outcomes/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>3 Ways Leading Companies Reduce Risk</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/3-ways-leading-companies-reduce-risk/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/3-ways-leading-companies-reduce-risk/#comments</comments>
		<pubDate>Tue, 09 Oct 2012 22:26:47 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Insider Threat]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=197</guid>
		<description><![CDATA[The business risks—financial loss, failed audits, regulatory fines, and brand damage—of insider threats to your corporate data are too devastating to ignore. Here’s how learning from industry best practices can help you prevent these threats, including fraud and information leakage, and protect your business: Demand 100% visibility so nothing gets missed Capturing data in logs [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The business risks—financial loss, failed audits, regulatory fines, and brand damage—of insider threats  to your corporate data are too devastating to ignore. Here’s how learning from industry best practices can help you prevent these threats, including fraud and information leakage, and protect your business:</p>
<p><strong>Demand 100% visibility so nothing gets missed</strong><br />
Capturing data in logs is a traditional method of understanding system activity but it doesn&#8217;t go far enough. Modern business intelligence tools tap into a hidden, information-rich data layer by capturing a complete, real-time, over-the-shoulder view of user activity across multiple data channels. This data should include queries and other read-only transactions that typically do not leave any traces in corporate databases or logs. This way, internal auditors, investigators and line of business managers can visually replay user actions screen by screen, keystroke by keystroke, just as if they were looking over the user’s shoulder. Not only can they see everything, but they can also place it into context. </p>
<p>Leading organizations use this data in a number of ways. Let&#8217;s explore a few of them:</p>
<p><strong>Take a pre-emptive approach to eradicate risk </strong><br />
Most solutions address insider threats after the user has already gained access to the target information and is trying to transfer it out of the organization. Network-level solutions work by looking for sensitive data created in outbound messages (e.g., emails and instant messages). Desktop-level solutions look in media created at the desktop (e.g., via printing, writing to USB flash disks, or writing to CDs). </p>
<p>These approaches are highly problematic. Once sensitive data is displayed on a user’s screen, it can be transferred in undetectable ways—e.g., copied down on paper or photographed with a cell phone camera. At this point, it’s already too late.</p>
<p>Leading next generation detection technologies takes a different approach, working at the application level to address threats before they occur. More specifically, these solutions monitor application usage so that you know exactly when sensitive information is being displayed on the user screen. When applications are monitored pro-actively, the fraudulent behavior that occurs prior to a leak can be detected. The leak can then be prevented at the point of data access—regardless of the strategy for leaking the data. </p>
<p><strong>Use real-time alerts to trigger fast action </strong><br />
The powerful analytical engines in the modern detection solutions track user behavior in real time, detecting cross-channel patterns and activities. In this way, it can pinpoint suspicious actions—based on business rules and weighted scores that you’ve defined—and generate real-time alerts related to questionable behavior. For example, here&#8217;s how Luminet does it:</p>
<p>A bank clerk who excessively searches for high- profile customer information, by customer name, much more than other clerks.<br />
A user who displays 500 customer accounts on a specific day, spending only a few seconds with each account, while on average he accesses only 100 customer accounts per day.</p>
<p>Alerts can be sent to internal auditors, who can use them to zero in on anomalies, eliminate false positives, and facilitate after-the-fact investigations. When these solutions are integrated with an operational system, the alerts can also trigger automatic actions—for example, the initiation of a “suspend user” process in the operational system. </p>
<p><strong>Faster, Easier Audit Prep </strong><br />
Your auditors expect precise and detailed information about how the thousands of people across your enterprise are accessing sensitive information on hundreds of applications each day. This often amounts to tens of thousands of screens of data and log entries. They also expect to see this information presented in a format that aligns with their unique regulatory requirements. With the next generation of business insight and compliance software, this information can be easily indexed, analyzed and distilled into meaningful reports&#8211;often at the click of a button.</p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</p>
<p><strong>Real life examples. Real results.</strong></p>
<p><strong>Tax Collection Agency Cuts Investigation Time by 76%</strong>A large tax collection agency, which manages tax collection for more than 110 million citizens, wanted to gain visibility into the nonlogged activities of trusted insiders and respond to new scrutiny around data protection. With Luminet, the agency has reduced fraud and prosecuted violators while cutting investigation time by 76%.</p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</p>
<p><strong>Nonprofit Mutual Insurance Firm Demonstrates Compliance with HIPAA and PCI DSS</strong> A nonprofit mutual insurance firm, part of a large consortium of health insurance providers, needed a fraud prevention and compliance solution that would help them uncover privacy violations and demonstrate compliance with HIPAA and PCI DSS. </p>
<p>The firm, which serves well over a million members, chose Luminet because of its comprehensive approach to data collection, reporting, and analysis. Luminet provides 100 percent visibility into user activity across all applications. It also triggers real-time alerts for exceptions. And its interactive tools detect the cross-channel patterns and trends of users across diverse departments and applications. </p>
<p>Armed with Luminet, the firm can help catch privacy violations, facilitate regulatory compliance, and reduce expenses related to audits, compliance reporting, and HIPAA-associated fines. </p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</p>
<p><strong>Credit Card Company Immediately Detects Employee Misuse</strong> A credit card company employed the Luminet technology for its ability to see, record, and analyze user activity across internal enterprise applications—thereby providing the intelligence needed to take informed action. Corporate IT used business rules available in Luminet to track user behavior patterns and generate real-time alerts on suspicious activity. And their work paid off. Just weeks after installation, the company identified an employee who was misusing his authorized access. </p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</p>
<p><strong>Government Agency Deters Fraud and Prevents Info Leak</strong> A government agency with more than 11,000 employees deployed the Luminet technology to view and record all user interactions with internal business applications. Employees and contractors were given fair warning: From now on their application activity would be recorded in real time—screen by screen, keystroke by keystroke—creating a complete audit trail directly from the network. </p>
<p>By capturing a complete over-the-shoulder view of user activity, the agency was able to deter fraud and prevent sensitive info from leaking into the wrong hands. </p>
<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;</p>
<p><strong>International European Insurance Company Tracks Privileged Users</strong> A European insurance company deployed the Luminet technology to help detect internal fraud. More specifically, one of the company’s objectives was to track the activity of privileged IT users, including database administrators, system administrators, and programmers. Trusted users, with their technical knowledge and authorized access to internal systems and resources, have the potential to devastate an institution.  </p>
<p>Using the Luminet technology, the company implemented business rules that generated real-time alerts on questionable activity patterns; e.g., a privileged user’s attempt to update information in a production database using a utility that could not otherwise be traced.   </p>
<p><a href="http://www.attachmate.com/solutions/managing-enterprise-fraud/industry/insider-threat-mitigation.htm" title="Learn more about how Luminet helps customers."></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/3-ways-leading-companies-reduce-risk/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>3 Types of Insider Threat and How to Spot Them</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/3-types-of-insider-threat-and-how-to-spot-them/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/3-types-of-insider-threat-and-how-to-spot-them/#comments</comments>
		<pubDate>Wed, 12 Sep 2012 21:34:28 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Insider Threat]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=193</guid>
		<description><![CDATA[Insider threats—the most challenging for organizations to address—are often difficult to spot and pose huge risks for your organization. While many of the motivations are the same, there are three distinct types of fraudulent insiders. Read part one of our series to understand who commits fraud. Part two will focus on what to look for [...]]]></description>
			<content:encoded><![CDATA[<p></p><p><strong>Insider threats—the most challenging for organizations to address—are often difficult to spot and pose huge risks for your organization. While many of the motivations are the same, there are three distinct types of fraudulent insiders. Read part one of our series to understand who commits fraud. Part two will focus on what to look for and how to spot trouble before it starts.</strong></p>
<p>You’re probably familiar with this classic bad-guy image:  A disgruntled employee enters a building in secret under cloak of night and begins to steal trusted information from a business. This image may even have kept you awake at night. In this scenario, the individual in question has privileged access to proprietary data and enough knowledge and intent to defraud the organization.<br />
As widespread as this image is, the true risks from insiders come from a few different areas and are often far less dramatic.</p>
<p><strong>The policy violator</strong><br />
Despite the commonly accepted vision we all have of  nefarious actors within our systems, individuals misusing company resources are, for the most part, not doing so with the intent to harm. Frequently, they are motivated to “just get the job done.” In this way, good employees may be breaking policies and creating risk without ever meaning to.<br />
Consider, for example, the well-meaning employees who exploit a back door in a legacy system in an effort to move through their workflow more efficiently. Surely they mean no harm, but without visibility to those actions, these employees may be introducing risk that not only threatens data integrity but also leaves no trace. That activity could go undiscovered until the day something goes dramatically wrong.<br />
Making internal actors aware of these risks is an important part of mitigating insider misuse. Gaining visibility into such activity, especially at the application layer, is essential. Taking steps to reduce misuse and error has the added benefit of protecting against more harmful insider threats as well.</p>
<p><strong>The low and slow fraudster</strong><br />
The most common type of fraud today is not the headline-grabbing theft of millions of credit card records. It’s the small crimes of opportunity that occur quietly, steadily, and repeatedly at the hands of your most trusted insiders—your employees, vendors, consultants, and contractors. This type of fraud occurs daily, and often goes undetected for weeks or months at a time.<br />
When it comes to actual fraud inside an organization, businesses might be surprised at the profile of the typical fraudster. According to research conducted by the CERT Insider Threat Center of Carnegie Mellon University&#8217;s Software Engineering Institute, on average, insiders are on the job for more than five years before they start committing fraud and that it takes nearly three years for their employers to detect their crimes. They are often trusted employees or managers who experience a life-changing event.</p>
<p>This study, funded by the Department of Homeland Security Science and Technology Directorate, examined 80 fraud cases that occurred between 2005 and 2012 to identify technical and behavioral patterns. The result? The study found that those individuals that operated “under the radar” escaped detection for longer periods of time and cost the target organization an average of $382,000 or more depending on how long they were able to operate without detection.</p>
<p>Commenting on the study, Randy Trzeciak, the technical lead of the Insider Threat Research Team, stated, &#8220;We also found that nearly 93% of fraud incidents were carried out by someone who did not hold a technical position within the organization or have privileged access to organizational systems.&#8221; In short, anyone in the organization has the potential to do harm.<br />
So, how do you address the issue of good employees gone bad? Again, visibility is the key. By being able to baseline an employee’s behavior over time and identify changes or spikes in activity that is different, you can spot this type of fraudster. Correlating this data over time and across multiple data channels can be difficult for humans. In these cases, where you need to manipulate “big data,” technology purpose-built for fraud and anomaly detection can give you an edge.</p>
<p><strong>The imposter</strong><br />
Insider threat committed by imposters is a reality. Every organization has a mix of employees, consultants, management, partners, and complex infrastructure and that makes finding and handling insider threats a challenge. Motivated by money or revenge, these insiders do commit fraud and steal valuable information. To make matters worse, these individuals do not want to be found. In an effort to operate undetected, they will often steal credentials and operate as if they were someone else. In short, you’ve just met the imposter. The problem is, you might not recognize her.<br />
An individual using someone else’s credentials can be very difficult to discover, track, and ultimately shut down. Their activity can remain hidden or even besmirch the reputation of a valued and honest employee. With all the machine data rattling around in the system, you may find the wolf. But could you tell if it was cloaked in sheep’s clothing?<br />
What if you could correlate data from multiple sources and compare the results to create a more comprehensive user profile. In an instant you could correlate access data with other sources. Imagine using technology to draw out these answers. Why is Janie at work? She didn’t scan her badge and her payroll record has her marked as taking a sick day, for example. Or, why is Bob accessing unusual data after hours from a machine or IP address that isn’t one he normally uses? Doesn’t that strike you as odd? It might be explainable behavior, but it’s probably worth investigating.</p>
<p><strong>Your reality</strong><br />
Insider threats are hard to detect. The traditional methods of identifying and alerting on outside attacks such as network perimeter security is useless when you are dealing with a privileged user or stolen credentials that permit an attacker to masquerade as something they are not. Even a good layered defense can be vulnerable to insiders if you’re not taking the time to examine the risks from an inside attack.<br />
Think about the levels of control you have in place today. You’ve probably done a good job hardening your defense from the outside in. You likely have policies, procedures, and technical controls to help keep your core assets safe. But without visibility—the ability to see beyond logs and really understand what your machines are telling you—can you really tell the good guys from the bad guys? Can you see the difference between accidental policy violations from persistent fraud? Probably not. </p>
<p><strong>Next time, we’ll show you how some of the world’s leading institutions do it.</strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/3-types-of-insider-threat-and-how-to-spot-them/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Most Common HIPAA Violation? Small-Scale Snooping</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/most-common-hipaa-violation-small-scale-snooping/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/most-common-hipaa-violation-small-scale-snooping/#comments</comments>
		<pubDate>Tue, 14 Aug 2012 20:04:49 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=184</guid>
		<description><![CDATA[Health privacy violations are lethal. They can create reputation management nightmares and generate stiff fines. Even a single HIPAA violation has serious financial consequences. The minimum fine now stands at $50,000, with a maximum penalty per year of up to $1.5 million per each provision of the rules. Since many healthcare privacy breaches involve multiple [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Health privacy violations are lethal. They can create reputation management nightmares and generate stiff fines. Even a single HIPAA violation has serious financial consequences. The minimum fine now stands at $50,000, with a maximum penalty per year of up to $1.5 million per each provision of the rules. Since many healthcare privacy breaches involve multiple violations, the cost of not protecting patient privacy can grow very quickly. We’ve even begun to see this demonstrated in the more recent HIPAA compliance enforcement actions. Care providers large and small are feeling the pressure. Even government agencies are not immune. </p>
<p>While headline-grabbing events like the HIPAA fine levied at the State of Alaska are being widely covered, there is another, hidden reality that is far more pervasive: Small-scale snooping is actually far more common than large scale theft or dramatic losses of equipment containing PHI. In fact, in the 2011 Survey of Patient Privacy Breaches*,  about 70% of the survey respondents  reported that they had experienced a HIPAA breach of some level—with the majority of those violations occurring as a result of snooping activity. Insiders were responsible for the majority of breaches, with 35 percent snooping into medical records of fellow employees and 27 percent accessing records of friends and relatives. More than half of the respondents stated that they lacked the appropriate tools for monitoring inappropriate access to PHI.</p>
<p>Organizations will continue to be held accountable for responding to audit and information requests. There are tools, like Attachmate Luminet, that support HIPAA compliance reporting requirements and Accounting of Disclosure requests are available today.  These leading solutions exist to help stop misuse and curtail privacy violations by seeing, recording, and analyzing user activity across all applications. In this way, these solutions can help you address a wide variety of PHI access and policy scenarios. When examining technology of this kind, make sure it can help you answer the following questions: </p>
<p>•	Is an employee logged in at multiple locations or accessing systems after hours while on vacation or absent from work?<br />
•	Is an employee accessing areas not appropriate for their job or function?<br />
•	Are physicians accessing records outside their specialty?<br />
•	Are employees accessing high profile or VIP accounts inappropriately?<br />
•	Are employees inappropriately accessing PHI within the institution?<br />
•	Are employees accessing accounts more than 30 days after the date of service? Has key account information—e.g., address or services rendered—changed?</p>
<p>When evaluating a solution provider, look for the ability to see beyond logs—to capture the query-only activity that happens when staff and care providers only want a “quick peek.” It may seem like harmless curiosity, but it represents a privacy violation that can land an institution into very hot water. </p>
<p>*The 2011 Survey of Patient Privacy Breaches was conducted by Veriphyr.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/most-common-hipaa-violation-small-scale-snooping/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What Is the True Cost of Fraud?</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/banking/what-is-the-true-cost-of-fraud/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/banking/what-is-the-true-cost-of-fraud/#comments</comments>
		<pubDate>Mon, 30 Jul 2012 01:48:50 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Banking Fraud]]></category>
		<category><![CDATA[Enterprise Fraud]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=161</guid>
		<description><![CDATA[Organizations lose millions to fraud. According to the most recent ACFE Report to the Nations, organizations lose about 5% of their annual revenue to fraud. That number is staggering. What’s even more troubling is all the different ways organizations are “paying” for the hidden fraud in their companies today. Here are just a few of [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Organizations lose millions to fraud. According to the most recent <a href="http://www.acfe.com/rttn.aspx" title="ACFE Report to the Nations" target="_blank">ACFE Report to the Nations</a>, organizations lose about 5% of their annual revenue to fraud. That number is staggering. What’s even more troubling is all the different ways organizations are “paying” for the hidden fraud in their companies today. Here are just a few of the ways that fraud impacts the bottom line: </p>
<p><strong>The Reality of Fines</strong><br />
Regulations have been part of data protection for over a decade. The heavy hitters, <a href="http://www.attachmate.com/solutions/managing-enterprise-fraud/get-compliant/get-compliant.htm" title="HIPAA, GLBA, FISMA, NIST, and PCI-DSS" target="_blank">HIPAA, GLBA, FISMA, NIST, PCI-DSS</a>, are all designed to reduce risk of information loss or exposure. And increasingly, these regulations carry fines. Think of it as a “carrot and stick” approach to regulation. Fines in banking are fairly common and regularly metered out. What’s interesting from an industry watcher’s perspective is the growing maturity of fines in other industries. </p>
<p>Most recently, eyes have been on HIPAA. The U.S. Department of Health and Human Services issued a $4.3M HIPAA fine to Maryland healthcare provider Cignet. In May of 2012, the agency also levied a HIPAA fine of $100,000 against a private practice. In doing so, the agency indicated that the size of violator is not an indication of the likelihood of getting fined. It&#8217;s a trend that&#8217;s likely to continue and put a laser focus on correcting HIPAA violations.</p>
<p><strong>What about Reputational Risk?</strong><br />
By far, the biggest opportunity for losses is brand damage. These costs only grow when you tot up things like litigation, loss of customers, a slide in shareholder value, etc. If there is one issue troubling the C-Suite, it’s this one. It consistently outranks other concerns like theft of IP and theft of assets. It even trups privacy concerns at many institutions. Why might that be, you ask? It’s a top concern year after year because reputational damage, damage to your brand, can wipe out profits in an instant. Customer leave institutions that fail to protect privacy in droves. And they oftentimes don’t come back. So in addition to the loss generated by the theft or breach, the drop in shareholder value, reduced business and litigation expense, you can add the cost of attracting new customers. If you’re industry is private banking, it may only take the loss of a handful of key accounts to really feel a pinch. Doesn’t it make sense to protect the data entrusted to you with the same zeal you have for making money for your clients?</p>
<p><strong>Over-paying for Insurance Premiums</strong><br />
Banks, financial institutions, hospitals and even insurers have insurance policies to cover fraud losses. While carrying those protections is probably prudent (after all, there has to be real risk or people wouldn’t need to hedge against it), those policies cost real money and any step to reduce risk and reduce premiums is more money in your pocket. </p>
<p><strong>The Problem with Write Offs</strong><br />
For years, there’s been an acknowledged problem with banking fraud. In an interview, noted security expert <a href="http://www.risk.net/operational-risk-and-regulation/news/1499405/banks-write-billions-stolen-funds-claims-fraud-expert" title="Juval Aviv">Juval Aviv</a>, reported the scope of the problem a few years back when he stated, “People are stealing billions every year (from banks) and getting away with it. Fraudsters know that if they are going to do it, they have to do it big and then complicate the investigation by moving the money across several banks in several countries.” He added, “Banks then write off these losses and the fraudsters know this.” The problem with this attitude is that it contributes to the problem. By failing to prosecute, banks are giving a kind of tacit permission to thieves to operate in their systems. I know that prosecution is hard. I know that information trails are notoriously incomplete—logs just don’t have the data to make an effective case against fraudsters the majority of the time. But there are technologies out there that can create a more comprehensive trail and contribute greatly to a layered security model. Looking at those tools, like Luminet from Attachmate, has got to be better than turning a blind eye.</p>
<p><strong>Conclusion</strong><br />
It’s fairly common in this industry to hear the refrain, “Fraud is just a cost of doing business.” It doesn’t have to be. If you’re interested in moving the bar on security and risk, it shouldn’t be. Permitting an “acceptable level of loss” means the bad guys are allowed to operate freely in your systems. Is that really OK?</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/banking/what-is-the-true-cost-of-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fraud in Government: New PWC Study Says its Getting Worse</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/#comments</comments>
		<pubDate>Thu, 17 May 2012 16:24:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[US Government]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=155</guid>
		<description><![CDATA[Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else. A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else.  A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime Survey, nearly half of organizations in the public sector have been hit by economic crime in the past 12 months. Cyber crime, employee and supplier fraud in particular are on the rise. The survey also found 46 per cent of respondents had experienced one or more incidents of such crime in the past year.  That’s quite a jump from 37 percent in 2009 and considerably higher than the average of 34 per cent across all sectors.<br />
Some of the other key findings from the survey are equally alarming:<br />
•	More than two-thirds of the crimes experienced in the past 12 months were committed by public sector employees, compared with just over half in 2009.<br />
•	Supplier fraud jumped from 13 per cent to 32 per cent over the same period.<br />
•	Over 50% of those surveyed said they had the resources to detect cyber crime, but most lack the forensic capabilities needed to investigate such incidents.<br />
Source: 2011 Global Economic Crime Survey, PWC: http://www.pwc.com/en_GX/gx/economic-crime-survey/assets/GECS_GLOBAL_REPORT.pdf<br />
Further, the study links this rise in activity to the cuts in public sector spending—a trend that is likely to continue and deepen if the current economic reality remains unchanged.<br />
Government agencies are clearly struggling to address internal fraud. Their efforts are complicated by shifting compliance requirements, impaired visibility into user activity, legacy systems that house mission-critical processes, and the limited effectiveness of existing controls and traditional logging capabilities. </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>