<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; Continuous Monitoring</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/continuous-monitoring/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Reasons Why Corporate Compliance is Good for Business</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/uncategorized/why-companies-ignore-fraud-prevention-failures/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/uncategorized/why-companies-ignore-fraud-prevention-failures/#comments</comments>
		<pubDate>Thu, 20 Jun 2013 14:10:17 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[hitech]]></category>
		<category><![CDATA[omnibus]]></category>
		<category><![CDATA[pci dss]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=250</guid>
		<description><![CDATA[Collecting data and preparing reports for an auditor can seem burdensome and confusing. With so many regulations in place, the paperwork never seems to end. But the regulatory process is actually good for your business. After all, regulations were put in place by industry groups and government agencies to protect the public and shareholder interests. [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Collecting data and preparing reports for an auditor can seem burdensome and confusing. With so many regulations in place, the paperwork never seems to end.<br />
But the regulatory process is actually good for your business. After all, regulations were put in place by industry groups and government agencies to protect the public and shareholder interests. Those protections have benefits for your organization:<br />
•	The public, aka your customers, will trust you to continually guard their confidential and financial information. These relationships are the heart and soul of your business.<br />
•	A compliance system reduces your risk. It protects you from the people who can access your sensitive information and operations in the course of doing business every day—your employees, consultants and partners.<br />
•	It safeguards your reputation by preventing security breaches that play out in the public’s eye.<br />
•	The process of meeting reporting requirements can present an opportunity for streamlining disparate business systems for collecting and reporting data.<br />
The ABC’s of Corporate Compliance<br />
You most likely need to comply with multiple regulations, but the good news is that all of them require the same basic data:  a complete and accurate trail of user access to confidential information.<br />
With Attachmate Luminet fraud management software, you can do that and much more. It enables you to track all user activity on an application-by-application basis, then store that information in a secure repository, allowing you to analyze and detect violations, and to efficiently generate specific reports for various regulatory bodies.  Here are the details.<br />
Observe and Capture Data of User Activity Across an Enterprise Network<br />
Fraudulent behavior typically takes multiple steps and involves several applications. Capturing this data on an enterprise network is tricky. Every large organization has a mix of legacy and new applications and databases. For example, a user might access a sophisticated CRM database to update a user account, then share related information on an intranet via an ancient web-based app. Tracking all user activity in these conditions requires pulling log data (if an application even creates it) from numerous applications; then the data must be correlated with user authentications and behaviors— what a mind-boggling task.<br />
Luminet erases the need to piece together data from multiple applications and databases. It captures data from user activity on an application level in real time, which allows fraud investigators to visually replay user actions, screen-by-screen and keystroke-by-keystroke. </p>
<p>Analyzing Data to Detect Fraud<br />
Luminet stores user-activity data in a secure, digitally signed repository. Its powerful analytics engine lets you search its store of current on recorded activity to identify suspicious behavior based on business rules that you define. When Luminet uncovers potentially fraudulent activity, it generates an alert to warn you to immediately evaluate the behavior. </p>
<p>Generating Reports for Auditors<br />
Two aspects of an audit are guaranteed. First, you won’t know the exact format a report will take until the auditors ask for it.  And secondly, you will know auditors will also expect comprehensive, detailed information on how thousands of employees access sensitive customer information.<br />
Since Luminet stores data from user activity on an application basis, you can easily provide auditors with the specific information they need.  And, if an auditor asks for a different view into the data, there’s no need to pull more data from disparate application log files. You adjust your business rules and let Luminet’s reporting capabilities generate new charts, graphs, dashboards, and reports.<br />
Creating a Culture of Integrity and Transparency<br />
Instituting a corporate compliance program sends the message that you care about protecting your customers’ personal information. With Luminet fraud software, you can ensure all data stays private and your business realizes the benefits from putting a process in place. Luminet will help you better manage risk of exposing sensitive data; streamline systems and operations; and help compliance personnel be more efficient.<br />
Yes, regulatory compliance takes work. But we believe the pain is mitigated by gain.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/uncategorized/why-companies-ignore-fraud-prevention-failures/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fraud in Government: New PWC Study Says its Getting Worse</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/#comments</comments>
		<pubDate>Thu, 17 May 2012 16:24:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[US Government]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=155</guid>
		<description><![CDATA[Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else. A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else.  A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime Survey, nearly half of organizations in the public sector have been hit by economic crime in the past 12 months. Cyber crime, employee and supplier fraud in particular are on the rise. The survey also found 46 per cent of respondents had experienced one or more incidents of such crime in the past year.  That’s quite a jump from 37 percent in 2009 and considerably higher than the average of 34 per cent across all sectors.<br />
Some of the other key findings from the survey are equally alarming:<br />
•	More than two-thirds of the crimes experienced in the past 12 months were committed by public sector employees, compared with just over half in 2009.<br />
•	Supplier fraud jumped from 13 per cent to 32 per cent over the same period.<br />
•	Over 50% of those surveyed said they had the resources to detect cyber crime, but most lack the forensic capabilities needed to investigate such incidents.<br />
Source: 2011 Global Economic Crime Survey, PWC: http://www.pwc.com/en_GX/gx/economic-crime-survey/assets/GECS_GLOBAL_REPORT.pdf<br />
Further, the study links this rise in activity to the cuts in public sector spending—a trend that is likely to continue and deepen if the current economic reality remains unchanged.<br />
Government agencies are clearly struggling to address internal fraud. Their efforts are complicated by shifting compliance requirements, impaired visibility into user activity, legacy systems that house mission-critical processes, and the limited effectiveness of existing controls and traditional logging capabilities. </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Major security breaches hit healthcare</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/#comments</comments>
		<pubDate>Tue, 01 May 2012 23:28:38 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[threats]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=143</guid>
		<description><![CDATA[The statistics are startling: In April 2012 alone, three major security breaches that hit the Utah Department of Health (UDH), Emory Healthcare and South Carolina’s Department of Health and Human Services accounted for nearly 1.1 million records lost. And it was the work of insiders. According to an article entitled “Healthcare Unable to Keep Up [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The statistics are startling: In April 2012 alone, three major security breaches that hit the Utah Department of Health (UDH), Emory Healthcare and South Carolina’s Department of Health and Human Services accounted for nearly 1.1 million records lost.  </p>
<p>And it was the work of insiders.</p>
<p>According to an article entitled “Healthcare Unable to Keep Up with Insider Threats” by Ericka Chickowski on the Dark Reading website, the three incidents are typical of “the types of consequences healthcare organizations face when they fail to address insider threats through improved employee screening, monitoring, data controls, and security awareness training.”.</p>
<p>These insider threats were and are potentially malicious and at the very least inept. In the case of the UDH, records were exposed due to the misconfiguration of a server containing the files. At Emory, human error accounted for the loss of a significant number of patient records when 10 backup disks went missing. In South Carolina, a DHHS employee (who has since been fired and arrested) sent thousands of Medicaid patient records to himself in an email.</p>
<p>The healthcare industry, by and large, “has been notoriously incapable of pinpointing risks in general, let alone those from insiders,” the article offers. Sourcing the problem is difficult because these security holes include loss or theft of portable devices such as laptops, smartphones, external drives and backup tapes; actual theft by data thieves; and simple staff ignorance in terms of security, protocol and training.</p>
<p>With solutions available today, those institutions could easily tell the difference between intentional and non-intentional privacy violations, achieve full regulatory compliance, and pass any audit with real-time user activity log files. As the “insider threat” continues to grow right along with the healthcare industry, major steps will need to be taken to stanch the flow of lost and misappropriated records that can and will lead to increased fraud and identity theft. The time to act is now. </p>
<p>To learn more about Attachmate’s Luminet enterprise fraud management software please visit http://www.attachmate.com/Products/efm/luminet/luminet.htm.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/major-security-breaches-hit-healthcare/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Proposed NIST Guidelines Call for Continuous Monitoring to Control Risk</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/proposed-nist-guidelines-call-for-continuous-monitoring-to-control-risk/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/proposed-nist-guidelines-call-for-continuous-monitoring-to-control-risk/#comments</comments>
		<pubDate>Thu, 02 Feb 2012 22:54:57 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Enterprise Fraud]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[Govt]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Standards]]></category>
		<category><![CDATA[US Government]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=130</guid>
		<description><![CDATA[The National Institute of Standards and Technology (NIST) released its proposed guidelines last week, which call for organizations to develop capabilities for continuous monitoring and enterprise-wide tracking of information to better measure the effectiveness of security policies and calculate risk of fraudulent activity. This is a forward-thinking approach by NIST, and we believe this is [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The National Institute of Standards and Technology (NIST) released its proposed guidelines last week, which call for organizations to develop capabilities for continuous monitoring and enterprise-wide tracking of information to better measure the effectiveness of security policies and calculate risk of fraudulent activity.</p>
<p>This is a forward-thinking approach by NIST, and we believe this is a step in the right direction.</p>
<p>Securing information management systems is essential for the wellbeing of companies. The value of information within today’s organizations is unprecedented, and companies should prioritize investments in ways to better protect and manage their information from insider attacks and fraud. Unfortunately, due to vulnerabilities in organizations’ infrastructure, organizations average approximately 53 employee-related incidents of fraud annually, which translates to approximately one incident per week.</p>
<p>From data storage to file transfers, many companies have distributed information systems that control many different tasks related to content management; companies grant specific permissions to employees to access the information in these repositories. While nearly all employees will access this information in order to complete their work, there is a risk that someone could have more devious intentions. A single case of insider abuse can have detrimental consequences. </p>
<p>The NIST guidelines call for organizations to adopt a “trust-but-verify” approach to information security, granting access to employees while monitoring for suspicious activity. Continuous monitoring provides a full picture of an organization’s security posture, measures the extent to which the organization is threatened by a potential circumstance or event, and enables the organization to make informed decisions to address risk.</p>
<p>Companies can start securing their information now by taking three actions:</p>
<p>1.	Audit your company’s current information management infrastructure to identify where information is being accessed, processed and stored. Because many companies have information spread across multiple systems, it is essential for you to understand all the access points and how different solutions are securing (or not securing) your organization’s important content and data.</p>
<p>2.	Understand the privacy and security policies that are currently in place at your organization and identify where improvements can be made with the NIST guidance. By understanding the policies your organization currently has established and comparing that to the NIST guidance, you can identify areas where your information management systems could be more secure and your information better protected against insider fraud.</p>
<p>3.	Compare information management systems that can help consolidate the monitoring and auditing practices outlined by NIST. Attachmate’s Luminet solution can help companies stop fraud and misuse of important information, gain compliancy with industry regulations without additional coding, and more easily create accurate, detailed audits of network access.</p>
<p>It is important for organizations to trust the people they hire, but it is also essential organizations take steps to protect themselves from the possibility of an insider attack on information. Be sure to check out the proposed NIST guidelines today to protect your information tomorrow.</p>
<p>-Christine Meyers, senior product marketing manager, Attachmate Luminet</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/proposed-nist-guidelines-call-for-continuous-monitoring-to-control-risk/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>