<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; failed audits</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/failed-audits/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>4 Kinds of Enterprise Fraud (And How to Prevent Them)</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/#comments</comments>
		<pubDate>Thu, 10 Nov 2011 00:11:09 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Enterprise Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[enterprise fraud]]></category>
		<category><![CDATA[failed audits]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=88</guid>
		<description><![CDATA[Enterprise fraud and workplace policy abuse come in many forms, and every business is at risk.  Unfortunately, it&#8217;s not always obvious when workplace fraud occurs. Perpetrators are often insiders – long-time employees or trusted staff members who have access to sensitive information.  The very idea that these people would cheat you can be hard to [...]]]></description>
			<content:encoded><![CDATA[<p></p><p><a title="Enterprise fraud" href="http://www.attachmate.com/Products/efm/efm.htm">Enterprise fraud</a> and workplace policy abuse come in many forms, and every business is at risk.</p>
<p> Unfortunately, it&#8217;s not always obvious when workplace fraud occurs. Perpetrators are often insiders – long-time employees or trusted staff members who have access to sensitive information.</p>
<p> The very idea that these people would cheat you can be hard to accept. It may even be tempting to think, &#8220;It could never happen here.&#8221; But it could. And the less you do to prevent it, the more likely it is to occur.</p>
<p> Workplace fraud could mean failed compliance audits, hefty fines, or irreparable damage to your brand. It could also mean a serious blow to your bottom line.</p>
<p> So don&#8217;t let others profit unethically at your expense – take steps to stop them. Here are four common types of workplace fraud and some suggestions for avoiding an all-out fraud nightmare.</p>
<p>&nbsp;</p>
<p><strong>1. Accounting mischief</strong></p>
<p> If your accounts are vulnerable, employees can use them to their advantage. Think &#8220;skimming&#8221; small amounts of money from the tops of checks or taking unreported cash payments.</p>
<p> When the amounts are small, this type of fraud can be hard to detect. And if you never perform any audits, it could be virtually untraceable. While internal audits are an option, they&#8217;re often difficult to conduct. Slinging together data in an attempt to create a complete audit trail can quickly become a nightmare.</p>
<p> On the other hand, by bringing in external auditors, you&#8217;ll be able to keep your accounts in check. Make external audits routine, and you can prevent accounting fraud before it even starts.</p>
<p>&nbsp;</p>
<p><strong>2. Exchanged credentials</strong></p>
<p> Or falsified ones. With counterfeit documents, records, or licenses, scammers may seek employment at your organization. They may also use someone else&#8217;s credentials to gain access to your office or work facility.</p>
<p> Don&#8217;t forget: In hiring, even one fake reference represents a serious case of fraud.</p>
<p> Always call professional references, verify credentials, and conduct background checks of each new hire. After all, you should be confident in the employees who represent your organization, not suspicious of them.</p>
<p>&nbsp;</p>
<p><strong>3. Unauthorized data access</strong></p>
<p> The use of false credentials can also help employees access data that was never theirs to consume.</p>
<p> When this happens, the privacy of your patients or customers – not to mention confidential business information – could be in jeopardy. And what if employees don&#8217;t even <em>need</em> to use false credentials? What if they&#8217;re accessing sensitive information because it&#8217;s already easy to do so without being caught?</p>
<p> That&#8217;s why you must implement data-handling policies that specify who has access to what. Also establish a system for verification before anyone can access sensitive material. Things like passwords and account numbers should never be shared and, if possible, should be changed often.</p>
<p>&nbsp;</p>
<p><strong>4. The address swap</strong></p>
<p> This is what happens when an employee changes the address to which a check is sent – presumably to his or her own – and then changes it back.</p>
<p> To combat this kind of fraud, conduct regular reviews of all purchases. Consistent audits of accounts and contracts will also help protect you. While you don&#8217;t want to create a culture of surveillance that makes employees feel like Big Brother is lurking behind every corner, audits and reviews should create an atmosphere of accountability.</p>
<p> Because when employees are accountable for their actions, you&#8217;ll enjoy greater security.</p>
<p> For more information about <a href="http://www.attachmate.com/Products/efm/efm.htm">Enterprise Fraud Management</a>, be sure to check back here on Insider Fraud Spotlight!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>We See Insider Fraud Every Day</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/we-see-insider-fraud-every-day/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/we-see-insider-fraud-every-day/#comments</comments>
		<pubDate>Sun, 02 Oct 2011 15:13:13 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[enterprise fraud]]></category>
		<category><![CDATA[failed audits]]></category>
		<category><![CDATA[financial loss]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=23</guid>
		<description><![CDATA[Enterprise fraud and misuse is on the rise.  A recent study by the Ponemon Institute found that of the organizations surveyed, on average respondents experienced more than one incident of employee-related fraud per week – about 53 in a year’s time. Twenty-four percent of respondents indicated that their organizations experienced more than 100 incidents in the past 12 [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Enterprise fraud and misuse is on the rise.  A recent study by the Ponemon Institute found that of the organizations surveyed, on average respondents experienced more than one incident of employee-related fraud per week – about <strong>53 </strong>in a year’s time. Twenty-four percent of respondents indicated that their organizations experienced <strong>more than 100 incidents in the past 12 months</strong>. I’ve been in this industry for a long time and even my jaded soul was shocked by the findings. But I guess I really shouldn’t have been surprised.</p>
<p>The reality is that our increasingly connected world provides boundless opportunities for employees to accidentally stumble into private realms of information—or to trespass with malicious intent.</p>
<p>Here are some typical problems we see out in the wild:</p>
<ul>
<li>An employee uses someone else’s credentials to access information he doesn’t have rights to.</li>
<li>An employee changes the address in a customer record, and then reinstates the correct address after a check has been sent.</li>
<li>A curious—or star-struck—employee casually accesses personal information about a neighbor or a celebrity.</li>
<li>Organizations, caught be a breach or privacy mishap, find themselves scrambling to piece together incomplete data in a frustrating attempt to create a complete audit trail.</li>
</ul>
<p>Financial loss, failed audits, regulatory fines, and brand damage—these are just a few of the devastating risks of being in the dark when it comes to fraud and misuse. We see it every day.</p>
<p>We also see that businesses are stuck trying to clearly distinguish between the legitimate work of their employees and suspicious activity because the evidence trail is often missing. Organizations seeking to be proactive about managing the risk of fraud within their enterprise should take pains to discover, capture, monitor and alert on the  following activities:</p>
<ul>
<li>After-hours access of information</li>
<li>Employee change records in customer accounts—like changing an address and then changing it back</li>
<li>Out of band transaction requests</li>
<li>Multiple failed password attempts</li>
<li>Account snooping—especially VIP accounts or dormant accounts</li>
</ul>
<p>Watching out for fraud and misuse is a nuanced business. The activity is often hidden or obscured—and all too often the trail has gone<br />
cold by the time you figure out the fraud occurred. When evaluating possible solutions to your enterprise fraud challenge, focus on the next generation of fraud technologies. They’ll get you farther faster and with the flexibility you need to really hone in on what’s right for your business.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/we-see-insider-fraud-every-day/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>