<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; insider fraud</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/insider-fraud/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Fraud in Government: New PWC Study Says its Getting Worse</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/#comments</comments>
		<pubDate>Thu, 17 May 2012 16:24:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[US Government]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=155</guid>
		<description><![CDATA[Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else. A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else.  A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime Survey, nearly half of organizations in the public sector have been hit by economic crime in the past 12 months. Cyber crime, employee and supplier fraud in particular are on the rise. The survey also found 46 per cent of respondents had experienced one or more incidents of such crime in the past year.  That’s quite a jump from 37 percent in 2009 and considerably higher than the average of 34 per cent across all sectors.<br />
Some of the other key findings from the survey are equally alarming:<br />
•	More than two-thirds of the crimes experienced in the past 12 months were committed by public sector employees, compared with just over half in 2009.<br />
•	Supplier fraud jumped from 13 per cent to 32 per cent over the same period.<br />
•	Over 50% of those surveyed said they had the resources to detect cyber crime, but most lack the forensic capabilities needed to investigate such incidents.<br />
Source: 2011 Global Economic Crime Survey, PWC: http://www.pwc.com/en_GX/gx/economic-crime-survey/assets/GECS_GLOBAL_REPORT.pdf<br />
Further, the study links this rise in activity to the cuts in public sector spending—a trend that is likely to continue and deepen if the current economic reality remains unchanged.<br />
Government agencies are clearly struggling to address internal fraud. Their efforts are complicated by shifting compliance requirements, impaired visibility into user activity, legacy systems that house mission-critical processes, and the limited effectiveness of existing controls and traditional logging capabilities. </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Costs of Insider Fraud</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/the-costs-of-insider-fraud/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/the-costs-of-insider-fraud/#comments</comments>
		<pubDate>Wed, 21 Dec 2011 15:18:43 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[EFM]]></category>
		<category><![CDATA[enterprise fraud]]></category>
		<category><![CDATA[enterprise fraud management]]></category>
		<category><![CDATA[insider fraud]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=105</guid>
		<description><![CDATA[Information technology moves fast. Recent advances have led to streamlined business operations and innovative products and services. They have also opened up new avenues for fraud. Breach announcements disclosing information leaks and theft of privacy data are so commonplace, many of us turn a deaf ear to them and a blind eye to the underlying vulnerabilities they [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Information technology moves fast. Recent advances have led to streamlined business operations and innovative products and services. They have also opened up new avenues for fraud. Breach announcements disclosing information leaks and theft of privacy data are so commonplace, many of us turn a deaf ear to them and a blind eye to the underlying vulnerabilities they represent. But should we? What is it that these events actually represent?</p>
<p>In some cases, these incidents are the result of an outside-in attack. Worms, malware, phishing scams come to mind. However, it&#8217;s easy to overlook the insider threats that lurk in every business. No one likes to think that their trusted insiders&#8211;employees, contractors, consultants, and even trusted business partners&#8211;could be committing fraud and data abuse from within their systems. Frankly, it is an ugly thought. And, unfortunately, it&#8217;s a reality. The wide array of threats that businesses face often originate from the inside.</p>
<p>In today&#8217;s fast paced, connected business environments, anyone can exploit the privileges and knowledge they have acquired about business operations and practices to commit fraud, violate privacy protections, and steal valuable confidential information. Fortunately, detection and prevention practices and applications are adapting to the threats posed by malicious insiders.</p>
<p>As you consider your risk profile and how to mitigate such abuses within your own systems, consider the power of continuous monitoring and continuous audit. With the next-generation monitoring technologies, you and your auditors can have greater confidence that data is safe and protected, that your policies are actually being followed and that you can quickly spot “bad actors” intent on doing harm or introducing error.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/the-costs-of-insider-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>4 Kinds of Enterprise Fraud (And How to Prevent Them)</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/#comments</comments>
		<pubDate>Thu, 10 Nov 2011 00:11:09 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Enterprise Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[enterprise fraud]]></category>
		<category><![CDATA[failed audits]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=88</guid>
		<description><![CDATA[Enterprise fraud and workplace policy abuse come in many forms, and every business is at risk.  Unfortunately, it&#8217;s not always obvious when workplace fraud occurs. Perpetrators are often insiders – long-time employees or trusted staff members who have access to sensitive information.  The very idea that these people would cheat you can be hard to [...]]]></description>
			<content:encoded><![CDATA[<p></p><p><a title="Enterprise fraud" href="http://www.attachmate.com/Products/efm/efm.htm">Enterprise fraud</a> and workplace policy abuse come in many forms, and every business is at risk.</p>
<p> Unfortunately, it&#8217;s not always obvious when workplace fraud occurs. Perpetrators are often insiders – long-time employees or trusted staff members who have access to sensitive information.</p>
<p> The very idea that these people would cheat you can be hard to accept. It may even be tempting to think, &#8220;It could never happen here.&#8221; But it could. And the less you do to prevent it, the more likely it is to occur.</p>
<p> Workplace fraud could mean failed compliance audits, hefty fines, or irreparable damage to your brand. It could also mean a serious blow to your bottom line.</p>
<p> So don&#8217;t let others profit unethically at your expense – take steps to stop them. Here are four common types of workplace fraud and some suggestions for avoiding an all-out fraud nightmare.</p>
<p>&nbsp;</p>
<p><strong>1. Accounting mischief</strong></p>
<p> If your accounts are vulnerable, employees can use them to their advantage. Think &#8220;skimming&#8221; small amounts of money from the tops of checks or taking unreported cash payments.</p>
<p> When the amounts are small, this type of fraud can be hard to detect. And if you never perform any audits, it could be virtually untraceable. While internal audits are an option, they&#8217;re often difficult to conduct. Slinging together data in an attempt to create a complete audit trail can quickly become a nightmare.</p>
<p> On the other hand, by bringing in external auditors, you&#8217;ll be able to keep your accounts in check. Make external audits routine, and you can prevent accounting fraud before it even starts.</p>
<p>&nbsp;</p>
<p><strong>2. Exchanged credentials</strong></p>
<p> Or falsified ones. With counterfeit documents, records, or licenses, scammers may seek employment at your organization. They may also use someone else&#8217;s credentials to gain access to your office or work facility.</p>
<p> Don&#8217;t forget: In hiring, even one fake reference represents a serious case of fraud.</p>
<p> Always call professional references, verify credentials, and conduct background checks of each new hire. After all, you should be confident in the employees who represent your organization, not suspicious of them.</p>
<p>&nbsp;</p>
<p><strong>3. Unauthorized data access</strong></p>
<p> The use of false credentials can also help employees access data that was never theirs to consume.</p>
<p> When this happens, the privacy of your patients or customers – not to mention confidential business information – could be in jeopardy. And what if employees don&#8217;t even <em>need</em> to use false credentials? What if they&#8217;re accessing sensitive information because it&#8217;s already easy to do so without being caught?</p>
<p> That&#8217;s why you must implement data-handling policies that specify who has access to what. Also establish a system for verification before anyone can access sensitive material. Things like passwords and account numbers should never be shared and, if possible, should be changed often.</p>
<p>&nbsp;</p>
<p><strong>4. The address swap</strong></p>
<p> This is what happens when an employee changes the address to which a check is sent – presumably to his or her own – and then changes it back.</p>
<p> To combat this kind of fraud, conduct regular reviews of all purchases. Consistent audits of accounts and contracts will also help protect you. While you don&#8217;t want to create a culture of surveillance that makes employees feel like Big Brother is lurking behind every corner, audits and reviews should create an atmosphere of accountability.</p>
<p> Because when employees are accountable for their actions, you&#8217;ll enjoy greater security.</p>
<p> For more information about <a href="http://www.attachmate.com/Products/efm/efm.htm">Enterprise Fraud Management</a>, be sure to check back here on Insider Fraud Spotlight!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Medical Identity Theft&#8211;The Next Big Thing?</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/#comments</comments>
		<pubDate>Tue, 08 Nov 2011 14:08:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Healthcare Fraud]]></category>
		<category><![CDATA[enterprise fraud]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[medical identity theft]]></category>
		<category><![CDATA[patient privacy]]></category>
		<category><![CDATA[Ponemon]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=78</guid>
		<description><![CDATA[&#160; I was speaking with a friend the other day about Medical Identity Theft, HIPAA compliance and enterprise fraud management. We were discussing a survey report published in March by the Ponemon Institute that found roughly 1.5 million Americans are victims of medical ID theft. In the survey, fourteen percent of respondents said the breach [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>&nbsp;</p>
<p>I was speaking with a friend the other day about Medical Identity Theft, <a title="HIPAA compliance and enterprise fraud management" href="http://www.attachmate.com/solutions/managing-enterprise-fraud/industry/healthcare.htm">HIPAA compliance and enterprise fraud management</a>. We were discussing a survey report published in March by the Ponemon Institute that found roughly 1.5 million Americans are victims of medical ID theft. In the survey, fourteen percent of respondents said the breach occurred at a health care office, and 10% said employees at a health care organization&#8217;s office had stolen the data.</p>
<p> It occurred to me that medical identity theft is one of those “wild west” opportunities for identity thieves at the moment. While everyone is pretty familiar with the concept of financial fraud and what happens when your credit card information is stolen, what happens when someone pretends to be you to access medical care can have far more devastating consequences.</p>
<p>According to the Federal Bureau of Consumer Protection, here are some indications that might indicate that someone has been a victim of medical identity theft. Victims may:</p>
<ul>
<li>get a bill for medical services they didn’t receive;</li>
<li>be contacted by a debt collector about medical debt they don’t owe;</li>
<li>see medical collection notices on their credit report that they don’t recognize;</li>
<li>be told by their health plan that they’ve reached their limit on benefits; or</li>
<li>be denied insurance because their medical records show a condition they don’t have.</li>
</ul>
<p>Source: <a href="http://business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care-health-plan">http://business.ftc.gov/documents/bus75-medical-identity-theft-faq-health-care-health-plan</a></p>
<p>Whoa—think about that for a moment. Those are significant impacts. Then, spin the scenario out a bit further. What happens if medical records become co-mingled at the provider level? Can you get to a point where the records of the thief are entered into the medical history of the victim? According to the experts, you can. Back in 2006, Pam Dixon, founder of the World Privacy Forum, referenced the challenges that medical identity theft can create and cited examples of misinformation appearing in patient files. She also stated that changes to patient records could remain in the files for many years.</p>
<p><strong>Providers Protecting Privacy as Part of Their Healthcare Brand</strong></p>
<p>Leading healthcare organizations are increasingly seeing ways to protect their brand while safeguarding patient privacy. Moving the privacy discussion beyond the HIPAA disclosure form that all of us sign when accessing care and making ePHI protection a differentiator demonstrates a commitment on the part of the provider. When given a choice, my healthcare dollars are spent with those institutions that care enough about me to protect my personal information. It just makes sense to require the same level of accountability from my doctor as I do from my bank—the risks are just as real and the opportunity for damage may even be greater.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/healthcare/medical-identity-theft-the-next-big-thing/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>