<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; insider threat</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/insider-threat-2/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>4 Kinds of Enterprise Fraud (And How to Prevent Them)</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/#comments</comments>
		<pubDate>Thu, 10 Nov 2011 00:11:09 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Enterprise Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[enterprise fraud]]></category>
		<category><![CDATA[failed audits]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[risk]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=88</guid>
		<description><![CDATA[Enterprise fraud and workplace policy abuse come in many forms, and every business is at risk.  Unfortunately, it&#8217;s not always obvious when workplace fraud occurs. Perpetrators are often insiders – long-time employees or trusted staff members who have access to sensitive information.  The very idea that these people would cheat you can be hard to [...]]]></description>
			<content:encoded><![CDATA[<p></p><p><a title="Enterprise fraud" href="http://www.attachmate.com/Products/efm/efm.htm">Enterprise fraud</a> and workplace policy abuse come in many forms, and every business is at risk.</p>
<p> Unfortunately, it&#8217;s not always obvious when workplace fraud occurs. Perpetrators are often insiders – long-time employees or trusted staff members who have access to sensitive information.</p>
<p> The very idea that these people would cheat you can be hard to accept. It may even be tempting to think, &#8220;It could never happen here.&#8221; But it could. And the less you do to prevent it, the more likely it is to occur.</p>
<p> Workplace fraud could mean failed compliance audits, hefty fines, or irreparable damage to your brand. It could also mean a serious blow to your bottom line.</p>
<p> So don&#8217;t let others profit unethically at your expense – take steps to stop them. Here are four common types of workplace fraud and some suggestions for avoiding an all-out fraud nightmare.</p>
<p>&nbsp;</p>
<p><strong>1. Accounting mischief</strong></p>
<p> If your accounts are vulnerable, employees can use them to their advantage. Think &#8220;skimming&#8221; small amounts of money from the tops of checks or taking unreported cash payments.</p>
<p> When the amounts are small, this type of fraud can be hard to detect. And if you never perform any audits, it could be virtually untraceable. While internal audits are an option, they&#8217;re often difficult to conduct. Slinging together data in an attempt to create a complete audit trail can quickly become a nightmare.</p>
<p> On the other hand, by bringing in external auditors, you&#8217;ll be able to keep your accounts in check. Make external audits routine, and you can prevent accounting fraud before it even starts.</p>
<p>&nbsp;</p>
<p><strong>2. Exchanged credentials</strong></p>
<p> Or falsified ones. With counterfeit documents, records, or licenses, scammers may seek employment at your organization. They may also use someone else&#8217;s credentials to gain access to your office or work facility.</p>
<p> Don&#8217;t forget: In hiring, even one fake reference represents a serious case of fraud.</p>
<p> Always call professional references, verify credentials, and conduct background checks of each new hire. After all, you should be confident in the employees who represent your organization, not suspicious of them.</p>
<p>&nbsp;</p>
<p><strong>3. Unauthorized data access</strong></p>
<p> The use of false credentials can also help employees access data that was never theirs to consume.</p>
<p> When this happens, the privacy of your patients or customers – not to mention confidential business information – could be in jeopardy. And what if employees don&#8217;t even <em>need</em> to use false credentials? What if they&#8217;re accessing sensitive information because it&#8217;s already easy to do so without being caught?</p>
<p> That&#8217;s why you must implement data-handling policies that specify who has access to what. Also establish a system for verification before anyone can access sensitive material. Things like passwords and account numbers should never be shared and, if possible, should be changed often.</p>
<p>&nbsp;</p>
<p><strong>4. The address swap</strong></p>
<p> This is what happens when an employee changes the address to which a check is sent – presumably to his or her own – and then changes it back.</p>
<p> To combat this kind of fraud, conduct regular reviews of all purchases. Consistent audits of accounts and contracts will also help protect you. While you don&#8217;t want to create a culture of surveillance that makes employees feel like Big Brother is lurking behind every corner, audits and reviews should create an atmosphere of accountability.</p>
<p> Because when employees are accountable for their actions, you&#8217;ll enjoy greater security.</p>
<p> For more information about <a href="http://www.attachmate.com/Products/efm/efm.htm">Enterprise Fraud Management</a>, be sure to check back here on Insider Fraud Spotlight!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/5-kinds-of-enterprise-fraud-and-how-to-prevent-them/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Check out the new 2011 Verizon Data Breach Report</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/check-out-the-new-2011-verizon-data-breach-report/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/check-out-the-new-2011-verizon-data-breach-report/#comments</comments>
		<pubDate>Fri, 07 Oct 2011 23:15:47 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[threat vectors]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=27</guid>
		<description><![CDATA[The new Verizon report came out this week. Always a favorite, this report highlights insider fraud, breach risks and other useful data. Here are some of my favorite stats: • 83% of attacks were classified as “opportunistic” meaning the victim was identified because they exhibited a weakness or vulnerability that the attacker could exploit. (pg. 52) [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The new Verizon report came out this week. Always a favorite, this report highlights <a title="insider fraud" href="http://www.attachmate.com/solutions/managing-enterprise-fraud/overview.htm">insider fraud</a>, breach risks and other useful data. Here are some of my favorite stats:</p>
<p>• 83% of attacks were classified as “opportunistic” meaning the victim was identified because they exhibited a weakness or vulnerability that the attacker could exploit. (pg. 52)<br />
• 74% of breaches in the study take weeks or months to discover (after point of compromise). (pg. 55)<br />
• 30% of fraud is discovered when there is a notification by law enforcement; 6% were reported to the organization by the affected customer or partner. (pg. 59)<br />
• 1/3 of the breaches studied in the report showed evidence of anti-forensics. (pg. 61)<br />
• A recommendation to restrict and monitor privileged users and conducting annual user account reviews were cited among the best ways to prevent or curtail fraud. (pg. 68)</p>
<p>You can find the full <a href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2011_en_xg.pdf" target="_blank">2011 Data Breach Investigations Report here</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/insider-threat/check-out-the-new-2011-verizon-data-breach-report/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>