<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Insider Fraud Spotlight &#187; US Government</title>
	<atom:link href="http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/tag/us-government/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.attachmate.com/blogs/insider-fraud-spotlight</link>
	<description>Attachmate Luminet</description>
	<lastBuildDate>Mon, 05 Aug 2013 19:58:53 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.3.2</generator>
		<item>
		<title>Fraud in Government: New PWC Study Says its Getting Worse</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/#comments</comments>
		<pubDate>Thu, 17 May 2012 16:24:14 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Government Fraud]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[insider fraud]]></category>
		<category><![CDATA[threats]]></category>
		<category><![CDATA[US Government]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=155</guid>
		<description><![CDATA[Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else. A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>Government agencies around the globe are at risk from within. Just as in the private sector, more error and misuse occurs from internal employees and partners and suppliers than from anyone else.  A recent study from Price Waterhouse Coopers indicates that the problem may be getting worse. According to the consultancy’s latest Global Economic Crime Survey, nearly half of organizations in the public sector have been hit by economic crime in the past 12 months. Cyber crime, employee and supplier fraud in particular are on the rise. The survey also found 46 per cent of respondents had experienced one or more incidents of such crime in the past year.  That’s quite a jump from 37 percent in 2009 and considerably higher than the average of 34 per cent across all sectors.<br />
Some of the other key findings from the survey are equally alarming:<br />
•	More than two-thirds of the crimes experienced in the past 12 months were committed by public sector employees, compared with just over half in 2009.<br />
•	Supplier fraud jumped from 13 per cent to 32 per cent over the same period.<br />
•	Over 50% of those surveyed said they had the resources to detect cyber crime, but most lack the forensic capabilities needed to investigate such incidents.<br />
Source: 2011 Global Economic Crime Survey, PWC: http://www.pwc.com/en_GX/gx/economic-crime-survey/assets/GECS_GLOBAL_REPORT.pdf<br />
Further, the study links this rise in activity to the cuts in public sector spending—a trend that is likely to continue and deepen if the current economic reality remains unchanged.<br />
Government agencies are clearly struggling to address internal fraud. Their efforts are complicated by shifting compliance requirements, impaired visibility into user activity, legacy systems that house mission-critical processes, and the limited effectiveness of existing controls and traditional logging capabilities. </p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/government/fraud-in-government-new-pwc-study-says-its-getting-worse/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Proposed NIST Guidelines Call for Continuous Monitoring to Control Risk</title>
		<link>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/proposed-nist-guidelines-call-for-continuous-monitoring-to-control-risk/</link>
		<comments>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/proposed-nist-guidelines-call-for-continuous-monitoring-to-control-risk/#comments</comments>
		<pubDate>Thu, 02 Feb 2012 22:54:57 +0000</pubDate>
		<dc:creator>Christine Meyers</dc:creator>
				<category><![CDATA[Enterprise Fraud]]></category>
		<category><![CDATA[Continuous Monitoring]]></category>
		<category><![CDATA[Govt]]></category>
		<category><![CDATA[monitoring]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Standards]]></category>
		<category><![CDATA[US Government]]></category>

		<guid isPermaLink="false">http://www.attachmate.com/blogs/insider-fraud-spotlight/?p=130</guid>
		<description><![CDATA[The National Institute of Standards and Technology (NIST) released its proposed guidelines last week, which call for organizations to develop capabilities for continuous monitoring and enterprise-wide tracking of information to better measure the effectiveness of security policies and calculate risk of fraudulent activity. This is a forward-thinking approach by NIST, and we believe this is [...]]]></description>
			<content:encoded><![CDATA[<p></p><p>The National Institute of Standards and Technology (NIST) released its proposed guidelines last week, which call for organizations to develop capabilities for continuous monitoring and enterprise-wide tracking of information to better measure the effectiveness of security policies and calculate risk of fraudulent activity.</p>
<p>This is a forward-thinking approach by NIST, and we believe this is a step in the right direction.</p>
<p>Securing information management systems is essential for the wellbeing of companies. The value of information within today’s organizations is unprecedented, and companies should prioritize investments in ways to better protect and manage their information from insider attacks and fraud. Unfortunately, due to vulnerabilities in organizations’ infrastructure, organizations average approximately 53 employee-related incidents of fraud annually, which translates to approximately one incident per week.</p>
<p>From data storage to file transfers, many companies have distributed information systems that control many different tasks related to content management; companies grant specific permissions to employees to access the information in these repositories. While nearly all employees will access this information in order to complete their work, there is a risk that someone could have more devious intentions. A single case of insider abuse can have detrimental consequences. </p>
<p>The NIST guidelines call for organizations to adopt a “trust-but-verify” approach to information security, granting access to employees while monitoring for suspicious activity. Continuous monitoring provides a full picture of an organization’s security posture, measures the extent to which the organization is threatened by a potential circumstance or event, and enables the organization to make informed decisions to address risk.</p>
<p>Companies can start securing their information now by taking three actions:</p>
<p>1.	Audit your company’s current information management infrastructure to identify where information is being accessed, processed and stored. Because many companies have information spread across multiple systems, it is essential for you to understand all the access points and how different solutions are securing (or not securing) your organization’s important content and data.</p>
<p>2.	Understand the privacy and security policies that are currently in place at your organization and identify where improvements can be made with the NIST guidance. By understanding the policies your organization currently has established and comparing that to the NIST guidance, you can identify areas where your information management systems could be more secure and your information better protected against insider fraud.</p>
<p>3.	Compare information management systems that can help consolidate the monitoring and auditing practices outlined by NIST. Attachmate’s Luminet solution can help companies stop fraud and misuse of important information, gain compliancy with industry regulations without additional coding, and more easily create accurate, detailed audits of network access.</p>
<p>It is important for organizations to trust the people they hire, but it is also essential organizations take steps to protect themselves from the possibility of an insider attack on information. Be sure to check out the proposed NIST guidelines today to protect your information tomorrow.</p>
<p>-Christine Meyers, senior product marketing manager, Attachmate Luminet</p>
]]></content:encoded>
			<wfw:commentRss>http://www.attachmate.com/blogs/insider-fraud-spotlight/index.php/enterprise-fraud-2/proposed-nist-guidelines-call-for-continuous-monitoring-to-control-risk/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>