December 20, 2016

How Does Data Fraud Work? Check Out the Anatomy of a Fraud

The anatomy of a fraud is an interdependent process that ends up victimising people and organisations.

What is Fraud? 

Fraud is defined as “any intentional or deliberate act to deprive another of property or money by guile, deception, or other unfair means" by the Association of Certified Fraud Examiners.

How does fraud work?

While people tend to think of individuals getting defrauded, fraud against a company is also common. Insider fraudsters commit fraud in the workplace and on the job while criminals, customers and third-parties commit fraud from the outside.

What does fraud cost?  

According to a 2016 study by the Association of Certified Fraud Examiners, the typical organisation loses 5% of its revenues to fraud each year. 

How does data fraud happen? 
1- First Step

Criminals collect confidential information in different ways. Online, they use websites, social media pages, etc. Bin raiders physically steal information. Insider fraudsters physically steal information in the workplace, they use visual hacking strategies, and access files in computers.

2- Determining the Victim

Criminals study stolen data to determine if there is enough to target one victim or victim organisation. The criteria includes by the volume of information, how easy a target might be, and potential financial return.  

3- Rounding out a Stolen Identify

If there’s not enough information, the criminal uses other collection strategies. For example, social engineering involves tricking people into breaking security procedures – and mistakenly providing information or downloading malicious software. In a phishing scam, criminals pretend they are legitimate organisations and mail or phone to obtain more information.  

4- Identifying Holes

Criminals will identify points of weakness in an organisation or computer system. The ACFE 2016 Global Fraud Study found that a lack of internal controls contributed to data fraud most (it was cited in 29.3% of cases). The next weak spot was being able to override existing internal controls.

5- The Fraud

The fraudster will finally be ready to attack (it can take weeks or years even). The most common types of fraud are identity theft (opening accounts fraudulently, taking over existing accounts, etc.) Dishonest vendors might bill the company for goods or services not provided. Dishonest customers might submit bad checks or falsified account information for payment.

Prevention against fraud in the workplace

The following safeguards support data fraud prevention in the workplace.

  • Create a culture of security with commitment from all employees from the top down.
  • Stay up-to-date on compliance requirements.
  • Equip all hard drives with safeguards.
  • Provide on-going employee training.
  • Encourage employees to report misconduct with a whistle-blower hotline.
  • Use fraud risk assessments to identify risks.
  • Develop a cyber breach response plan.
  • Vet third-parties to make sure they are committed to information security.
  • Streamline security processes in the workplace. For example, partner with a document destruction leader that provides a chain of custody for the secure destruction of both paper documents and hard drives.