<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Resolution &#187; Insider fraud</title>
	<atom:link href="http://www.experian.com/blogs/data-breach/tag/insider-fraud/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.experian.com/blogs/data-breach</link>
	<description>Tools to help you navigate privacy, compliance, and security issues that may result in a data breach.</description>
	<lastBuildDate>Thu, 03 Jan 2013 19:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Scam report: Insider fraud</title>
		<link>http://www.experian.com/blogs/data-breach/2011/06/21/scam-report-insider-fraud/</link>
		<comments>http://www.experian.com/blogs/data-breach/2011/06/21/scam-report-insider-fraud/#comments</comments>
		<pubDate>Tue, 21 Jun 2011 16:16:21 +0000</pubDate>
		<dc:creator>bkrenek</dc:creator>
				<category><![CDATA[Breach Prevention]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[anti-fraud systems]]></category>
		<category><![CDATA[Global Fraud Report]]></category>
		<category><![CDATA[Insider fraud]]></category>
		<category><![CDATA[privacy breaches]]></category>

		<guid isPermaLink="false">http://www.experian.com/blogs/data-breach/?p=646</guid>
		<description><![CDATA[According to a Report to the Nations on Occupational Fraud and Abuse, in 2009, the average company lost nearly 5% of its revenue to fraud perpetrated by employees.]]></description>
			<content:encoded><![CDATA[<div class="tweetmeme_button" style="float: right; margin-left: 10px;">
			<a href="http://api.tweetmeme.com/share?url=http%3A%2F%2Fwww.experian.com%2Fblogs%2Fdata-breach%2F2011%2F06%2F21%2Fscam-report-insider-fraud%2F"><br />
				<img src="http://api.tweetmeme.com/imagebutton.gif&amp;source=Experian_DBR&amp;style=normal&amp;hashtags=anti-fraud+systems,Global+Fraud+Report,Insider+fraud,privacy+breaches&amp;b=2" height="61" width="50" /><br />
			</a>
		</div>
<p><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/security-breach1.jpg"><img class="aligncenter size-full wp-image-648" title="Breaking in" src="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/security-breach1.jpg" alt="" width="425" height="282" /></a><a href="http://www.experian.com/blogs/data-breach/wp-content/uploads/2011/06/Data%20security.jpg" class="broken_link" rel="nofollow"></a></p>
<p>When the economy dips, insider fraud rises, and the latest recession offers no exceptions.    Whether it’s intellectual property theft, sabotage, or <a href="http://www.experian.com/blogs/data-breach/2011/02/15/10-ways-that-breaches-burn-business/" target="_blank">privacy breaches</a> made possible by the illicit use of privileged information, fraud by insiders – be they employees, contractors, consultants, or trusted business partners – can be difficult to monitor, detect and prevent.</p>
<p>According to a <a rel="”nofollow” nofollow" href="http://butest.acfe.com/rttn/rttn-2010.pdf" target="_blank" class="broken_link">Report to the Nations on Occupational Fraud and Abuse</a>, in 2009, the average company lost nearly 5% of its revenue to fraud perpetrated by employees, with 85% of fraud committed by individuals with no prior records of abuse.  The problem is most serious within the financial services industry.  Last year’s <a rel="”nofollow” nofollow" href="http://www.acfe.com/rttn/2010-rttn.asp" target="_blank" class="broken_link">Global Fraud Report</a>, published by the Association of Certified Fraud Examiners, states that 80% of all fraud is attributable to those who work in the accounting, operations, sales, customer service and purchasing departments of lender or financial services businesses.  And according to a <a rel="”nofollow” nofollow" href="http://www.celent.com/reports/internal-fraud-big-brother-needs-new-glasses" target="_blank" class="broken_link">report by Celent</a>, insider fraud accounts for approximately 60% of bank fraud cases in which a data breach or theft of funds has occurred, although only 50% of insider fraud is ever reported.</p>
<p>Amongst these insider scams within the financial services industry, rogue trading is alleged to present the most significant challenge, followed by manipulation of <a href="http://www.experian.com/blogs/data-breach/2011/02/07/understanding-the-risks-of-chip-and-pin-credit-card-verification/" target="_blank">credit card transaction processing systems</a>.  The latter type of fraud is illustrated in the <a rel="”nofollow” nofollow" href="http://www.americanbanker.com/btn_issues/22_4/-376029-1.html" target="_blank" class="broken_link">example</a> of a large financial institution that purchased an employee-fraud detection system; within a week, 19 people were caught stealing cash, including one employee who personally pocketed $350k.</p>
<p>With bottom lines so deeply affected by this insidious activity, it’s no wonder that banks understand the importance of fraud detection systems, although there is still a widespread need amongst these institutions for <a rel="”nofollow” nofollow" href="http://www.americanbanker.com/btn_issues/22_4/-376029-1.html" target="_blank" class="broken_link">systems that are effective</a>.</p>
<p>So aside from anti-fraud systems, how can businesses address insider fraud?  Here are a few simple tips:</p>
<ol>
<li><strong>Limit access</strong> by controlling the information available to employees.</li>
<li><strong>Protect your inside</strong> by continually monitoring employees who have access to your most important data (including regular background checks).</li>
<li><strong>Get help</strong> from your own employees, who can be a terrific resource to detect fraud from errant colleagues.</li>
</ol>
<div style="float: right; margin-left: 10px;"><a href="http://twitter.com/share?url=http://www.experian.com/blogs/data-breach/2011/06/21/scam-report-insider-fraud/&via=Experian_DBR&text=Scam report: Insider fraud&related=:&lang=en&count=horizontal" class="twitter-share-button">Tweet</a><script type="text/javascript" src="http://platform.twitter.com/widgets.js"></script></div>]]></content:encoded>
			<wfw:commentRss>http://www.experian.com/blogs/data-breach/2011/06/21/scam-report-insider-fraud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>