How Vital Is Information Security Controls in Fraud Prevention?


By Illyas Kooliyankal

Fraud Prevention is one of the biggest challenges to the organizations across the world. What are the advanced measures that can be explored to ensure Fraud Prevention in a more effective manner? What role can Information Security play to enhance the Fraud Prevention mechanisms in your organization?

Traditionally, "Information Security" term is associated with Cyber Security and is used interchangeably. Approach from organizations, vendors, and industry experts gave an outlook that Information Security is all about technology related Cyber Security controls only.

Delivering direct business value from information security investment seldom come up as a priority or discussion point. At best, it becomes a theoretical analysis of the strategic alignment of Information Security with business. But still, practical effectiveness or implementation methodologies found lacking.

Nevertheless, like many other areas, Fraud Prevention is one of the critical business challenges that Information Security controls can add value to.

Information Security and Fraud Prevention

Information Security community has failed to demonstrate or communicate effective mechanisms in preventing organizational losses from breaches other than cyber attacks. Finding an Information Security expert with adequate technical background and business acumen is the most significant challenge the industry encounter.

Professionals with governance or audit background come with risk management background. Although exceptions noted, most of the experts come with theoretical knowledge on technology and doesn't understand the real technical challenges. At the same time, the other side of the spectrum is the technical experts who come from an IT background but without an open mind or any exposure to business challenges and expectations.

The right Information Security leader, with technical expertise and business acumen, shall be able to link the Information Security controls with business challenges. This alignment is by ensuring the control adequacy and effectiveness, but wherever possible by linking to business needs and aspirations. Fraud prevention is one of the direct selling points to demonstrate the value of Information Security to a non-technical audience, including the board members.

Information Security risks and investments to protect from cyber attacks is extremely crucial, especially considering the current wave of hacking incidents and data breaches. But, the significance of Information Security is much more than the Cyber Security controls.

If we analyze, a good percentage of frauds has some connection with ineffective Information Security controls. It may be due to weakness in people, process or technology controls, associated with valuable business data.

Example:

If a person or process access or alter the data that he supposed not to, it may lead to fraud. Here the basic principles of Information Security are breached, namely confidentiality, integrity or availability. Key security control areas of access management and data management are extensively crucial for fraud prevention.

Although execution of frauds attributed to many factors, the ever-increasing dependency on information security controls are getting significant importance these days.

As in the past, financial organizations realize this fact more than others. Insider threat management initiatives that get a lot of business buy-in mainly focussed on this aspect. Fraud Management departments are more interested in the data security controls so that the prevention and detection of frauds will be more efficient and effective. Security monitoring use cases for fraud detection is gaining momentum among information security experts.

Fundamental principles or concepts

In addition to various other scenarios, causes of fraud can be the following also:

Data exposure to a potential fraudster (Internal/External - Unauthorized view) - Confidentiality breach/Impact.

Illegitimate alteration of data by the potential fraudster - Integrity breach/Impact.

Unauthorized damage to data or service by the potential fraudster so that the genuine users cannot access it on time - Availability Impact

Fraud From External Sources - Online Channels

Importance of adequate information security controls to combat fraud take a huge jump when online channels become the fastest and most efficient channel of service delivery. Although offline channels also could be the source of fraud and can get impacted, fraud through online channels (including mobile) can be incredibly easier in an anonymous manner and may be potentially destructive.

Cybercriminals target their victims through online channels, as the probability of finding one is more easier compared to physical means. In addition to that, the identity of the fraudster is easy to hide and extremely difficult to find out after a successful fraud. That gives immense motivation to the real-life criminals to use online channels.

Emails, websites and mobile applications are being used to lure potential victims. Considering the increased adoption of mobile devices and Internet, the probability of finding a vulnerable target is quite easy for the fraudsters.

Defrauding the common public and customers of favorite organizations including banking firms is a common trend. Chances of trusting a targeted fraudulent message (in the name of a famous brand) are very high. Various financial frauds are being carried out through fake websites, email, and SMS communication pretending as leading organizations. Some of the messages can fool the smartest of people, by customizing it with an extremely genuine-looking message. Mostly it addresses the victims, by carrying out background checks in advance, using social media details.

Compromising popular email service accounts of the customers or the partner firms could be another source of fraud, by snooping into the communication between a supplier and customer.

At some point of time, the fraudster may create a fake email account that almost looks like the original one, with a minor change in the spelling of the email address, and sends instructions to transfer fund to an account that belongs to criminals. Many organizations fall into this trap, due to lack of sufficient processes and awareness.

More significant frauds use data exfiltration and cyber espionage, where expert criminal gangs use online channels to spread malware and blackmail the victims. These, finally end up in financial and reputational losses in addition to regulatory damages.

Fraud from Internal Sources - Misuse of access and information/service handling

Many types of frauds can be executed by disloyal staff, especially those with privilege access like IT, Finance, and HR Employees. Exposure of sensitive information to unauthorized personnel and extra privileges (more than required) etc., can potentially lead to unpleasant scenarios. In the same manner, unauthorized data transfer privileges can also be detrimental to the organization.

Lack of effective segregation of duties and timely monitoring and detection of activities by the employees (which may include permanent or temporary/outsource) could be a significant weakness in the information security control environment that could lead to substantial frauds.

Many of the recent financial frauds owe to the collusion of employees with internal or external parties. Weakness in access management, data transfer management, segregation of duties, and least privilege based access provisioning are some of the causes of internal frauds (and in many cases external fraud also).

Recommendations - How can Information Security Controls prevent Frauds?

Fraud Prevention

Ensure to align Information Security Program and activities with Fraud Prevention measures in the organization

Carry out a Fraud Risk Assessment in the context of Information Security Threats - From Internal and External perspective

Identify, design and implement critical controls required to protect the organization, staff and its customers from frauds - People, Process and Technology Controls. In some cases, it may be just through improved awareness among the people.

Ensure to have proactive monitoring and detective mechanisms to predict frauds through early warnings.

Formulate "use cases" by collecting intelligence through internal and external sources of information to detect potential fraud for a timely response.

Focus on ensuring effective controls on the protection of information from internal and external threats - Confidentiality, Integrity, and Availability of the data. Authorized parties only should have access and authority to view and change the information and its status, with adequate audit trails.

Develop and practice incident response plan for handling potentially fraudulent activities (due to information security breaches), where fraud management/investigation teams may need to be involved. In some instances, HR department too, if the potential fraud attempt includes the involvement of the staff.

Develop and implement specific controls for all online channels to be resilient to fraudulent activities - Technical and Procedural.

Ensure to perform multiple checks and Maker-Checker based approvals for critical/sensitive actions or transactions with appropriate segregation in duties.

Develop customized security awareness training to educate the staff and customers about the importance of Information Security best practices for Fraud Prevention.

5 Comments

Informations From: Taun17

  1. Very good article. Good information that you have shared in this article and I will share it with other people too. This is how we are taking our article with different topics. 6 Best German Name Generator 2021

    ReplyDelete
  2. You have a knack for making information both interesting and useful.Don’t miss out—explore this site canuckle word game for more expert insights.I’ve been playing Canuckle since discovering it on this site. It’s so entertaining and educational, making it the perfect game for word enthusiasts like me.

    ReplyDelete
  3. I love how you break things down in simple steps.Explore this site wordle Unlimited for further in-depth content and useful insights.What a brilliant game! Wordle keeps me engaged and thinking critically. It’s fun, challenging, and perfect for improving my vocabulary skills.

    ReplyDelete
  4. I appreciate your unique perspective and creative approach to topics. Explore this website color blind test free for additional helpful and engaging information.I enjoyed using this site. It’s very user-friendly, with quick results and detailed explanations. Perfect for anyone wanting to test their color vision.

    ReplyDelete
  5. What a well-organized and insightful post—thank you for sharing.Head over to this site reaction test for further informative content.This test is so engaging! It really pushes you to stay focused and react quickly to stimuli.

    ReplyDelete
Previous Post Next Post
  • Healthy Eating - The Health Benefits Of Nutmeg

    By Beverleigh H Piepers As you go about your menu planning, it is essential to not only look at the particular foods you are eating but how you are preparing those foods as well. Or more specifically, what spices and herbs you are using to help add flavor. Many people forget about combining these ... Readmore

  • Snake Oil Sellers and Health

    By Ian Paul Jones Someone discovered that I'm a fifty something male so every day my inbox fills up with news of miracle cures for low testosterone and erectile dysfunction. I also get emails about the health benefits of lemon juice, baking powder and apple cider vinegar for conditions from arthri... Readmore

  • 7 Top Tips to Build Trust Faster With Prospects

    By Susan Friesen Have you ever dealt with an overhyped salesperson that made you feel like they were a car salesman? I know I have. They make you feel like the biggest thing they care about is not helping you, but about making their sales commission. Our biggest goal as business owners who have an... Readmore

  • What to Do If Your MLM Business Blog Fails

    By David L. Feinstein What would scare you the most? Losing traffic from your blog or losing sales from your passive marketing? Both are scary to say in a general manner. Losing traffic is the worse of the two. No traffic means a very little sales potential. So, lets deal with the lack of traffic ... Readmore

  • Type 2 Diabetes - Study Links Hemoglobin Levels With Diabetic Retinopathy

    By Beverleigh H Piepers In April of 2018, the journal Science Reports published an article on hemoglobin and the likelihood of people with Type 2 diabetes developing diabetic retinopathy. There are about 500,000 molecules of hemoglobin per red blood cell... each hemoglobin molecule, due to its ir... Readmore

  • How Automation Testing Leads to Faster Time to Market

    By Griffin Smith Strong development skills will create great software products. Many organizations will recognize the crucial role automation testing plays in the software engineering life cycle and adopt a strategic method in which to better utilize their testing resources. This will allow them t... Readmore

  • The Advantages Of Adding Yoga To Your Exercise Program

    By Wayne T Jewell The Physical Advantages of Yoga Performing yoga postures regularly offers lots of physical benefits, including: Increased flexibility Increased lubrication of joint parts, ligaments and tendons Massaging your body's internal organs Detoxifying your body Toning the muscles Yoga po... Readmore

  • How Yoga Asanas Induce Better Sleep

    By Hari Om Agrawal One might wonder how is yoga going to be good for sleep, well the answer is quite simple. First thing that you know about yoga is that it focuses on deep breathing and this relaxes the body, calming it down. The combination of subtle body movements and breathing cycle that yoga ... Readmore

  • Three Poems (Kyrielle Sonnet, Villanelle, and Pantoum)

    By Marieta Maglas Kyrielle Sonnet for George Sand and Fr�d�ric Chopin Searching for their love ideal To plant there a dawn so real, God gave them hope to go ahead And palm flowers for their dream bed. In their naked room without windows, Not touched by the innuendos, Music was th... Readmore

  • Review of Harry Potter and The Prisoner of Azkaban

    By Habiba Rahman Chowa "Harry Potter and the Prisoner of Azkaban" is the third book of Harry Potter series of J.K. Rowling. This book contains the magical world of Harry Potter. Once again author Rowling creates a masterpiece. This book has so many turning points which helps to build the next book... Readmore