Fraud

Will Your Crime Insurance Cover Cyber?

Will Your Crime Insurance Cover Cyber?

Courts are divided over whether crime insurance policies provide coverage for cyber-related fraud.

 
The Risks of Voice Technology

The Risks of Voice Technology

Voice-enabled devices have become increasingly popular, but adopting this technology also means introducing new risks.

 
Identifying an Embezzler

Identifying an Embezzler

Five common characteristics of embezzlers can help companies reduce the risk of employee theft.

 
Insuring Against Social Engineering Attacks

Insuring Against Social Engineering Attacks

Two key legal decisions have helped clarify social engineering coverage conditions.

 
Fighting Bribery and Corruption

Fighting Bribery and Corruption

A plurality of risk and compliance professionals believe the top risk to their anti-bribery and corruption program will come from third parties.

 
W-2 Phishing Scam Targets Tax Season

W-2 Phishing Scam Targets Tax Season

Fraudsters are using business email compromise techniques to steal W-2 information.

 
Using Social Media to Fight Fraud

Using Social Media to Fight Fraud

Insurance companies are finding ways to leverage information from social media to combat fraud.

 
Phishing with Dynamite

Phishing with Dynamite

In 2016, phishing not only continued to grow as a cyberthreat, but was deployed more strategically to maximize profit for cybercriminals.

 
The 2017 Cybersecurity Landscape

The 2017 Cybersecurity Landscape

Experts believe these seven threats may pose the greatest cyberrisks for businesses this year.

 
Technology-Sharing Is Critical in Preventing Fraud

Technology-Sharing Is Critical in Preventing Fraud

The rapid growth of fraud-related activity reinforces the need for aggressive prevention strategies and new technology to prepare for emerging threats.

 
The Enemy Within: How Employee Loyalty—Or Lack Thereof—Creates Risk

The Enemy Within: How Employee Loyalty—Or Lack Thereof—Creates Risk

To mitigate the costly damage that can stem from disaffected or disgruntled workers, employers must examine how to cultivate employee loyalty.

 
Web of Lies

Web of Lies

Don’t trust the internet.

 
Developing an Effective Anti-Fraud Program

Developing an Effective Anti-Fraud Program

Authentication and predictive modeling techniques are necessary to reduce fraud losses.

 
How to Use Analytics to Enhance Security

How to Use Analytics to Enhance Security

Advanced analytics tools can help companies identify complex IT security threats more quickly.

 
The Costs of Low-Tech Hacking

The Costs of Low-Tech Hacking

The rise of ransomware attacks show are evidence that even low-tech hacking can pay dividends.