Fraud

Insuring Against Social Engineering Attacks

Insuring Against Social Engineering Attacks

Two key legal decisions have helped clarify social engineering coverage conditions.

 
Fighting Bribery and Corruption

Fighting Bribery and Corruption

A plurality of risk and compliance professionals believe the top risk to their anti-bribery and corruption program will come from third parties.

 
W-2 Phishing Scam Targets Tax Season

W-2 Phishing Scam Targets Tax Season

Fraudsters are using business email compromise techniques to steal W-2 information.

 
Using Social Media to Fight Fraud

Using Social Media to Fight Fraud

Insurance companies are finding ways to leverage information from social media to combat fraud.

 
Phishing with Dynamite

Phishing with Dynamite

In 2016, phishing not only continued to grow as a cyberthreat, but was deployed more strategically to maximize profit for cybercriminals.

 
The 2017 Cybersecurity Landscape

The 2017 Cybersecurity Landscape

Experts believe these seven threats may pose the greatest cyberrisks for businesses this year.

 
Technology-Sharing Is Critical in Preventing Fraud

Technology-Sharing Is Critical in Preventing Fraud

The rapid growth of fraud-related activity reinforces the need for aggressive prevention strategies and new technology to prepare for emerging threats.

 
The Enemy Within: How Employee Loyalty—Or Lack Thereof—Creates Risk

The Enemy Within: How Employee Loyalty—Or Lack Thereof—Creates Risk

To mitigate the costly damage that can stem from disaffected or disgruntled workers, employers must examine how to cultivate employee loyalty.

 
Web of Lies

Web of Lies

Don’t trust the internet.

 
Developing an Effective Anti-Fraud Program

Developing an Effective Anti-Fraud Program

Authentication and predictive modeling techniques are necessary to reduce fraud losses.

 
How to Use Analytics to Enhance Security

How to Use Analytics to Enhance Security

Advanced analytics tools can help companies identify complex IT security threats more quickly.

 
The Costs of Low-Tech Hacking

The Costs of Low-Tech Hacking

The rise of ransomware attacks show are evidence that even low-tech hacking can pay dividends.

 
Data Deluge: What the Panama Papers Mean for Business

Data Deluge: What the Panama Papers Mean for Business

The widespread corruption and third-party data security vulnerabilities revealed in the Panama Papers scandal demand attention now.

 
Social Engineering Fraud: A Case Study

Social Engineering Fraud: A Case Study

A software company CEO shares a firsthand account of his company’s fight against scammers.

 
Combating C-Suite Fraud

Combating C-Suite Fraud

A persistent minority of executives continues to justify corrupt activity to improve financial performance.