SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Fraud in Social Media:
Facing the Growing Threat
September 25, 2013
Special Guest Presenters:
Peter Goldmann
FraudResourceNet - White-Collar
Crime 101 LLC –FraudAware

Copyright © 2013 FraudResourceNet™ LLC

About Peter Goldmann, MSc., CFE

 President and Founder of White Collar
Crime 101
Publisher of White-Collar Crime Fighter
Developer of FraudAware® Anti-Fraud
Training Monthly Columnist, The Fraud
Examiner,
ACFE
Newsletter
 Member of Editorial Advisory Board, ACFE
 Author of “Fraud in the Markets”
Explains how fraud fueled the financial crisis.

Copyright © 2013 FraudResourceNet™ LLC
About Jim Kaplan, MSc, CIA, CFE
 President and Founder of
AuditNet®, the global resource
for auditors
 Auditor, Web Site Guru,
Internet for Auditors Pioneer
Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
 Author of “The Auditor’s
Guide to Internet Resources”
2nd Edition
Copyright © 2013 FraudResourceNet™ LLC

Webinar Housekeeping


This webinar and its material are the property of AuditNet® and
FraudAware®. Unauthorized usage or recording of this webinar or any
of its material is strictly forbidden. We are recording the webinar and
you will be provided access to that recording within 5 business days
after the webinar. Downloading or otherwise duplicating the webinar
recording is expressly prohibited.



Please complete the evaluation questionnaire to help us continuously
improve our Webinars.



You must answer the polling questions to qualify for CPE per NASBA.



Submit questions via the chat box on your screen and we will answer
them either during or at the conclusion.



If GTW stops working you may need to close and restart. You can
always dial in and listen and follow along with the handout.
Copyright © 2013 FraudResourceNet™ LLC
Disclaimers






The views expressed by the presenters do not necessarily represent the
views, positions, or opinions of FraudResourceNet LLC (FRN) or the
presenters’ respective organizations. These materials, and the oral
presentation accompanying them, are for educational purposes only and do
not constitute accounting or legal advice or create an accountant-client
relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this
presentation, including any websites maintained by third parties and linked
to the FRN website
Any mention of commercial products is for information only; it does not
imply recommendation or endorsement by FraudResourceNet LLC
Copyright © 2013 FraudResourceNet™ LLC

4

Today’s Agenda







Introduction
Fraud Statistics
Auditors Role – Risk Control and Audit
Social media fraud against individuals
Social media fraud against organizations
How E-fraudsters exploit Facebook and other
social media sites to commit fraud
 How to monitor social media sites for signs of
criminal actions against your Organization
 How to reduce your risk of fraud victimization via
social media
 Your Questions
Copyright © 2013 FraudResourceNet™ LLC
Fraud: The Big Picture







According to major accounting firms, professional
fraud examiners and law enforcement:
Fraud costs the world $3.5 TRILLION per year. (5%)
(ACFE
Average cost for each incident of fraud is $160K
(ACFE)
People who have been victims of ID theft are just as
likely to be lax in securing their personal information
online. Study results from identity theft victims and nonvictims are identical.(Ponemon)
91% of online adults use Social Media regularly
Social Media use has increased 356% in the US since
2006
(Source: 216 Social Media and Internet Statistics (September 2012),
TheSocialSkinny.com)
Copyright © 2013 FraudResourceNet™ LLC

Internal Audit’s Role







Understand how social media is being used within the organization
Review social media policies
Conduct a social media risk assessment
Ensure that controls are in place to address social media risks
Records retention issue
Audit Reports
 Social Media Review by Multnomah County August 2011
 GAO SOCIAL MEDIA - Federal Agencies Need Policies and
Procedures for Managing and Protecting Information They Access
and Disseminate http://www.gao.gov/new.items/d11605.pdf
Social media is now embedded in our personal and business culture
and auditors need to know the what the risks and controls are, how to
audit this new communication tool and also how to adapt it for use
within the audit environment.
Jim Kaplan, AuditNet®
Copyright © 2013 FraudResourceNet™ LLC
Guidance and Publications

Copyright © 2013 FraudResourceNet™ LLC

Social Media Risk Control and
Audit
Here a few examples of more books,
tools and resources for auditors:
• IIA Auditing Social Media
• AuditNet Social Media Risk
Assessment Workbook
• AuditNet® Guide to Social
Networking Security
• Identity Theft Audit Program

Copyright © 2013 FraudResourceNet™ LLC
Social Media Risks
The Biggest Social Media Risk: Not Paying 
Attention to Social Media, according to 
major corporate executives
March 20, 2012

Social Media and Cloud Computing Top Internal Auditors' Technology 
Hot List, According to New Protiviti Research

Social media and cloud computing are top concerns – Internal
audit executives and professionals recognize they must have
superior knowledge and understanding of these areas and their
inherent risks, and how their organizations are leveraging as well
as controlling them, in order to perform their jobs at a high level
and add value to the organizations they serve.
Protiviti 2012 Internal Audit Capabilities and Needs Survey

Copyright © 2013 FraudResourceNet™ LLC

Social Media Risks
As the use of social media continues to grow,
so too does the risk of fraud involving social
media
Social Media and its associated risk – Grant Thornton and FERF

Prioritized concerns from a survey
conducted by Grant Thornton and FERF
1. Disclosure of proprietary information
2. Negative comments about the company
3. Exposure of personally identifiable
information
4. Fraud
5. Out of date information

Copyright © 2013 FraudResourceNet™ LLC
Social Media Risks

 Risks
 Employees or non-employees creating a social
media page representing your company without
management/IT consent or approval
 Trade secrets or other business secrets being
inadvertently or even deliberately shared
 Dissatisfied customers or disgruntled employees
voicing their opinions freely
 Viruses, spyware and network vulnerabilities
occurring due to the interactivity and open nature of
social media architecture
Copyright © 2013 FraudResourceNet™ LLC

Social Media Controls

 Controls
 The extent to which social media will be officially
sanctioned by the organization
 Who is allowed to use the social media sites
 How users gain approval to use the social media
sites
 Standards/policy of social media use inside and
outside of the workplace
 Brand monitoring and legal involvement
 How to report false pages

Copyright © 2013 FraudResourceNet™ LLC
Social Media Audit Objectives
and Scope
 Objective—The objective of a social media audit/assurance
review is to provide management with an independent
assessment relating to the effectiveness of controls over
the enterprise’s social media policies and processes.
 Scope—The review will focus on governance, policies,
procedures, training and awareness functions related to
social media. Specifically, it will address:
 Strategy and governance—policies and frameworks
 People—training and awareness
 Processes
 Technology
 Selection of the social media projects and initiatives will be
based on risks introduced to the enterprise by these
systems.
Copyright © 2013 FraudResourceNet™ LLC

Social Media Audit Program
Sample Steps
 Social Media Audit Program — Should be a
comprehensively written program to detect, implement,
and monitor compliance with the laws and regulations
that impact the various components of social media. It
should provide written procedures to ensure compliance.
 Identification of inappropriateness with social media
channels and non-compliance with the Social Media
Policy — The company should clearly identify what is
acceptable and what is not acceptable, based on a risk
assessment and the outlined rules and specifications of
the Social Media Audit Program.
Continued…
Copyright © 2013 FraudResourceNet™ LLC
Social Media Audit Program
Sample Steps
 Prior examination/audit findings — If weaknesses were
previously cited in the company’s social media
examination or audit that may impact the company’s
social media program, has management taken
appropriate steps to institute corrective actions?
 Training program(s) — Training should be tailored to
address all employees. Incident response — A formal
review should be made of all alleged and/or actual
incidents and how the company handled the incident.
 Internal audit and annual reports — Management
should regularly report on its responsiveness to cited
weaknesses in the social media program.
Copyright © 2013 FraudResourceNet™ LLC

Social Media: The Fraud
Threat
 Social Media - based on Web 2.0 and fosters
the notion that people who consume media,
access the Internet, and use the Web no longer
passively absorb the flow of content from provider
to viewer; rather, they are active contributors,
helping customize media and technology for their
own purposes.

One of social media’s greatest threats comes
from employees who put work-related information
onto social media sites—intentionally or
unintentionally
 It’s all about ID theft, ID fraud, social
engineering, espionage, cyber-crime and
financial fraud against INDIVIDUALS and
ORGANIZATIONS
Copyright © 2013 FraudResourceNet™ LLC
Fraud Against Individuals
 Wife of Sir John Sawers, Head of MI6, UK equivalent of
CIA posted sensitive information to her Facebook page,
including address of the couple’s London apartment and
locations of their children and Sir John’s parents.
Problem: Potential national security & blackmail risk.
“John Doe” received a message from a Facebook friend
which had a link to a funny video. He clicked on it. The link
did not bring up a video. The friend’s profile had been
hacked, and now malicious software was being
downloaded onto John’s computer as a result of him
clicking on the link. This software was designed to open a
way for an identity thief to take personal information from
John’s system. It also sent a similar E-mail to everybody
he was connected with on his profile, asking them to “view
the video”.
Copyright © 2013 FraudResourceNet™ LLC

Financial Identity Theft
Against Individuals
 ID theft against individuals. Fraudsters use Facebook
to EASILY crack your password. Most online accounts
use “qualifying questions” or Knowledge Based
Authentication questions and answers to verify your
identity if you “forget” your password. These questions
usually involve personal information, such as your
kids’, other relatives’, or pets’ names or birthdays.
 When fraudsters find this information on your Facebook
page, they can reset your passwords and steal your
identity.
Key message: Limit what you post, and lock down your
privacy settings.
Copyright © 2013 FraudResourceNet™ LLC
ID Theft Weapon: Social
Engineering
 Social engineering: Techniques used to
manipulate people into performing actions
or divulging confidential information. Uses
various forms of psychological trickery via
numerous channels—now increasingly
with social media -- to get victim to
provide sensitive information or computer
system access…

Copyright © 2013 FraudResourceNet™ LLC

ID Theft Weapon: Pretexting
Pretexting: Using personal information acquired under
false pretenses to commit fraud.
How it’s done: Creating and using an invented
scenario (the pretext) to persuade a social media target
to release information or perform an action … usually
done over the telephone. More than a lie -- as it most
often involves some prior research or set-up and the
use of pieces of known information from a social media
site (DOB, Social Security Number, last bill amount, etc)
to establish legitimacy in mind of the target…

Copyright © 2013 FraudResourceNet™ LLC
ID Theft Weapon: Pretexting








Pretexter/fraudsters may pose as employee from
victim’s:
Bank
Utility
Merchant /Organization
Employer (co-worker)
Government agency
Landlord
Key objective: Pretexters sell your information to
people who use it to get credit in your name, steal
your assets, or to investigate or blackmail or sue you.
Copyright © 2013 FraudResourceNet™ LLC

Polling Question 1
Social media fraud is ________________ risky for
individuals than it is organizations
A. Less
B. More
C. Equally

Copyright © 2013 FraudResourceNet™ LLC
Social Media Phishing &
Hijacking

Copyright © 2013 FraudResourceNet™ LLC

More Social Media Phishing
& Hijacking
 Account hijacking. Phishers imitate the Facebook Email template, tricking victims into believing they have
received a legitimate Facebook message or notification.
Once you enter your username and password into the
fake Facebook web site, criminals can take over your
account, pose as you, post unwanted ads, ask your
friends for money, information, etc.
Self defense: Always log into your Facebook account
manually, rather than going through a link in an E-mail.

Copyright © 2013 FraudResourceNet™ LLC
Social Media Identity Fraud
 Brand-Jacking
IKEA: Scams. Set up a phony
Facebook page and market it to a few
people, who then send it to their
friends, who send it to their friends to
become FB “fans” in exchange for a
$1,000 gift card that never came.
40,000 victims sent their personal
information – became potential ID
theft/fraud victims.
As they say: If it sounds too good to
be true, it probably is.

Copyright © 2013 FraudResourceNet™ LLC

Fraud Against Organizations: It’s
All About Trust
Survey of 500 managers and employees with access to
sensitive customer information found the following:
66% said co-workers, not hackers, pose greatest risk to
consumer privacy; only 10% said hackers are greatest
threat.
62% reported incidents at work that put customer data at
risk for identity theft.
46% said it would be “easy,” “very easy” or “extremely
easy” for employees to steal sensitive data from corporate
database.
SOCIAL MEDIA SITES ARE BEING USED
INCREASINGLY TO COMMIT THESE CRIMES
Copyright © 2013 FraudResourceNet™ LLC
Polling Question 2
Pretexting is (Choose the best answer)
a) Gaining unauthorized access to secure computer
networks
b) Acquiring personal information under false pretenses
c) Impersonating you to gain financial benefit illegally
d) Stealing sensitive data from secured networks
e) All of the above

Copyright © 2013 FraudResourceNet™ LLC

How To Hack A Company With
Facebook-1
 Pose as an employee, setting up a Facebook group,
and inviting or “friending” other employees to join.
Membership will grow exponentially each day.
 Gather intelligence from “co-workers” about the
organization.
 Monitor all social networking sites for employees of
target company --MySpace, LinkedIn, Plaxo, and
Facebook.com
 Find those who openly discuss what they do for a
living
 Key: By creating a group, you have access to profiles
or fellow employees who have no reason to distrust
you. Gathering sensitive information is easy.
Source: Steve Stasiukonis of Secure
Network Technologies
Copyright © 2013 FraudResourceNet™ LLC
How To Hack A Company With
Facebook-2
 Use the identity of a Facebook-friended employee to
gain access to a company building:
 Create a fake identity of the employee who is not known
to the office to be breached, but still in the company’s
system
 With a little creativity, a fake business card, fake company
ID card from info gathered from our Facebook group, the
fraudster was “in”. Given an office and full access.
 Once inside, can plug into the company network, create
a wireless hub to access from the outside and/or plant
keyloggers or other malware onto office PCs.
Source: Steve Stasiukonis of
Secure Network Technologies
Copyright © 2013 FraudResourceNet™ LLC

Social Media and Corporate
Espionage
“The gadgets and gizmos of the spy movies have not
gone away. But today's corporate spies are more likely
to trawl through Facebook pages and Twitter feeds for
snippets of information they can build into valuable
intelligence on a target organization.”
‘’The Wall Street Journal”, Oct. 18, 2011
Example:
 Social engineering/espionage: Through social networks it was
learned that a financial executive was a divorcee. Perpetrators
created dummy female profile on Facebook, “friended” him and
cultivated an online relationship that ended in him sharing
confidential information about the company with "her".

Copyright © 2013 FraudResourceNet™ LLC
Why Impersonate?











Steal clients or potential clients by posing as vendor and claiming to be
going out oan business
Conduct phishing attacks
Intentionally pose as someone (usually senior manager) of your
organization, to bad-mouth competition. Create risk of your employer
becoming target of litigation
Use your identity to harass someone you know.
They may pose as a government entity to steal data and commit new
account fraud.
Pose as rival C-level executive on Facebook, LinkedIn, or Twitter, to
gather marketing intelligence. Once they are “linked” or “friended,” they
have access to those individuals’ contacts and inner circle.
Disgruntled employees use social media to create pseudonyms to vent
frustration about their boss or company. Can result in PR nightmare.
Create blog or link to a tongue-in-cheek Web site that might be funny,
but will not be funny to Copyright © 2013 FraudResourceNet™ LLC
you.

How to Prevent Impersonation
 Set up accounts with your full name and those of your
company, officers, spouse and kids on the most
trafficked social media sites, blogs, domains or Web
based E-mail accounts. If your name is already taken,
include your middle initial, a period or a hyphen. Decide
whether or not to plug in your picture and basic bio, but
leave out your age or birthday.
 Set up a free Google Alerts for your name/company to
get an E-mail every time your name pops up online.

Copyright © 2013 FraudResourceNet™ LLC
How to Prevent Impersonation
Broaden your company’s online reputation. Blogging is best.
Objective: Try to get Google to bring your
given/company/officers names to top of search in best
possible light. This is a combination of online reputation
management and search engine optimization (SEO) for your
brand.
If you identify someone using your photo or bio in the social
media, be very persistent in contacting the site’s
administrators. THIS IS FRAUD! They too have reputations to
manage and if they see someone using your photo or
likeness they will often delete stolen profiles.
Enlist services such as Mark Monitor or other brand
protection and trademark management firms.
Copyright © 2013 FraudResourceNet™ LLC

Polling Question #3

To hack into a company using Facebook, you need the
usernames and passwords of its secure networks…

a) True
b) False

Copyright © 2013 FraudResourceNet™ LLC
Manage Employee Use: Banning


Consider NOT outright banning employee use of Social Media at
work. This often creates resentment and incentive to find ways
around the rules (via use of unprohibited sites, etc)
 Example: Marines recently banned soldiers from using social
media sites such as MySpace, Facebook and Twitter.
 Reasons:
1) Fear that these sites’ lack of security may allow malware to
infiltrate government computers.
2) Concern about leaked military data.
 Problem: Soldiers used online dating sites that weren’t prohibited.
Hackers exposed personal information on military subscribers of an
online dating site. Forced DOD to command military personnel not
to use their military information on commercial social media
sites.
Lesson: Smart usage policy works better than prohibition
Copyright © 2013 FraudResourceNet™ LLC

Manage Employee Use: Policies
Essential: Policy that regulates employee access and guidelines
for appropriate behavior.
Audit and IT often best positioned to develop –and monitor– policy.
 Teach effective use: Provide training on proper use and
especially what not do to.
 Encourage URL decoding: Before clicking on shortened URLs,
find out where they lead by pasting them into a URL lengthening
service like TinyURL Decoder or Untiny.
 Limit social network use: There are hundreds of social
networks serving numerous uses from music to movies, from
friending to “hooking up”. Some are appropriate and others even
less secure. Screen and enforce “off-limit” rules. Include in
company policy (including privacy).

Review Social Media Guidelines from other companies
Copyright © 2013 FraudResourceNet™ LLC
Manage Employee Use: Policies
 Train IT personnel: Effective policies begin from the top
down. IT must be up to speed. May need to coordinate with
Internal Audit to monitor social media use.
Critical: Managers and employees never to post workrelated information without authorization, or posting work-related
information on personal pages
 Maintain updated security: Whether hardware or software,
A-V or critical security patches, make sure you are up-todate.
 Lock down settings: Most social networks have privacy
settings that need to be administered to the highest level.
Default settings are often invitations to hackers
Copyright © 2013 FraudResourceNet™ LLC

Social Media As An Investigative
Tool
 Fraud investigators increasingly use social networks to
gather pubic evidence of misconduct. (see below).
 Illinois and Maryland prohibit employers from requiring
employees to provide social media account passwords.
But loopholes may still enable employer access to
employee accounts.
Caution: Conduct social media investigation only
after consulting qualified attorney. Some laws also
forbid “friending” if you are doing it for investigative
purposes. Law is in flux and can be tricky.
Example: Courts have ruled that lawyers or
investigators working for them cannot “friend” a
suspect already represented by counsel.
Copyright © 2013 FraudResourceNet™ LLC
Polling Question #4
Which of the following are potentially serious social
media-related threats to most organizations?
a) Spreading false information about a product
b) Gaining unauthorized access to an executive’s inner
circle
c) Posing as your company for phishing attacks to steal
money
d) All of the above

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 3
Outright banning of social media sites by employees is
the most effective way to minimize the many SM risks
threatening your organization
s
A. True
B. False

Copyright © 2013 FraudResourceNet™ LLC
Questions?
 Any Questions?
Don’t be Shy!

Copyright © 2013 FraudResourceNet™ LLC

Coming Up Next Month

 1. An Expert’s Advice on
Establishing an Organization Wide
Fraud Policy October 8
 Using Data Analytics to Detect and
Deter Procure-to-Pay Fraud
October 30

Copyright © 2013 FraudResourceNet™ LLC
Thank You!
Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com

Copyright © 2013 FraudResourceNet™ LLC

Contenu connexe

Tendances

Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudFraudBusters
 
Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand...
Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand...Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand...
Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand...EMC
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad BotsDistil Networks
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessYork Risk
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wrightPaul Wright MSc
 
CUANY 2010 | Social Media 101 for Credit Unions
CUANY 2010 | Social Media 101 for Credit UnionsCUANY 2010 | Social Media 101 for Credit Unions
CUANY 2010 | Social Media 101 for Credit UnionsRhea Drysdale
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Smarsh
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersDavid Green
 

Tendances (20)

Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand...
Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand...Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand...
Ponemon Institute: The 2013 eCommerce Cyber Crime Report - Safeguarding Brand...
 
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
2016 Bad Bot Report: Quantifying the Risk and Economic Impact of Bad Bots
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wright
 
Top online frauds 2010
Top online frauds 2010Top online frauds 2010
Top online frauds 2010
 
CUANY 2010 | Social Media 101 for Credit Unions
CUANY 2010 | Social Media 101 for Credit UnionsCUANY 2010 | Social Media 101 for Credit Unions
CUANY 2010 | Social Media 101 for Credit Unions
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Crystal Semantics
Crystal SemanticsCrystal Semantics
Crystal Semantics
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 

En vedette

Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudFraudBusters
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisFraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 

En vedette (16)

Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Excel shortcut tips (accounting and auditing)
Excel shortcut tips (accounting and auditing)Excel shortcut tips (accounting and auditing)
Excel shortcut tips (accounting and auditing)
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
ACCOUNTING & AUDITING WITH EXCEL2011
ACCOUNTING & AUDITING WITH EXCEL2011ACCOUNTING & AUDITING WITH EXCEL2011
ACCOUNTING & AUDITING WITH EXCEL2011
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 

Similaire à Fraud in Social Media: Facing the Growing Threat

Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyFraudBusters
 
Cch social media risk audit control october 29, 2013
Cch social media risk audit control october 29, 2013Cch social media risk audit control october 29, 2013
Cch social media risk audit control october 29, 2013Jim Kaplan CIA CFE
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)CR Group
 
Social Media
Social MediaSocial Media
Social MediaJ.L+C.L
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12Louise Spiteri
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
Anti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud CultureAnti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud CultureFraudBusters
 
Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementNexgate
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Craig Taggart MBA
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...Craig Taggart
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013Amarach Research
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarDon Grauel
 
The Foundations of Social Media Risk Management
The Foundations of Social Media Risk ManagementThe Foundations of Social Media Risk Management
The Foundations of Social Media Risk Management3Sixty Insights
 

Similaire à Fraud in Social Media: Facing the Growing Threat (20)

Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
Cch social media risk audit control october 29, 2013
Cch social media risk audit control october 29, 2013Cch social media risk audit control october 29, 2013
Cch social media risk audit control october 29, 2013
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
 
Social Media
Social MediaSocial Media
Social Media
 
Anti-Malvertising Guidelines
Anti-Malvertising GuidelinesAnti-Malvertising Guidelines
Anti-Malvertising Guidelines
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
Anti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud CultureAnti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk Management
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler Seminar
 
The Foundations of Social Media Risk Management
The Foundations of Social Media Risk ManagementThe Foundations of Social Media Risk Management
The Foundations of Social Media Risk Management
 

Plus de FraudBusters

Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisFraudBusters
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisFraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial IntegrityFraudBusters
 

Plus de FraudBusters (11)

Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 

Dernier

Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfGale Pooley
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxanshikagoel52
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja Nehwal
 

Dernier (20)

Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service NashikHigh Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
High Class Call Girls Nashik Maya 7001305949 Independent Escort Service Nashik
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
Dividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptxDividend Policy and Dividend Decision Theories.pptx
Dividend Policy and Dividend Decision Theories.pptx
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home DeliveryPooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
Pooja 9892124323 : Call Girl in Juhu Escorts Service Free Home Delivery
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 

Fraud in Social Media: Facing the Growing Threat

  • 1. Fraud in Social Media: Facing the Growing Threat September 25, 2013 Special Guest Presenters: Peter Goldmann FraudResourceNet - White-Collar Crime 101 LLC –FraudAware Copyright © 2013 FraudResourceNet™ LLC About Peter Goldmann, MSc., CFE  President and Founder of White Collar Crime 101 Publisher of White-Collar Crime Fighter Developer of FraudAware® Anti-Fraud Training Monthly Columnist, The Fraud Examiner, ACFE Newsletter  Member of Editorial Advisory Board, ACFE  Author of “Fraud in the Markets” Explains how fraud fueled the financial crisis. Copyright © 2013 FraudResourceNet™ LLC
  • 2. About Jim Kaplan, MSc, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors  Auditor, Web Site Guru, Internet for Auditors Pioneer Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Copyright © 2013 FraudResourceNet™ LLC Webinar Housekeeping  This webinar and its material are the property of AuditNet® and FraudAware®. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We are recording the webinar and you will be provided access to that recording within 5 business days after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited.  Please complete the evaluation questionnaire to help us continuously improve our Webinars.  You must answer the polling questions to qualify for CPE per NASBA.  Submit questions via the chat box on your screen and we will answer them either during or at the conclusion.  If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet™ LLC
  • 3. Disclaimers    The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC Copyright © 2013 FraudResourceNet™ LLC 4 Today’s Agenda       Introduction Fraud Statistics Auditors Role – Risk Control and Audit Social media fraud against individuals Social media fraud against organizations How E-fraudsters exploit Facebook and other social media sites to commit fraud  How to monitor social media sites for signs of criminal actions against your Organization  How to reduce your risk of fraud victimization via social media  Your Questions Copyright © 2013 FraudResourceNet™ LLC
  • 4. Fraud: The Big Picture      According to major accounting firms, professional fraud examiners and law enforcement: Fraud costs the world $3.5 TRILLION per year. (5%) (ACFE Average cost for each incident of fraud is $160K (ACFE) People who have been victims of ID theft are just as likely to be lax in securing their personal information online. Study results from identity theft victims and nonvictims are identical.(Ponemon) 91% of online adults use Social Media regularly Social Media use has increased 356% in the US since 2006 (Source: 216 Social Media and Internet Statistics (September 2012), TheSocialSkinny.com) Copyright © 2013 FraudResourceNet™ LLC Internal Audit’s Role       Understand how social media is being used within the organization Review social media policies Conduct a social media risk assessment Ensure that controls are in place to address social media risks Records retention issue Audit Reports  Social Media Review by Multnomah County August 2011  GAO SOCIAL MEDIA - Federal Agencies Need Policies and Procedures for Managing and Protecting Information They Access and Disseminate http://www.gao.gov/new.items/d11605.pdf Social media is now embedded in our personal and business culture and auditors need to know the what the risks and controls are, how to audit this new communication tool and also how to adapt it for use within the audit environment. Jim Kaplan, AuditNet® Copyright © 2013 FraudResourceNet™ LLC
  • 5. Guidance and Publications Copyright © 2013 FraudResourceNet™ LLC Social Media Risk Control and Audit Here a few examples of more books, tools and resources for auditors: • IIA Auditing Social Media • AuditNet Social Media Risk Assessment Workbook • AuditNet® Guide to Social Networking Security • Identity Theft Audit Program Copyright © 2013 FraudResourceNet™ LLC
  • 6. Social Media Risks The Biggest Social Media Risk: Not Paying  Attention to Social Media, according to  major corporate executives March 20, 2012 Social Media and Cloud Computing Top Internal Auditors' Technology  Hot List, According to New Protiviti Research Social media and cloud computing are top concerns – Internal audit executives and professionals recognize they must have superior knowledge and understanding of these areas and their inherent risks, and how their organizations are leveraging as well as controlling them, in order to perform their jobs at a high level and add value to the organizations they serve. Protiviti 2012 Internal Audit Capabilities and Needs Survey Copyright © 2013 FraudResourceNet™ LLC Social Media Risks As the use of social media continues to grow, so too does the risk of fraud involving social media Social Media and its associated risk – Grant Thornton and FERF Prioritized concerns from a survey conducted by Grant Thornton and FERF 1. Disclosure of proprietary information 2. Negative comments about the company 3. Exposure of personally identifiable information 4. Fraud 5. Out of date information Copyright © 2013 FraudResourceNet™ LLC
  • 7. Social Media Risks  Risks  Employees or non-employees creating a social media page representing your company without management/IT consent or approval  Trade secrets or other business secrets being inadvertently or even deliberately shared  Dissatisfied customers or disgruntled employees voicing their opinions freely  Viruses, spyware and network vulnerabilities occurring due to the interactivity and open nature of social media architecture Copyright © 2013 FraudResourceNet™ LLC Social Media Controls  Controls  The extent to which social media will be officially sanctioned by the organization  Who is allowed to use the social media sites  How users gain approval to use the social media sites  Standards/policy of social media use inside and outside of the workplace  Brand monitoring and legal involvement  How to report false pages Copyright © 2013 FraudResourceNet™ LLC
  • 8. Social Media Audit Objectives and Scope  Objective—The objective of a social media audit/assurance review is to provide management with an independent assessment relating to the effectiveness of controls over the enterprise’s social media policies and processes.  Scope—The review will focus on governance, policies, procedures, training and awareness functions related to social media. Specifically, it will address:  Strategy and governance—policies and frameworks  People—training and awareness  Processes  Technology  Selection of the social media projects and initiatives will be based on risks introduced to the enterprise by these systems. Copyright © 2013 FraudResourceNet™ LLC Social Media Audit Program Sample Steps  Social Media Audit Program — Should be a comprehensively written program to detect, implement, and monitor compliance with the laws and regulations that impact the various components of social media. It should provide written procedures to ensure compliance.  Identification of inappropriateness with social media channels and non-compliance with the Social Media Policy — The company should clearly identify what is acceptable and what is not acceptable, based on a risk assessment and the outlined rules and specifications of the Social Media Audit Program. Continued… Copyright © 2013 FraudResourceNet™ LLC
  • 9. Social Media Audit Program Sample Steps  Prior examination/audit findings — If weaknesses were previously cited in the company’s social media examination or audit that may impact the company’s social media program, has management taken appropriate steps to institute corrective actions?  Training program(s) — Training should be tailored to address all employees. Incident response — A formal review should be made of all alleged and/or actual incidents and how the company handled the incident.  Internal audit and annual reports — Management should regularly report on its responsiveness to cited weaknesses in the social media program. Copyright © 2013 FraudResourceNet™ LLC Social Media: The Fraud Threat  Social Media - based on Web 2.0 and fosters the notion that people who consume media, access the Internet, and use the Web no longer passively absorb the flow of content from provider to viewer; rather, they are active contributors, helping customize media and technology for their own purposes. One of social media’s greatest threats comes from employees who put work-related information onto social media sites—intentionally or unintentionally  It’s all about ID theft, ID fraud, social engineering, espionage, cyber-crime and financial fraud against INDIVIDUALS and ORGANIZATIONS Copyright © 2013 FraudResourceNet™ LLC
  • 10. Fraud Against Individuals  Wife of Sir John Sawers, Head of MI6, UK equivalent of CIA posted sensitive information to her Facebook page, including address of the couple’s London apartment and locations of their children and Sir John’s parents. Problem: Potential national security & blackmail risk. “John Doe” received a message from a Facebook friend which had a link to a funny video. He clicked on it. The link did not bring up a video. The friend’s profile had been hacked, and now malicious software was being downloaded onto John’s computer as a result of him clicking on the link. This software was designed to open a way for an identity thief to take personal information from John’s system. It also sent a similar E-mail to everybody he was connected with on his profile, asking them to “view the video”. Copyright © 2013 FraudResourceNet™ LLC Financial Identity Theft Against Individuals  ID theft against individuals. Fraudsters use Facebook to EASILY crack your password. Most online accounts use “qualifying questions” or Knowledge Based Authentication questions and answers to verify your identity if you “forget” your password. These questions usually involve personal information, such as your kids’, other relatives’, or pets’ names or birthdays.  When fraudsters find this information on your Facebook page, they can reset your passwords and steal your identity. Key message: Limit what you post, and lock down your privacy settings. Copyright © 2013 FraudResourceNet™ LLC
  • 11. ID Theft Weapon: Social Engineering  Social engineering: Techniques used to manipulate people into performing actions or divulging confidential information. Uses various forms of psychological trickery via numerous channels—now increasingly with social media -- to get victim to provide sensitive information or computer system access… Copyright © 2013 FraudResourceNet™ LLC ID Theft Weapon: Pretexting Pretexting: Using personal information acquired under false pretenses to commit fraud. How it’s done: Creating and using an invented scenario (the pretext) to persuade a social media target to release information or perform an action … usually done over the telephone. More than a lie -- as it most often involves some prior research or set-up and the use of pieces of known information from a social media site (DOB, Social Security Number, last bill amount, etc) to establish legitimacy in mind of the target… Copyright © 2013 FraudResourceNet™ LLC
  • 12. ID Theft Weapon: Pretexting       Pretexter/fraudsters may pose as employee from victim’s: Bank Utility Merchant /Organization Employer (co-worker) Government agency Landlord Key objective: Pretexters sell your information to people who use it to get credit in your name, steal your assets, or to investigate or blackmail or sue you. Copyright © 2013 FraudResourceNet™ LLC Polling Question 1 Social media fraud is ________________ risky for individuals than it is organizations A. Less B. More C. Equally Copyright © 2013 FraudResourceNet™ LLC
  • 13. Social Media Phishing & Hijacking Copyright © 2013 FraudResourceNet™ LLC More Social Media Phishing & Hijacking  Account hijacking. Phishers imitate the Facebook Email template, tricking victims into believing they have received a legitimate Facebook message or notification. Once you enter your username and password into the fake Facebook web site, criminals can take over your account, pose as you, post unwanted ads, ask your friends for money, information, etc. Self defense: Always log into your Facebook account manually, rather than going through a link in an E-mail. Copyright © 2013 FraudResourceNet™ LLC
  • 14. Social Media Identity Fraud  Brand-Jacking IKEA: Scams. Set up a phony Facebook page and market it to a few people, who then send it to their friends, who send it to their friends to become FB “fans” in exchange for a $1,000 gift card that never came. 40,000 victims sent their personal information – became potential ID theft/fraud victims. As they say: If it sounds too good to be true, it probably is. Copyright © 2013 FraudResourceNet™ LLC Fraud Against Organizations: It’s All About Trust Survey of 500 managers and employees with access to sensitive customer information found the following: 66% said co-workers, not hackers, pose greatest risk to consumer privacy; only 10% said hackers are greatest threat. 62% reported incidents at work that put customer data at risk for identity theft. 46% said it would be “easy,” “very easy” or “extremely easy” for employees to steal sensitive data from corporate database. SOCIAL MEDIA SITES ARE BEING USED INCREASINGLY TO COMMIT THESE CRIMES Copyright © 2013 FraudResourceNet™ LLC
  • 15. Polling Question 2 Pretexting is (Choose the best answer) a) Gaining unauthorized access to secure computer networks b) Acquiring personal information under false pretenses c) Impersonating you to gain financial benefit illegally d) Stealing sensitive data from secured networks e) All of the above Copyright © 2013 FraudResourceNet™ LLC How To Hack A Company With Facebook-1  Pose as an employee, setting up a Facebook group, and inviting or “friending” other employees to join. Membership will grow exponentially each day.  Gather intelligence from “co-workers” about the organization.  Monitor all social networking sites for employees of target company --MySpace, LinkedIn, Plaxo, and Facebook.com  Find those who openly discuss what they do for a living  Key: By creating a group, you have access to profiles or fellow employees who have no reason to distrust you. Gathering sensitive information is easy. Source: Steve Stasiukonis of Secure Network Technologies Copyright © 2013 FraudResourceNet™ LLC
  • 16. How To Hack A Company With Facebook-2  Use the identity of a Facebook-friended employee to gain access to a company building:  Create a fake identity of the employee who is not known to the office to be breached, but still in the company’s system  With a little creativity, a fake business card, fake company ID card from info gathered from our Facebook group, the fraudster was “in”. Given an office and full access.  Once inside, can plug into the company network, create a wireless hub to access from the outside and/or plant keyloggers or other malware onto office PCs. Source: Steve Stasiukonis of Secure Network Technologies Copyright © 2013 FraudResourceNet™ LLC Social Media and Corporate Espionage “The gadgets and gizmos of the spy movies have not gone away. But today's corporate spies are more likely to trawl through Facebook pages and Twitter feeds for snippets of information they can build into valuable intelligence on a target organization.” ‘’The Wall Street Journal”, Oct. 18, 2011 Example:  Social engineering/espionage: Through social networks it was learned that a financial executive was a divorcee. Perpetrators created dummy female profile on Facebook, “friended” him and cultivated an online relationship that ended in him sharing confidential information about the company with "her". Copyright © 2013 FraudResourceNet™ LLC
  • 17. Why Impersonate?         Steal clients or potential clients by posing as vendor and claiming to be going out oan business Conduct phishing attacks Intentionally pose as someone (usually senior manager) of your organization, to bad-mouth competition. Create risk of your employer becoming target of litigation Use your identity to harass someone you know. They may pose as a government entity to steal data and commit new account fraud. Pose as rival C-level executive on Facebook, LinkedIn, or Twitter, to gather marketing intelligence. Once they are “linked” or “friended,” they have access to those individuals’ contacts and inner circle. Disgruntled employees use social media to create pseudonyms to vent frustration about their boss or company. Can result in PR nightmare. Create blog or link to a tongue-in-cheek Web site that might be funny, but will not be funny to Copyright © 2013 FraudResourceNet™ LLC you. How to Prevent Impersonation  Set up accounts with your full name and those of your company, officers, spouse and kids on the most trafficked social media sites, blogs, domains or Web based E-mail accounts. If your name is already taken, include your middle initial, a period or a hyphen. Decide whether or not to plug in your picture and basic bio, but leave out your age or birthday.  Set up a free Google Alerts for your name/company to get an E-mail every time your name pops up online. Copyright © 2013 FraudResourceNet™ LLC
  • 18. How to Prevent Impersonation Broaden your company’s online reputation. Blogging is best. Objective: Try to get Google to bring your given/company/officers names to top of search in best possible light. This is a combination of online reputation management and search engine optimization (SEO) for your brand. If you identify someone using your photo or bio in the social media, be very persistent in contacting the site’s administrators. THIS IS FRAUD! They too have reputations to manage and if they see someone using your photo or likeness they will often delete stolen profiles. Enlist services such as Mark Monitor or other brand protection and trademark management firms. Copyright © 2013 FraudResourceNet™ LLC Polling Question #3 To hack into a company using Facebook, you need the usernames and passwords of its secure networks… a) True b) False Copyright © 2013 FraudResourceNet™ LLC
  • 19. Manage Employee Use: Banning  Consider NOT outright banning employee use of Social Media at work. This often creates resentment and incentive to find ways around the rules (via use of unprohibited sites, etc)  Example: Marines recently banned soldiers from using social media sites such as MySpace, Facebook and Twitter.  Reasons: 1) Fear that these sites’ lack of security may allow malware to infiltrate government computers. 2) Concern about leaked military data.  Problem: Soldiers used online dating sites that weren’t prohibited. Hackers exposed personal information on military subscribers of an online dating site. Forced DOD to command military personnel not to use their military information on commercial social media sites. Lesson: Smart usage policy works better than prohibition Copyright © 2013 FraudResourceNet™ LLC Manage Employee Use: Policies Essential: Policy that regulates employee access and guidelines for appropriate behavior. Audit and IT often best positioned to develop –and monitor– policy.  Teach effective use: Provide training on proper use and especially what not do to.  Encourage URL decoding: Before clicking on shortened URLs, find out where they lead by pasting them into a URL lengthening service like TinyURL Decoder or Untiny.  Limit social network use: There are hundreds of social networks serving numerous uses from music to movies, from friending to “hooking up”. Some are appropriate and others even less secure. Screen and enforce “off-limit” rules. Include in company policy (including privacy). Review Social Media Guidelines from other companies Copyright © 2013 FraudResourceNet™ LLC
  • 20. Manage Employee Use: Policies  Train IT personnel: Effective policies begin from the top down. IT must be up to speed. May need to coordinate with Internal Audit to monitor social media use. Critical: Managers and employees never to post workrelated information without authorization, or posting work-related information on personal pages  Maintain updated security: Whether hardware or software, A-V or critical security patches, make sure you are up-todate.  Lock down settings: Most social networks have privacy settings that need to be administered to the highest level. Default settings are often invitations to hackers Copyright © 2013 FraudResourceNet™ LLC Social Media As An Investigative Tool  Fraud investigators increasingly use social networks to gather pubic evidence of misconduct. (see below).  Illinois and Maryland prohibit employers from requiring employees to provide social media account passwords. But loopholes may still enable employer access to employee accounts. Caution: Conduct social media investigation only after consulting qualified attorney. Some laws also forbid “friending” if you are doing it for investigative purposes. Law is in flux and can be tricky. Example: Courts have ruled that lawyers or investigators working for them cannot “friend” a suspect already represented by counsel. Copyright © 2013 FraudResourceNet™ LLC
  • 21. Polling Question #4 Which of the following are potentially serious social media-related threats to most organizations? a) Spreading false information about a product b) Gaining unauthorized access to an executive’s inner circle c) Posing as your company for phishing attacks to steal money d) All of the above Copyright © 2013 FraudResourceNet™ LLC Polling Question 3 Outright banning of social media sites by employees is the most effective way to minimize the many SM risks threatening your organization s A. True B. False Copyright © 2013 FraudResourceNet™ LLC
  • 22. Questions?  Any Questions? Don’t be Shy! Copyright © 2013 FraudResourceNet™ LLC Coming Up Next Month  1. An Expert’s Advice on Establishing an Organization Wide Fraud Policy October 8  Using Data Analytics to Detect and Deter Procure-to-Pay Fraud October 30 Copyright © 2013 FraudResourceNet™ LLC
  • 23. Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Copyright © 2013 FraudResourceNet™ LLC