01/01/2013
“Know thy self, know thy enemy. A thousand battles, a thousand victories.”
– Sun Tzu
The Chinese general, Sun Tzu, knew nothing of the threats posed by fraud upon modern-day businesses. But he was keenly aware that the first step in defeating his enemies was to understand their strengths and weaknesses – and those of his own.
The strength of fraud’s impact on business is clear:
* Kroll Advisory Solutions’ 2012 Global Fraud Report
** Symantec's Internet Security Threat Report, April 2011
The weaknesses exposed by today’s fraudsters are due, in large part, to the accessibility of critically important business data. Such as the financial data that drives your day-to-day operations and long-term investments. And the intellectual property that helps you create a competitive edge. And the transaction records your clients trust to be kept confidential and safe from unauthorized intruders. How well you safeguard these valuable resources can, and will, impact the reputation and success of your business.
Unlike conventional enemies, fraud is often a faceless threat. And it continues to morph into different forms:
According to Kroll Advisory Solutions’ 2012 Global Fraud Report, the biggest fraud threat that corporations face comes from within. Of the 839 senior executives polled, two-thirds responded that their companies were hit by fraud in the past year – and inside perpetrators were the key suspects.
Why? Again, the Kroll Report sites the easy access to confidential information by employees, agents, and other company representatives. And with the proliferation of laptops, smart phones, flash drives and other mobile devices, confidential data is as close as your pocket and briefcase.
But it can also be attributed to a simple lack of awareness. While much of the fraud that occurs is initiated internally, the greater perception is that external forces are to blame and that’s where a greater focus on protection lies.
Because the threat of fraud comes from within and without, companies must take a multi-layered approach to fighting back. In many cases, technology has kept up with fraud, providing software, hardware and cash-management solutions that can dramatically improve protection levels. But many of those solutions come with associated costs.
Fortunately, there are processes and procedures you can implement today that can help greatly reduce your exposure to fraud with little or no impact on your bottom line.
The battle against fraud is not one that has a definitive ending. Threats – both internal and external – will always be present and will continue to become more malicious and effective. Instituting sound policies and procedures can help you protect your company’s most valuable assets.
In the next edition of Treasury at a Glance, we’ll take a look at some of the technologies available to help in the fight against fraud.
For more information on how you can prevent fraud, contact your Relationship Manager or Treasury Management Representative. www.53.com/riskmanagement
The security information in this article is based on best practices that should be brought to the attention of your employees. THIS INFORMATION DOES NOT ADDRESS ALL SECURITY RISKS AND BEST PRACTICES AND THEREFORE SHOULD NOT BE USED AS A SOLE MEANS OF SECURITY TRAINING FOR YOUR EMPLOYEES. Work with your technical resources to add discussion points about security issues, policies and practices specific to your company or function within your company. That way, your employees will recognize the role they play in protecting your organization.
View Treasury At A Glance Archive >