Articles Tagged with ''fraud prevention''

Boosting Detection with Video Analytics

Can a high-tech, high-cost video surveillance system be wasted on its monitors?

According to Royce Jeffries, the VP of Security Risk Management for Cornhusker Bank, the area had been affected by “lane gang crimes” – thieves break into vehicles or homes to take wallets and checkbooks. Then they drive to the bank with a check and the account holder’s ID, go to the furthest drive-through lane, often in disguise, and try to cash checks.


Read More

Using Digital Forensics to Investigate Internal Fraud

According to a recent study by the Association of Fraud Examiners, organizations worldwide lose 5 percent of their revenue to fraud each year.
Read More

Offers Monitoring and Traceability in Cash Life Cycle for Large Events

From Prosegur

Prosegur can integrate all activities in the cash lifecycle in order to offer efficient services with guarantees of monitoring and traceability.


Read More

Biometric Kiosks at Banks Reduce Fraud Risk for Argentinean Pensioners

Every month, the payment of pension checks to public retirees, one of Banco Supervielle’s most important customer segments, was a complex and tedious process because the recipients had to endure an extensive authentication process with various documents and certificates.
Read More

Key Control Drives Fleet Management Operations

The overall development and availability of a wide range of operational tools for the fleet management market provides organizations with more convenience – and savings – in managing vehicles.
Read More

EY Names Top Fraud and Corruption Trends for 2014

Companies and their Boards are struggling with increased regulatory burden and the risks associated with operating in emerging markets.  Regulators are challenging corporate compliance and governance models as companies aim to mitigate risk while shareholders expect growth.  The changing landscape for cross-border disputes, bribery and corruption and cyber-crime continues to test compliance and governance models, especially in new markets.  


Read More

How to Keep Up With Governance Risk

Establishing and maintaining a culture across the enterprise that is based on unwavering ethical practices from the boardroom to the lowest level employee is also a key element of effective governance programs.

One of the most important topics currently on boardroom agendas focuses on governance. Ensuring that the enterprise understands and complies with laws, regulations, policies and procedures is no longer simply enough.


Read More

Experian Caught Up in ID Theft Investigation

Security researcher Brian Krebs has uncovered the involvement of credit bureau Experian in an ID theft operation, according to ZDNet. Experian became involved through their March 2012 acquisition of Court Ventures.


Read More

How to Detect and Thwart Recent Fraud Trends

Internal Controls Improve; Collusion Schemes Increase
As fraud controls get stronger, criminal elements start teaming up to beat the system. But, as Jason Lelio points out, collusions schemes get harder and harder when faced with stringent internal controls.
Read More

How to Mitigate the Risks of ATM Skimming

Nearly half (46 percent) of all card skimming reported by the FICO Card Alert Services occurred at bank-owned ATMs in 2012 – a vast jump over 2011, when 79 percent of skimming occurred at point-of-sale terminals.
Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

2014 November cover of Security Magazine

2014 November

Don't miss our 2014 Security 500 issue, with rankings, data on sectors, and other security benchmarkings, all contained within this November 2014 edition of Security magazine. Also, (re)learn the basics of lobby security and how to make the highest impact retrofit for your budget.
Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.