Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Protecting Against the Thieves Within: How to Implement an Effective Fraud Prevention Program

By Jim Ratley
May 22, 2012

Whitaker_videoResearch conducted by the Association of Certified Fraud Examiners (ACFE) shows that the typical organization loses an estimated 5 percent of its revenues to fraud each year, and more than 85 percent of all occupational fraud cases involve employee theft. The threat of fraud and embezzlement is not only significant; it is universal. Put simply, any company that employs individuals is at risk of losing assets to employee theft. Combating this risk through proactive fraud prevention measures is more cost-effective and reputation-preserving than spending resources on detection, investigation and loss recovery. Therefore, an effective fraud prevention program is crucial to protecting an organization’s assets.

Arguably the most effective mechanism for preventing fraud is convincing employees that attempts to defraud the company will be quickly detected. When deciding to steal, fraudsters typically do not anticipate being caught. In fact, many fraudsters start out believing that they will only steal once and then put the money back as soon as they can, before anyone notices — although most never do. Consequently, increasing the perception of detection — even more than the threat of sanctions — can effectively deter many tempted employees from engaging in that first fraudulent act.

The following are six suggestions on how to create a work environment that simultaneously deters fraudsters and encourages employee participation.

1) Implementing employee monitoring systems is a clear way to send the message that the company is actively seeking out misconduct. When used openly and in compliance with legal restrictions, surveillance devices, Internet and email monitoring, and active managerial oversight can all be effective tools in the fight against fraud. However, such measures must be implemented with balance and caution, as employees who feel unduly scrutinized might use it as a justification for dishonesty (e.g., “If they’re going to treat me as if I’m stealing, I might as well prove them right”). But a non-accusatory system of employee monitoring that is well-communicated can deter fraudulent activity without alienating honest staff members.

2) The number of employees who resort to fraud is a small fraction of the overall workforce. Turning the organization’s ethical staff into an army of sentinels that is educated about the dangers of fraud and equipped with a means to report suspicions can greatly increase the perception that frauds will be caught. In addition, anti-fraud training for employees and managers can clarify common gray areas that might provide an opportunity for employees to test the waters for fraud.

To be effective, anti-fraud training should educate employees on:

  • what fraud is (and is not),
  • how unreported fraud hurts everyone in the organization,
  • what red flags to watch for and
  • how to report suspicions of wrongdoing.

3) To further increase the fraudster’s perception of being detected, the organization should have a formal reporting mechanism, such as a hotline, that enables individuals to come forward with tips and information. Such mechanisms should receive reports from both internal and external sources, allow anonymity and confidentiality, and be well publicized and easily accessible. Additionally, to encourage employees to report suspected fraud, management should enact and publicize an anti-retaliation policy to protect whistleblowers.

4) Effective fraud prevention also involves creating an environment where employees do not feel pressured to resort to fraud and cannot justify dishonest actions based on the observed unethical actions of others. Security professionals should work with management to foster an ethical corporate culture that encourages honesty from all employees. This can be formalized in a well-written, meaningful code of conduct that management openly adheres to and supports.

5) Additionally, open-door policies and programs that offer employees assistance or counseling in times of need can be particularly effective in addressing the root causes that underlie many fraudsters’ misdeeds.

6) Conducting employee background checks can prevent hiring mistakes that let known thieves in through the front door. However, as most occupational fraudsters are first-time offenders, background checks have limited effectiveness in preventing fraud and should be but one tool in the company’s anti-fraud program. Nonetheless, background checks of new hires and employees up for promotion — as well as routine checks on employees with access to company finances, sensitive information or other valuable resources — underscore a commitment to hiring and retaining only honest and ethical employees.

Security and loss prevention professionals play a critical role in ensuring their organizations’ fraud prevention programs include well-designed and properly implemented components that effectively deter employee theft and fraud. Initiatives such as monitoring systems, anti-fraud training, hotlines, an ethical corporate culture and a background-check policy are vital to protecting the organization’s resources from potential thieves within.

KEYWORDS: embezzlement employee fraud prevention loss prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

James D. Ratley, CFE, is the President and CEO of the Association of Certified Fraud Examiners (ACFE). The ACFE has nearly 55,000 members in more than 160 countries. Additional resources on fraud are available at www.ACFE.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Creating an Effective Whistleblower Program

    See More
  • edu5-900px.jpg

    Five Strategies of an Effective Domestic Violence Prevention Program on Campus

    See More
  • building a strong security program

    Strategies for developing an effective security program: Build the right solution

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing