Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Protecting Against the Thieves Within: How to Implement an Effective Fraud Prevention Program

By Jim Ratley
May 22, 2012

Whitaker_videoResearch conducted by the Association of Certified Fraud Examiners (ACFE) shows that the typical organization loses an estimated 5 percent of its revenues to fraud each year, and more than 85 percent of all occupational fraud cases involve employee theft. The threat of fraud and embezzlement is not only significant; it is universal. Put simply, any company that employs individuals is at risk of losing assets to employee theft. Combating this risk through proactive fraud prevention measures is more cost-effective and reputation-preserving than spending resources on detection, investigation and loss recovery. Therefore, an effective fraud prevention program is crucial to protecting an organization’s assets.

Arguably the most effective mechanism for preventing fraud is convincing employees that attempts to defraud the company will be quickly detected. When deciding to steal, fraudsters typically do not anticipate being caught. In fact, many fraudsters start out believing that they will only steal once and then put the money back as soon as they can, before anyone notices — although most never do. Consequently, increasing the perception of detection — even more than the threat of sanctions — can effectively deter many tempted employees from engaging in that first fraudulent act.

The following are six suggestions on how to create a work environment that simultaneously deters fraudsters and encourages employee participation.

1) Implementing employee monitoring systems is a clear way to send the message that the company is actively seeking out misconduct. When used openly and in compliance with legal restrictions, surveillance devices, Internet and email monitoring, and active managerial oversight can all be effective tools in the fight against fraud. However, such measures must be implemented with balance and caution, as employees who feel unduly scrutinized might use it as a justification for dishonesty (e.g., “If they’re going to treat me as if I’m stealing, I might as well prove them right”). But a non-accusatory system of employee monitoring that is well-communicated can deter fraudulent activity without alienating honest staff members.

2) The number of employees who resort to fraud is a small fraction of the overall workforce. Turning the organization’s ethical staff into an army of sentinels that is educated about the dangers of fraud and equipped with a means to report suspicions can greatly increase the perception that frauds will be caught. In addition, anti-fraud training for employees and managers can clarify common gray areas that might provide an opportunity for employees to test the waters for fraud.

To be effective, anti-fraud training should educate employees on:

  • what fraud is (and is not),
  • how unreported fraud hurts everyone in the organization,
  • what red flags to watch for and
  • how to report suspicions of wrongdoing.

3) To further increase the fraudster’s perception of being detected, the organization should have a formal reporting mechanism, such as a hotline, that enables individuals to come forward with tips and information. Such mechanisms should receive reports from both internal and external sources, allow anonymity and confidentiality, and be well publicized and easily accessible. Additionally, to encourage employees to report suspected fraud, management should enact and publicize an anti-retaliation policy to protect whistleblowers.

4) Effective fraud prevention also involves creating an environment where employees do not feel pressured to resort to fraud and cannot justify dishonest actions based on the observed unethical actions of others. Security professionals should work with management to foster an ethical corporate culture that encourages honesty from all employees. This can be formalized in a well-written, meaningful code of conduct that management openly adheres to and supports.

5) Additionally, open-door policies and programs that offer employees assistance or counseling in times of need can be particularly effective in addressing the root causes that underlie many fraudsters’ misdeeds.

6) Conducting employee background checks can prevent hiring mistakes that let known thieves in through the front door. However, as most occupational fraudsters are first-time offenders, background checks have limited effectiveness in preventing fraud and should be but one tool in the company’s anti-fraud program. Nonetheless, background checks of new hires and employees up for promotion — as well as routine checks on employees with access to company finances, sensitive information or other valuable resources — underscore a commitment to hiring and retaining only honest and ethical employees.

Security and loss prevention professionals play a critical role in ensuring their organizations’ fraud prevention programs include well-designed and properly implemented components that effectively deter employee theft and fraud. Initiatives such as monitoring systems, anti-fraud training, hotlines, an ethical corporate culture and a background-check policy are vital to protecting the organization’s resources from potential thieves within.

KEYWORDS: embezzlement employee fraud prevention loss prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

James D. Ratley, CFE, is the President and CEO of the Association of Certified Fraud Examiners (ACFE). The ACFE has nearly 55,000 members in more than 160 countries. Additional resources on fraud are available at www.ACFE.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Creating an Effective Whistleblower Program

    See More
  • edu5-900px.jpg

    Five Strategies of an Effective Domestic Violence Prevention Program on Campus

    See More
  • building a strong security program

    Strategies for developing an effective security program: Build the right solution

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing