Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

5 Ways to Spot White Collar Fraud

By James D. Ratley
Blocks made of money
September 4, 2012

Unlike most other crimes, employee fraud involves both deception and an abuse of the trust that has been placed in the perpetrators as part of their professional roles. Most fraudsters also undertake specific efforts to conceal their crimes. This combination of factors makes fraud schemes particularly difficult to detect – which, in turn, allows the frauds to continue uninterrupted and the losses to multiply.

With the numerous issues and financial constraints faced by many organizations today, detecting employee fraud often takes a backseat, with a focus on reacting after the fact rather than proactively seeking out fraud. But because most fraud schemes continue – and grow – until they are discovered, actively identifying potential fraud is vital in protecting the organization’s assets.

The following techniques are among the most effective ways to fight fraud and weed out employee wrongdoing.

 

1. Know the Signs

Even with targeted concealment measures, nearly every fraud leaves some kind of trail. Whether in the accounting records, computer files, communications or behavior of the perpetrator, there is generally some sign – an anomaly – that, in hindsight, should have been a red flag of the wrongdoing. Being well-versed in the evidence a fraud scheme leaves behind is essential to uncovering the act.

Warning signs in the accounting system include missing or altered documentation, accounts with unexpected transactions or balances, and unexplained accounting entries. Computer files that have been copied, altered, moved or deleted in an unusual way (e.g., during non-work times or from remote locations) can also provide clues of theft, manipulation or attempted concealment. Additionally, both the patterns and the content of a perpetrator’s communications can illuminate areas meriting attention. For example, an inordinate amount of emails, calls or visits between an employee and one particular vendor or customer might indicate an unusually close relationship, perhaps involving bribes, kickbacks or a conflict of interest.

Likewise, fraudsters often display behavioral traits that can provide a warning sign of their schemes; ACFE research shows that most common behavioral characteristics among fraudsters include living beyond their means (displayed by approximately 36 percent of fraudsters) and experiencing financial difficulties (displayed by approximately 27 percent of fraudsters). Understanding and watching for each of these types of red flags is the foundation of any fraud detection activity.

Nonetheless, it is important to note that the presence of one or more of these red flags does not, in itself, indicate wrongdoing or fraud; instead recognizing these circumstances should be viewed as a means to identify areas worthy of further exploration.

 

2. Encourage Reports

ACFE research shows that tips are by far the most common method through which fraud is detected. While security professionals, auditors, compliance staff or management might typically be viewed as responsible for fraud detection activities in an organization, it is really the staff-level employees who are the first line of defense in spotting fraud committed by their peers. They are the ones who are working side-by-side with the perpetrators, accessing the same systems, privy to their coworkers’ behavior, and intimately familiar with true operations (not just expected protocol) of the business, all of which puts them in the best position to notice abnormalities. In some organizations, such as financial institutions, customers are an equally valuable and viable source of information about potential problems.

An effective whistleblower program involves providing and publicizing multiple mechanisms through which employees and others can report suspicious activity, as well as openly, clearly and fully supporting those who do come forward with information.

 

3. Empower the Staff

To bolster the support for reports of wrongdoing, staff at all levels should be empowered with the necessary knowledge and ability to aid in fraud detection. Specifically, managers should be tasked with duty to help uncover fraud in their departments. According to ACFE research, management’s review of processes, transactions and controls was the second most-common method by which fraud was detected, indicating the importance of proactively enlisting employees with management and supervisory roles in the fight against fraud.

For some managers, such as those in the accounting department, this might involve formally including anti-fraud activities in their job descriptions; for others, it might take the form of carrying out specific duties and exercising oversight in a way that ensures they will be able to detect things that are amiss. Additionally, employees at all levels must be trained about how fraud hurts them and what they can do to help prevent and detect it. Doing so will raise staff awareness, increase employee engagement in fraud detection efforts, and likely result in more – and more effective – tips regarding potential fraud.

 

4. Examine the Data

Most fraud affects the organization’s accounting data in some way. Whether an inventory theft leaves the books out of balance or a fraudster makes false entries in the organization’s systems to cover the fraud, close examination of the financial records can highlight areas for further investigation. Proactive data analysis is often done by auditors, as they are the charged with examining the organization’s finances and accounting systems; in fact, internal and external auditors together uncover approximately 18 percent of frauds, according to ACFE research.

However, such analysis does not need to be left to the audit team. Automated tools can be set up to scan the accounting data for items that fall outside expectations – for example, payments to vendors not on an approved list, employees who receive more than one paycheck per period, or attempts to access computer systems or files by unauthorized employees – and to provide alerts for any potential problem transactions. This can help focus the fraud detection team on those areas that are most likely to contain manipulations or anomalies that indicate fraud.

Additionally, many organizations are also beginning to actively monitor emails and other text-based data for signs of fraud. Textual analytics involves using tools to search for a high occurrence of certain keywords (such as “in over my head” or “get caught”) that might indicate the convergence of the pressure, opportunity and mindset necessary to engage in fraud. This type of analysis might be performed periodically or continually, and might be automated or manual. However, implementing textual analytics as a fraud detection tool requires the use of sophisticated software, as well as a thorough understanding of the legal environment of employee rights and workplace searches; consequently, it might not be appropriate for all organizations or situations.

 

5. Stop It Before It Starts

 Clearly, the best way to protect an organization from fraud is to prevent it from happening in the first place. An extra benefit of openly undertaking the fraud detection methods discussed above is that doing so sets a clear anti-fraud tone and sends the message that attempted fraud is being proactively sought out. In turn, this has a deterrent effect on potential fraudsters; individuals who think there is a high probability that fraud will be caught and punished are much less likely to engage in wrongdoing. Consequently, in a time when many organizations are trying to accomplish more with fewer resources, vigorously seeking out employee fraud – an activity which both limits losses from existing frauds and helps prevent potential future frauds – is a critical part of protecting company assets.  

 

Now online– Implementing an effective whistleblower program: SecurityMagazine.com/Columns/Whistleblower

KEYWORDS: crime prevention fraud detection fraud prevention white collar crime

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0912 james ratley portait

James D. Ratley, CFE, is the President and CEO of the Association of Certified Fraud Examiners (ACFE). The ACFE has nearly 55,000 members in more than 160 countries. Additional resources on fraud are available at www.ACFE.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Web Exclusive Logo

    Think You Know How to Investigate a Theft or Fraud? Think Again. Here’s the Right Way to Do It

    See More
  • New Newswire Feature Image 3/8/2012

    Prosecutors Call for Updated White Collar Crime Laws

    See More
  • cyber responsive default

    Federal Prosecution for White Collar Crime Hits 20-Year Low

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing