Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

How to Detect and Thwart Recent Fraud Trends

Internal Controls Improve; Collusion Schemes Increase

May 14, 2013

Lelio_JasonAs fraud controls get stronger, criminal elements start teaming up to beat the system. But, as Jason Lelio points out, collusions schemes get harder and harder when faced with stringent internal controls.

Lelio is the Senior Vice President of Marsh Inc. and managing consultant for the Forensic Accounting and Claims Services (FACS) Practice, and he has been involved in insurance loss and forensic accounting for more than 16 years.  

“Overall, they’re stealing the same things they always were,” says Lelio. “But internal controls are getting better, so they have to skirt these through collusion. (Enterprises) are more susceptible to collusion now, but it’s harder.”

In order to thwart this rising trend, Lelio recommends employing surprise audits and anonymous tip lines. Anonymous tips are still the top way enterprises discover fraud, but surprise audits can get employers additional information, whether following up on a tip or investigating an internal red flag, such as rising shrink rates at a newly acquired retail location.

These detailed analyses of the inflow and outflow of inventory works similarly to a bank audit, and it’s all part of being proactive, Lelio says.

The presence of anti-fraud controls is correlated with significant decreases in the cost and duration of fraud schemes in the workplace, according to the ACFE 2012 Report to the Nations.  In general, more businesses are using anti-fraud controls in 2012 than in 2010, with particular increases in the use of codes of conduct and anti-fraud policies – each of which jumped more than three percent in two years.

The report also reveals that organizations lose five percent of revenue each year to fraud, which translates to an annual loss of $3.5 trillion. And although the median loss from occupational fraud was $140,000, more than one-fifth of the cases in the study caused losses of at least $1 million.

CSOs can strategically plan for these risks by “staying on top of it and internally monitoring risk,” says Lelio. “You have to set the tone at the top – as the business changes, controls should change too. Educate your C-Suite about where the main risks are in terms of fraud, and then launch a proactive campaign.”

Education is one of the pillars of that campaign, from the C-Suite to the average employee: “Send an annual e-blast describing signs and effects of fraud; let employees know about any potential rewards,” he adds. Reminding employees about ongoing risks helps them to stay vigilant and, hopefully, willing to report any wrongdoing.

For more information about ongoing fraud trends and how to stop them, you can check out the research available at Marsh Inc., as well as the Association of Certified Fraud Examiners (ACFE) 2012 Report to the Nations.

KEYWORDS: Collusion Scheme Forensic Accounting Fraud Investigations fraud prevention retail theft Surprise Audits

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Report Details Trends in Retail Fraud; Mobile Fraud to Increase

    See More
  • cybersecurity-blog

    How to Detect & Prevent Cyberattackers from Exploiting Web Servers via Web Shell Malware

    See More
  • FBI Warns Popular Social Media Trends can Lead to Fraud

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing