Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Why your corporate structure could be compounding fraud risk

By Shai Cohen
fraud-scam-freepik1170x658x57.jpg

Image via Freepik

November 17, 2022

Large enterprises constantly extol the benefits of breaking down silos and sharing data across business units for strategic purposes. But as we all know, there’s a big difference between theory and practice. The challenges in implementing this vision range from differences in business units’ software systems and data formats, to busy executives focusing on competing priorities, to the fear that centralized processes might limit departmental flexibility. But many companies are now finding a more urgent reason to finally address segregation of data: fraud prevention.

Criminal efforts to capture and steal personal information to take over financial accounts, open new fraudulent accounts and engage in credit card fraud continue to accelerate. According to Javelin Strategy & Research, identity fraud resulted in $24 billion in combined U.S. consumer and financial institution losses in 2021, a 79% increase from 2020. Unfortunately, cross organizational fraud is escalating the steep financial cost of these efforts.

What does cross-organizational fraud look like in real life? Here’s a recent example from a financial services company. A clever fraudster performed a SIM swap on the phone of an individual who had just died, allowing him to take over the deceased person’s phone. He then visited the website of the individual’s bank and attempted to access their account. He didn’t know the password but was able to change it by requesting a one-time passcode (OTP), which was sent to the phone he now controlled. He transferred money out of the account and then, after reaching the website limit, called the call center. Because the fraudster was using a SIM swapped phone that appeared legitimate, the call center allowed him to withdraw even more money. The deceased person’s family didn’t realize that the phone had been taken over until they discovered the drained accounts weeks later.

There were certainly risk signals in this case — the SIM swap and OTP request — but the digital and call center channel fraud tools did not flag the phone as a risk, let alone share the data across channels to allow the organization to see the full picture of the suspect behavior and tie it to one user.

 

The authentication challenge 

Confirming that customers are who they claim to be before granting them access to sensitive accounts has long posed a challenge for enterprises, as the need to prevent fraud must be considered alongside the equally valid need to provide a frictionless experience for legitimate users. Customers may take their business elsewhere if they’re forced to jump through too many hoops to prove their identity (or, conversely, if they believe the organization is not taking security seriously).

Authentication technology has made great strides in recent years, allowing many enterprises to stay one step ahead of the fraudsters. However, organizations often use these tools inconsistently — for example, incorporating mobile device analytics for digital channel access control but not for call center contacts, or using different systems for different lines of business — and these siloed systems fail to share the associated risk data across the enterprise.

 

Sharing risk signals

A lack of cross-channel and cross-departmental communication, and of the failure to share risk signals across channels, gives criminals more space to act — an opportunity that fraud rings are delighted to take advantage of. A company’s different divisions may all use fraud prevention tools, but if collective fraud intelligence is not being shared across the enterprise, the risk increases significantly and can lead to far more negative outcomes.

Call centers are often the weak link in risk assessment because they usually don’t have access to the risk signals observed in other channels. They’re also often the weak link in authentication, as 70% of contact centers continue to use only knowledge-based authentication methods (such as challenge questions), despite the fact that the information needed to overcome these methods is relatively easy to steal from consumers or scrape from social media. To fight cross-organizational fraud, call centers must be provided with the same fraud prevention tools that digital channels use.

Ideally, a single orchestrated fraud platform should be implemented across all channels and organizational verticals. To deliver fraud intelligence across the entire enterprise, an effective omnichannel identity management and authentication solution will incorporate a comprehensive digital identity for each user, along with IP address and geolocation attributes, global trust indicators, combining this with device reputation, consortium data, and behavioral analytics. Using tools that examine account balances, account activity, devices being used, digital behavior and so on, organizations can tie all the pieces of information together in order to identify and track anomalous behavior.

At a minimum, and regardless of the technology chosen, risk signals need to be shared broadly across the enterprise. Simply creating a database of known fraudulent numbers, for example, could be a helpful starting point.

Business leaders also need to take full advantage of the information they have access to today, both internal and third-party data — including historical data (e.g., a customer hasn’t moved in 20 years, has had the same phone for 10 years, and never swapped the SIM). Examining both the good and risk signals can enable organizations to speed access for legitimate customers, who make up the vast majority of users.

 

Developing a true enterprise focus

Ultimately, organizations need to be able to examine all the risk signals they are receiving from every contact point and connect them to an account and a user — and then share that information across channels and verticals.

Achieving this goal will require technology tools (particularly improvements in the call center, to allow for omnichannel risk signals), but it will also require the establishment of an enterprise focus on identity and fraud, with consistent policies and risk tolerances, and a high-level leader who oversees key aspects of fraud and security across the entire enterprise. A strong emphasis on orchestration and sharing data is needed to ensure that all business units and channels have visibility into potential connections between risk signals.

Breaking down silos isn’t just a matter of improving collaboration and innovation potential; it’s critical to the fight against increasingly sophisticated fraud attempts.

KEYWORDS: fraud prevention risk assessment risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Shai Cohen is VP of Global Fraud Solutions for TransUnion.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • business-risk-management.jpg

    Why cyber risk assessments should be a part of your business strategy

    See More
  • global-enews

    Why Your Next Intelligence Analyst Should Be a Workplace Violence Analyst

    See More
  • physical-security-cyber-fp1170x658v40.jpg

    Why cybersecurity should be your physical security priority

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!