Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

How organizations can navigate an evolving fraud landscape

By Rebecca Herold
hacker-in-hoodie.jpg

Image via Pixabay

May 19, 2023

Preventing fraud has been a challenge for businesses for centuries. Old fraud tactics continue to be used today in addition to hundreds of other types of ways to commit fraud that have emerged as new ways to provide business services and products have been adopted. In recent years the opportunities to commit fraud have burgeoned as the COVID-19 pandemic thrust businesses suddenly into situations where workers worked remotely and consumers purchased more frequently remotely, online and through social media sites and new apps, usually assuming that all was secured. And to expand the fraud risk environment even more, many new and emerging types of technologies with insufficient-to-no security controls are being widely adopted by organizations of all types, bringing more fraud pathways.

Many of the new types and trends for committing business fraud included the expanded use of cryptocurrencies for business payments, and utilizing AI and similar tech to create synthetic identities to commit a wide range of frauds. There are many other tactics being used, but these are two areas of quickly increasing fraud. Businesses are in the midst of a perfect storm of digital fraud.

Cryptocurrency fraud

From the beginning of 2021 to mid-2022, more than $1 billion in cryptocurrency was lost to fraud scams; more than any other payment frauds. Cybercrooks are pretending to be established businesses to communicate with consumers, which harms the reputations of those businesses that are being impersonated. Another cryptocurrency fraud is when businesses accept cryptocurrency for payments, and then the cryptocurrency exchange experiences a hack or insider exploitation and the business’s money is subsequently stolen or otherwise lost.

A few ways in which businesses can mitigate the risks of cryptocurrencies:

  • Make employees and customers aware of potential impersonators of their business that could be running cryptocurrency scams. Post information to the business website and provide an email and/or phone number for those who think they may be seeing such tactics that are coming from what appears to be your business.
  • Use strong security and authentication practices for the business crypto accounts, including multi-factor authentication (MFA), never sharing login credentials, and strongly encrypting in storage and during transmission all data associated with cryptocurrencies.
  • Follow Know Your Customer (KYC) and Anti-money Laundering (AML) practices.
  • Use offline cold wallets for the majority of the business’s cryptocurrency value share. Keep the minimum required amount of liquidity online or with the business’s payment service provider.
  • Use third-party trusted broker services that have been vetted by the cryptocurrency community. Look for one that has insurance for your fiat money, and ideally also for your crypto accounts, depending upon how much you are depending upon cryptocurrency in your business.

Synthetic identity fraud

Artificial intelligence (AI), machine learning (ML) and deep learning tech are being used to create fake identities using parts of real individuals’ identities mixed with fake parts, which quite simplistically explained is synthetic identity fraud. Synthetic identity fraud is being increasingly used to gain access to consumer business accounts.

Synthetic media tools, such as those used to modify or create video, images and audio representing real people, are readily available for anyone including fraudsters to use. The use of these new ways to create synthetic identities makes it harder for businesses to identify and stop such frauds.

Synthetic identity fraud caused $20 billion in losses for U.S. banks and financial institutions in 2020. Losses from synthetic identity fraud are projected to reach $2.48 billion by 2024. Businesses face huge challenges stopping synthetic identity fraud since it is not identified by most traditional fraud prevention models.

A few ways in which businesses can mitigate the risks of being a victim of synthetic identity fraud include:

  • Use strong identity verification processes and procedures. Verification methods should include a variety of dependable information sources. Commonly used are passports, driver’s licenses and other government-issued identification documents. Increasingly more often used are biometric data, such as iris scans, fingerprints and other types of biometrics that typically are not publicly available.
  • Monitoring suspicious activity is necessary to detect and prevent synthetic identity fraud. This is where AI tools can turn the table on synthetic identity fraud and use it to prevent that crime instead of enabling it.
  • Human awareness is still necessary, though. Especially in businesses where customers are known by workers, especially in small to medium-sized businesses. Procedures should be followed that include scrutinizing customer behavior and transaction patterns to identify unusual or suspicious activity that may indicate fraud.
  • Collaborating with other organizations, such as those in local anti-fraud and security associations, and those in national industry-specific associations can be very useful. Having a contact within law enforcement agencies is also valuable for preventing successful synthetic identity fraud attempts by staying aware of current fraud crimes. When businesses and other types of organizations share information about synthetic identity theft and other types of fraud activities, organizations will be much more likely to detect and prevent fraud before it occurs. And, it could also help to identify and apprehend synthetic identity fraud criminals.  

Businesses must remain vigilant and proactive in their efforts to prevent fraud by adopting strong security measures, staying up to date with emerging fraud activities and collaborating with other organizations to share information and prevent fraud before it happens.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security cryptocurrencies fraud fraud mitigation fraud prevention machine learning money laundering scam scams

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rebecca herold headshot

Rebecca Herold is an IEEE Member, CEO of Privacy & Security Brainiacs SaaS Services and The Privacy Professor Consultancy. She is an entrepreneur, author & was an Adjunct Professor for the Norwich University Master of Science in Information Security & Assurance Program for 9 years where she also created program curriculum. Herold led the NIST Smart Grid privacy group for 7 years and is a founding member of the IEEE P1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group (June 2015). Rebecca has received numerous awards and recognitions for her work throughout the course of her career. Rebecca has a B.S. in Math & Computer Science & an M.A. in Computer Science & Education. Image courtesy of Herold 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video conference

    Staying Protected While Connected – Video Conferencing Best Practices for Businesses and Consumers

    See More
  • Glowing blue fibers in darkness

    Modernizing patch management in an evolving IT security landscape

    See More
  • Justin Shattuck 5 minutes with logo

    How to build cyber resilience in a rapidly evolving threat landscape

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!