{"id":1732,"date":"2020-07-05T10:14:41","date_gmt":"2020-07-05T10:14:41","guid":{"rendered":"http:\/\/blog.einnosec.com\/?p=1732"},"modified":"2022-02-28T11:27:30","modified_gmt":"2022-02-28T11:27:30","slug":"covid-19-quick-check-for-fraud","status":"publish","type":"post","link":"https:\/\/blog.einnosec.com\/index.php\/2020\/07\/05\/covid-19-quick-check-for-fraud\/","title":{"rendered":"COVID -19 Quick Check For Fraud"},"content":{"rendered":"\n<p style=\"font-size:18px\">To accommodate remote work requirements organizations continued to make changes to technology infrastructure. For the information technology team, remote work is common but there are many other departments this may be the first time. Over a few weeks, many organizations continued to make emergency changes to ensure the business continues without interruption. As a result, organizations are exposed to cybersecurity vulnerabilities and you will find a lot of information on how to manage cyber threats. The other most important area that needs attention is \u201cFraud\u201d and many small to medium organizations are not ready or have not considered fraud risk.<\/p>\n\n\n\n<p style=\"font-size:18px\">In today\u2019s blog, we have shared information about fraud basics and quick tips. The fraud schemes such as internal and external defraud companies, and other techniques such as the Ponzi scheme, identity theft, skimming, etc. defraud individuals.<\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Internal Fraud &#8211;<\/strong> <\/span>Committed by employees, manager, officers, or owners of the company<\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>External Fraud<\/strong> &#8211; <\/span>Committed by customers, vendors, and other parties<\/p>\n\n\n\n<p style=\"font-size:18px\">Internal frauds are illegal acts of employees against the company and examples include:<\/p>\n\n\n\n<ul><li><strong>Trading \u2013 Unauthorized trading, misappropriation of assets, insider trading<\/strong><\/li><li><strong>Corporate Finance \u2013 Misuse of sensitive information, loan fraud, transaction not reported<\/strong><\/li><li><strong>Other Examples \u2013 Theft of cash, not charring friends\/families, supplying receipts for refunds, destruction of assets, forgery, impersonation, bribery, corruption, etc.<\/strong><\/li><\/ul>\n\n\n\n<p style=\"font-size:18px\">External fraud covers a broad range of schemes by customers, vendors, and other parties. The threat of security breaches, stealing intellectual property, tax fraud, hacking, bankruptcy fraud, and loan fraud.<\/p>\n\n\n\n<p style=\"font-size:18px\">According to 2018 Association of Certified Fraud Examiners (ACFE), common occupational fraud schemes in various industries are as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Industry<\/strong><\/td><td><strong><span class=\"has-inline-color has-black-color\">Schemes <\/span><span class=\"has-inline-color has-very-light-gray-color\">(2018 ACFE Survey Report)<\/span><\/strong><\/td><\/tr><tr><td><strong>Banking\/ Financial Services<\/strong><\/td><td>Corruption, Cash on hand, Cash larceny, Check and payment tampering, Noncash, Billing<\/td><\/tr><tr><td><strong>Manufacturing<\/strong><\/td><td>Corruption, Billing, Noncash, Expense Reimbursement, Cash on hand<\/td><\/tr><tr><td><strong>Government\/Public Administration<\/strong><\/td><td>Corruption, Billing, Noncash<\/td><\/tr><tr><td><strong>Health care<\/strong><\/td><td>Corruption, Billing, Noncash, Expense Reimbursement<\/td><\/tr><tr><td><strong>Retail<\/strong><\/td><td>Noncash, Corruption, Billing, Expense reimbursement<\/td><\/tr><tr><td><strong>Education<\/strong><\/td><td>Corruption, Billing, Cash larceny, Cash on hand, Noncash<\/td><\/tr><tr><td><strong>Technology<\/strong><\/td><td>Corruption, Billing, Noncash, Expense reimbursement, Financial statement fraud<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p style=\"font-size:18px\">Per 2018 ACFE report, the common asset misappropriation sub-schemes with greatest risk are:<\/p>\n\n\n\n<p style=\"font-size:18px\">Non cash, Billing, Cash and Payment Tampering, Cash Larceny, Skimming, Payroll, Expense Reimbursement, Cash on hand, Register Disbursement<\/p>\n\n\n\n<p style=\"font-size:18px\">Corruption represents one of the most significant fraud risks for organizations in many industries and regions. Common corruption schemes:<\/p>\n\n\n\n<ul><li><strong>Conflict of interest \u2013 Personal or economic interest in a transaction<\/strong><\/li><li><strong>Bribery \u2013 Commercial Bribery and Official Bribery<\/strong><\/li><li><strong>Kickbacks \u2013 Commercial or business advantage<\/strong><\/li><li><strong>Illegal Gratuities \u2013 Reward to an employee after the decision has been made<\/strong><\/li><li><strong>Economic Extortion \u2013 Demand for money or other consideration using actual or threatened force or fear<\/strong><\/li><\/ul>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Other common types of fraud include but are not limited to:<\/span><\/strong><\/p>\n\n\n\n<ul><li><strong>Invoice manipulation through collusion<\/strong><\/li><li><strong>Billing for services not rendered and collecting the cash<\/strong><\/li><li><strong>Seizing checks payable to vendors<\/strong><\/li><li><strong>Adding fictitious employees and collecting the paychecks (impersonation)<\/strong><\/li><li><strong>Not removing terminated employees from payroll and collecting the paychecks<\/strong><\/li><li><strong>Paying for personal expenses with business cash<\/strong><\/li><li><strong>Recording fictitious transactions on the books to cover up a theft<\/strong><\/li><li><strong>Falsifying timesheets for a higher amount of pay<\/strong><\/li><li><strong>Pilfering stamps<\/strong><\/li><li><strong>Stealing (e.g., cash, petty cash, supplies, equipment, tools, data, records, etc.)<\/strong><\/li><li><strong>Forgery (not just check forgery, e.g. forging department head signatures on purchase orders)<\/strong><\/li><li><strong>Pocketing payments on customers\u2019 accounts,<\/strong><\/li><li><strong>Issuing receipts on self-designed receipt books<\/strong><\/li><li><strong>Not depositing all cash receipts<\/strong><\/li><\/ul>\n\n\n\n<p style=\"font-size:22px\"><strong><span class=\"has-inline-color has-black-color\">How do you?<\/span><\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\"><strong>COVID 19 Quick Checklist&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R- Review<\/strong><strong><\/strong><\/p>\n\n\n\n<p style=\"font-size:18px\"><strong>AC \u2013 Additional Checks or Testing<\/strong><strong><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>#<\/td><td><strong><span class=\"has-inline-color has-black-color\">Questions<\/span><\/strong><\/td><td>&nbsp;R<\/td><td>AC<\/td><\/tr><tr><td><strong>&nbsp;<\/strong><\/td><td><strong><span class=\"has-inline-color has-black-color\">Incident Management<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Ensure that adequate support staff is available to address the questions from remote workers and resolve the issues in time<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check the incident backlogs and review if high- risk issues are addressed on high priority<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check if the employees are notified and aware of the security incident procedures<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td><strong><span class=\"has-inline-color has-black-color\">Emergency Changes<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Without having a strong emergency change management process in place, the review of emergency changes is a high priority<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Lack of categorization and risk rating for emergency changes means a review of a larger sample of changes.<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td><strong><span class=\"has-inline-color has-black-color\">Risk Review<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Perform the sample check of change management risk assessment forms for the changes implemented during the last eight weeks<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Review emergency risk assessment forms where assessment is performed after the implementation of emergency changes.<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Ensure risk are defined and rated as per risk register in change risk assessment forms<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>In the absence of Risk Register ensure that risks are defined, categorized, and rated properly<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Ensure that controls mentioned in the risk assessment forms are valid controls including compensating controls<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Ensure forms are valid and some of them may need periodic review<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td><strong><span class=\"has-inline-color has-black-color\">Firewall Changes<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Review firewall change approvals<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Review firewall change logs and change approvals for selected<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Review all firewall changes related to third party requirements<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td><strong><span class=\"has-inline-color has-black-color\">Physical Security<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check with the facilities department that physical security checks are in place for any employees reaching office and proper approval is in place before allowing anyone to enter the premises.<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td><strong><span class=\"has-inline-color has-black-color\">Cybersecurity Checks<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check the most recent laptop imaging standards and review procedures for secured connections<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check the recent reports for application antivirus, DLP, and software patch updates<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Question if the number of laptops without the latest patches and updates is above the threshold<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check the privileged access granted to third parties to access the production data, sensitive data, privacy data, and applications remotely<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Verify if the logs are maintained and reviewed for privileged access especially changes to applications in a production environment<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check if screen lock settings are functioning as intended<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check the cyber threat reports during the last eight weeks and review how the high-risk threats are addressed and check if timely actions were taken<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Review remote access approvals for sensitive data<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td><strong>&nbsp;<\/strong><\/td><td><strong><span class=\"has-inline-color has-black-color\">Business Continuity\/Disaster Recovery<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Review incident tickets created for backup issues within the last eight weeks<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check for major issues and how it is addressed<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check for the latest backup details and no issues reported<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td><strong><span class=\"has-inline-color has-black-color\">Data Security<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check with the encryption team if they have reported any issues and any incident ticket is pending resolution<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check if the new laptops have proper encryption controls in place<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td><strong><span class=\"has-inline-color has-black-color\">Physical Security<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check with the facilities department that physical security checks are in place for any employees reaching office and proper approval is in place before allowing any one to enter the premises<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td><strong>&nbsp;<\/strong><\/td><td><strong><span class=\"has-inline-color has-black-color\">Compliance<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Conduct inquiry and perform a high-level review of high-risk compliance controls<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Review any major issues reported impacting compliance<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td><strong><span class=\"has-inline-color has-black-color\">Customer Complaints<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check the customer complaint tickets and volume of the tickets during the last eight weeks compared to earlier<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check for repetitive and major high-risk issues and resolutions in place or pending status<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td><strong>&nbsp;<\/strong><\/td><td><strong><span class=\"has-inline-color has-black-color\">Training<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Check if the training such as phishing, ransomware, malware, etc. is conducted at least once during the last eight weeks. Ensure employees are aware of what needs to be protected.<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Ensure employees are aware that hardware is not shared while working from remotely<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td><strong>&nbsp;<\/strong><\/td><td><strong><span class=\"has-inline-color has-black-color\">Fraud Checks<\/span><\/strong><\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><tr><td>&nbsp;<\/td><td>Especially important for certain clients. Checks from the fraud perspective are important and ensure processes and controls operating as intended<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To accommodate remote work requirements organizations continued to make changes to technology infrastructure. For the information technology team, remote work is common but there are&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[81],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1732"}],"collection":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/comments?post=1732"}],"version-history":[{"count":4,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1732\/revisions"}],"predecessor-version":[{"id":2312,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1732\/revisions\/2312"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/media\/2712"}],"wp:attachment":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/media?parent=1732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/categories?post=1732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/tags?post=1732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}