SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Protecting Your
Organization Against Check
and ACH Fraud
March 6, 2013
Special Guest Presenter:
Paul McCormack, CFE
Connectics

Copyright © 2013 FraudResourceNet™ LLC

About Peter Goldmann, MSc., CFE



President and Founder of White Collar Crime 101

Publisher of White-Collar Crime Fighter
Developer of FraudAware® Anti-Fraud Training
Monthly Columnist, The Fraud Examiner,
ACFE Newsletter

 Member of Editorial Advisory Board, ACFE
 Author of “Fraud in the Markets”
Explains how fraud fueled the financial crisis.

Copyright © 2013 FraudResourceNet™ LLC
About Jim Kaplan, MSc, CIA, CFE
 President and Founder of
AuditNet®, the global resource
for auditors
 Auditor, Web Site Guru,
Internet for Auditors Pioneer
Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
 Author of “The Auditor’s
Guide to Internet Resources”
2nd Edition
Copyright © 2013 FraudResourceNet™ LLC

Paul McCormack, CFE
 17 years of fraud, litigation and

business consulting experience
 Worked directly with agents from
federal, state and local law
enforcement agencies including
the F.B.I., G.B.I., D.E.A., and the
Secret Service
 Previously managed check fraud
detection for SunTrust Banks

Copyright © 2013 FraudResourceNet™ LLC
Webinar Housekeeping
This webinar and its material are the property of AuditNet® and FraudAware®.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We will be recording the webinar and you will be provided access to
that recording within five business days after the webinar. Downloading or
otherwise duplicating the webinar recording is expressly prohibited.
Please complete the evaluation to help us continuously improve our Webinars.
You must answer the polling questions to qualify for CPE per NASBA.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
If GTW stops working you may need to close and restart. You can always dial
in and listen and follow along with the handout.

Copyright © 2013 FraudResourceNet™ LLC

Disclaimers
 The views expressed by the presenters do not
necessarily represent the views, positions, or opinions of
FraudResourceNet LLC or the presenters’ respective
organizations. These materials, and the oral
presentation accompanying them, are for educational
purposes only and do not constitute accounting or legal
advice or create an accountant-client relationship.
 Any mention of commercial products is for information
only; it does not imply recommendation or endorsement
by FraudResourceNet LLC

Copyright © 2013 FraudResourceNet™ LLC

5
Today’s Agenda













Introduction
Fraud Statistics
Auditor’s Role in Fraud Detection
Check & ACH Fraud Statistics
Main Types of Check Fraud
Red Flags of Check Fraud
How ACH Fraud Occurs
Red Flags of ACH Fraud
Detecting Check and ACH Fraud
Prevention/Control Measures
Conclusion
Questions
Copyright © 2013 FraudResourceNet™ LLC

The Auditor’s Role

 IPPF Standard 1210.A3
 Internal auditors must have
sufficient knowledge of…available
technology based audit techniques
to perform their assigned work

Copyright © 2013 FraudResourceNet™ LLC
Fraud: The Big Picture
According to major accounting firms, professional fraud
examiners and law enforcement:

 Fraud jumps significantly during tough economic times
 Business losses due to fraud increased 20% in last 12
months, from $1.4 million to $1.7 million per billion dollars of
sales. (Kroll 2010/2011 Global Fraud Report)
 Average cost to for each incident of fraud is $160,000
(ACFE) Of Financial Statement fraud: $2 million
 Approx. 60% of corporate fraud committed by insiders (PwC)
 Approx. 50% of employees who commit fraud have been
with their employers for over 5 years (ACFE)
Copyright © 2013 FraudResourceNet™ LLC

Check & ACH Fraud Facts
 Checks continue to be the dominant
payment form targeted by fraudsters
 85 percent of companies surveyed
reported that checks were targeted
 The typical loss associated with payment
fraud is $19,200
 Most organizations do not automatically
change out affected bank accounts
associated with payments fraud
 Seventy-four percent of organizations
maintain separate accounts for different
payment methods and types
Source: 2012 AFP Payments Fraud and Control Survey
Copyright © 2013 FraudResourceNet™ LLC
Check & ACH Fraud Facts
 Electronic check conversion services continue
to experience a very low incidence of fraud
(2%), making this service a good choice in
helping minimize instances of check fraud.
 17% of organizations that were targets of ACH
fraud during 2011 suffered a financial loss as a
result of such fraud
 Positive pay, ACH filters and daily
reconciliations are among the methods used to
identify exception items that may include
fraudulent transactions as well as errors and
other rejects due to administrative issues
Source: 2012 AFP Payments Fraud and Control Survey

Copyright © 2013 FraudResourceNet™ LLC

Check & ACH Fraud Facts
 The most common reasons victim organizations are
financially responsible for the losses sustained from
ACH fraud include:
 Not reconciling accounts on a timely basis
 Not using ACH debit blocks or ACH debit filters
 ACH return not being timely
 Not using ACH positive pay

Source: 2012 AFP Payments Fraud and Control Survey

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 1

The majority of organizations targeted by ACH
fraudsters suffer a financial loss.
A. True
B. False

Copyright © 2013 FraudResourceNet™ LLC

Main Types of Check Fraud
 Alterations – Chemicals remove or alter the original
information inscribed on a check (for example, the
payee, the amount etc).
 Counterfeit – Check was never issued by the
organization, it is a copy (the quality can vary
significantly). Check is negotiated and ultimately debited
against the organization’s account

Copyright © 2013 FraudResourceNet™ LLC
Main Types of Check Fraud
(cont)
 Forged Endorsements / Signatures – Checks are stolen
and then endorsed by someone other than the payee that
the organization intended to receive the funds. An employee
can also steal blank checks and forge official signature
 Closed account fraud – Checks written against accounts
that are closed and contain no funds

Copyright © 2013 FraudResourceNet™ LLC

Main Types of Check Fraud
(cont)
 Kiting - Kiting of funds involves writing checks against
deposits that have not cleared. Money appears in two
accounts - temporarily
 Account takeover – Cyber-fraudster typically steals
banking credentials by planting “malware” on target user’s
computer. Almost immediately, wires, ACHs and
occasionally checks are created. Once the money leaves
the account it is laundered through a series of transactions
making recovery of the funds all but impossible.

Copyright © 2013 FraudResourceNet™ LLC
Check Fraud Red Flags

 Checks are presented out-of-sequence
 Bank’s fraud department routinely calls to verify check

fraud suspects
 Vendors complain about missing check payments
 Canceled check endorsements are illegible or

inconsistent
 Payees appear to have been altered or do not appear to

be business-related

Copyright © 2013 FraudResourceNet™ LLC

Check Fraud Red Flags

 Check contains misspellings, typos,

and grammatical errors, or doesn't have a watermark.
 Routing transit number (RTN) or ABA number at bottom

of the check doesn't accurately include the two sets of
numbers on the upper right corner next to the check
number. (The RTN or ABA number is the nine-digit
code on the bottom of the check).
 First three numbers indicate the state and district office

of the issuer. These numbers don't coincide on altered
checks.

Copyright © 2013 FraudResourceNet™ LLC
Case Study #1
 Kathleen Prince, the former bookkeeper / accountant for
the Inner Circle Foster Family Agency received a
sentence of 41 months for taking $708,924 from her
employer for her personal use.
 Prince made checks payable to herself as well as her
creditors. She used the funds to pay her personal credit
card bills, cell phone bills, and her mortgage. She also
used to proceeds from the fraud to pay for a vacation to
Hawaii.
 To conceal the fraud from the board of directors, Prince
altered the agency's accounting records and
misrepresented the organization's health to board of
directors.
Copyright © 2013 FraudResourceNet™ LLC

Case Study #1 – Lessons
Learned
 Check fraud is prevalent in all types of organizations.
Charitable organizations are particularly vulnerable as
they are unable, or unwilling to invest in additional
controls or oversight to prevent it.
 If board of directors allows a bookkeeper to control
multiple elements of payment process, recording and
reconciliation process, the probability that fraud will take
place rises dramatically.

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 2
Writing checks against deposits that have not
cleared is a definition of
A.
B.
C.
D.

Check alterations
Closed account fraud
Kiting
Account takeover

E.

Copyright © 2013 FraudResourceNet™ LLC

Case Study #2
 Karen Febles, a former a New York bank employee was
charged with stealing $1.8 million from a retired employee
of the bank while tasked with managing his personal and
professional finances. Between 2007 and 2011, Febles
allegedly altered checks for higher amounts that had
previously been signed by the account holder
 Febles purchased a Range Rover with $52,720 in cash, a
Mercedes-Benz with $34,650 in cash, spent
approximately $45,000 on vacation cruises, more than
$100,000 on real estate, more than $20,000 on other car
payments and more than $20,000 on personal expenses
Continued …
Copyright © 2013 FraudResourceNet™ LLC
Case Study #2 – Prevention
Lessons
 In addition to monitoring employee activities, all
organizations should have software in place that monitors
customer as well as employee account activity. Employees
often mistakenly believe that they can use their personal
bank accounts to conduct fraud unobserved.
 Febles spent considerable funds on cars, vacations and
real estate. It is possible that a fellow employee may have
suspected that Febles was committing fraud.
Key: If you have not done so already, deploy an
anonymous hotline that employees can use to report
concerns regarding employees, vendors and customers.
 Failure to implement Segregation of Duties can be costly
Copyright © 2013 FraudResourceNet™ LLC

Polling Question 3
Choose all of the following that could be red
flags of check fraud:
A. Vendors complain about missing check payments
B. Canceled check endorsements are illegible or
inconsistent
C. Payee name contains a typo
D. Payees appear to have been altered or do not appear to
be business-related
A.

Copyright © 2013 FraudResourceNet™ LLC
How ACH Fraud Occurs
 Very easily!
 Need two pieces of data – routing number and bank

account number = Corporate account ID theft
 Transaction is initiated by fraudster via an Originating

Depository Financial Institution (ODFI)
 ODFI “batches” transactions and delivered via a
clearing house to Receiving Depository Financial
Institution
 RDFI posts transactions
customer accounts
 Account holder is unaware
of transaction until ACH
debit appears in account
Copyright © 2013 FraudResourceNet™ LLC

ACH Fraud Red Flags

 Accounts are experiencing a significant increase in

ACH debits (payroll accounts are especially
vulnerable)
 Unexplained ACH debits for small amounts from

unknown vendors
 Bank’s fraud department calls to confirm ACH

debits
 Accounting personnel are unable to reconcile all

debit activity in organization accounts
Copyright © 2013 FraudResourceNet™ LLC
ACH Fraud Notification
 Consumers have 60 days to notify
their bank. Corporate accounts
have 2 days!
Important: It is crucial that all
accounts are reconciled on a daily
basis
 Banks routinely deny return
requests outside of the 2 day
window
 Banks will enter litigation to defend
their decision
Copyright © 2013 FraudResourceNet™ LLC

Case Study #3 – ACH Fraud
 Mary Harris, a former treasury analyst for Central

Parking Corporation, pleaded guilty to her role in an
$1.9 million embezzlement.
 Harris admitted that in her position she had access to

organization bank accounts and the Automated
Clearing House (“ACH”) system. Harris processed
approximately 200 ACH transactions that deposited
funds in her own bank account or the bank accounts of
her relatives.
 Harris concealed the fraud by making accounting

entries in Central Parking’s accounting ledger and
creating false emails to support the entries.
Copyright © 2013 FraudResourceNet™ LLC
Case Study #3 – Lesson
Learned
 A fraudster only needs two pieces of

data - your bank’s routing number and
the account number
 Payroll accounts are often the

destination for fraudulent ACH
transactions as the routing number and
account number is widely circulated
 If your organization’s bank accounts see

a significant increase in ACH debits,
fraudsters may be testing your ability to
detect fraudulent transactions before
unleashing a number of debits

Copyright © 2013 FraudResourceNet™ LLC

Case Study #3 – Prevention
Lessons
 Don’t ignore calls from your bank’s fraud department.

They have considerable “behind the scenes”
information regarding what a fraudulent ACH debit looks
like
 If you cannot reconcile all debit activity in your

organization’s accounts, look for reasons for the unreconciled amounts

Copyright © 2013 FraudResourceNet™ LLC
Case Study #3 – Prevention
Lessons (continued)
 Companies only have 2 days to notify

their bank of a fraudulent ACH. Notify
them immediately once detected
 Given the short time period within

which your organization is required to
notify the bank, all accounts should
be reconciled on a daily basis. Failure
to do so will in automatic denial of any
fraud claims made
 Banks will often pursue litigation to

defend their decision to deny the
fraud claim
Copyright © 2013 FraudResourceNet™ LLC

Case Study #3 – Prevention
Lessons (continued)
 Since employees most often unwittingly provide

fraudsters with the information they need to commit
ACH fraud (bank account number & routing number),
educate your employees on the dangers of ACH fraud.
Helpful: Your bank will likely be able to provide
examples of fraudulent phishing emails that criminals
have used in the past
 Pay attention to ACH fraud cases in the news. Consider

whether a similar fraud could take place at your
organization?
 Designate one computer for all online banking

transactions including ACH and wire
Copyright © 2013 FraudResourceNet™ LLC
Case Study #3 – Prevention
Lessons (continued)
 Ensure that all of your organization’s computers have

robust anti-virus software installed that is kept up to
date automatically (no manual intervention to accept
update)
 Task your organization’s IT department with conducting

frequent reviews of the computer designated for online
banking to ensure that it remains virus free
 To avoid complacency as well as the threat of

employee fraud, rotate responsibility for ACH
transactions every 6 months

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 4
Commercial accounts have ______ days to
inform the bank of an ACH fraud
A.
B.
C.
D.

60
30
2
10
E.

Copyright © 2013 FraudResourceNet™ LLC
Check & ACH Anti-Fraud Tools
 Positive pay and reverse positive pay
 Positive pay - Bank will only pay Checks & ACHs that you
provide
 Reverse positive pay – Bank sends list of Checks & ACHs
presented. Your staff reviews payment register to accept or
reject

 Check & ACH blocks – nothing can be debited
 Check & ACH filters – select list of ACH debits allowed
(approved companies)
 Signature verification – check signatures are reviewed by
bank (A service you must pay for to have specific checks
reviewed prior to payment).
 Dual control for online transactions – two levels of
approval
 Account alerts – flags unusual transactions
Copyright © 2013 FraudResourceNet™ LLC

Fraud Prevention – Bank
Perspective
 Bank must authenticate user as being authorized to access
account and initiate transactions
 The customer must act in an abnormal manner to be flagged
 Transactions that are initiated are consistent with previous
transactions, or companies of a similar size
 Bank must do all of this while facilitating business for entire
customer base

 The bank and the corporate customer must work together
 What tools does your bank have to detect Check & ACH fraud?
 How will they notify you of suspected fraud?
 Has your bank “missed” Check & ACH fraud in the past?
Relying exclusively on your bank to prevent Check & ACH
fraud will result in fraud
Copyright © 2013 FraudResourceNet™ LLC
Case Study #4 – ACH Fraud
 Patricia K. Smith, former controller for Baierl Acura, pleaded

guilty to taking $10.2 million from the dealership over a 7
year period. Smith moved money from dealership's business
accounts to her personal account using over 800 Automated
Clearing Housing (ACH) transfers. Smith used the proceeds
to fund:





$1.8 million billed to American Express for private jet charters
$44,500 Super Bowl XLV
$32,500 for a luncheon for six people prepared by Ina Garten
$5,000 for "The Vatican Package," which included Mass in
Papal Audience
 $2,500 for a Phantom of the Opera experience, including
costume fitting, wig fitting, an escort onstage during the
Hannibal Opera sequence, and four seats for the performance.
Copyright © 2013 FraudResourceNet™ LLC

Case Study #4 – Prevention
Lessons (continued)
 A bookkeeper or controller should never

be trusted without verification place in to
ensure that they are performing their job.
Their work should periodically be
reviewed by their manager on at least a
monthly basis. From time to time,
consider engaging a CPA to conduct a
review or audit of their work.
 Assuming that your organization's bank

will detect and prevent embezzlement is
a risky assumption. In the bank's
defense, since Smith was an authorized
user of the ACH system, it is difficult for
the bank to uncover unusual activity in a
sea of regular business transactions.
Copyright © 2013 FraudResourceNet™ LLC
Check & ACH Fraud
Prevention Wrap-Up
 Educate employees on ACH & Check fraud
 Reverse engineer Check and ACH fraud in the news
 Provide examples of fraudulent emails used to capture login
information - What to look for in a fake website

 Consider designating one computer for online
banking
 Robust anti-virus software that is up to date
 Frequent reviews of computer to ensure virus free

 Meet with your bank to understand Check & ACH
fraud detection and prevention capabilities
Copyright © 2013 FraudResourceNet™ LLC

Check & ACH Fraud
Prevention Wrap Up
 Implement robust controls regarding the ordering,
receipt and storage of check stock
 Perform timely bank account reconciliations
 Mail all checks as soon as they are signed
 Enhance the “perception of detection”

Copyright © 2013 FraudResourceNet™ LLC
Check & ACH Fraud
Prevention Wrap Up
 Segregate duties so that more than one employee is
involved in the issuance, recording and
reconciliation of payments
 Deploy an anonymous employee hotline
 Don’t rely upon your bank to uncover embezzlement
 Rotate employees involved in the payment process
frequently
 Mandate that employees use their allotted vacation
Copyright © 2013 FraudResourceNet™ LLC

Polling Question 5
Choose all the following are effective prevention
measures against check and ACH fraud…
A. Implement robust controls regarding the ordering, receipt
and storage of check stock
B. Perform timely bank account reconciliations
C. Mail all checks as soon as they are signed
D. Enhance the “perception of detection”

Copyright © 2013 FraudResourceNet™ LLC
Questions?
 Any Questions?
Don’t be Shy!

Copyright © 2013 FraudResourceNet™ LLC

Thank You!

Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com
Paul McCormack CFE
paulmccor2008@gmail.com
Copyright © 2013 FraudResourceNet™ LLC

Weitere ähnliche Inhalte

Was ist angesagt?

Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...central university of rajasthan
 
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...Scott & Baldwin CPAs
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplaceDecosimoCPAs
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskSantosh Pande
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementRon Steinkamp
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and ControlWeaverCPAs
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryDecosimoCPAs
 
What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014Ron Steinkamp
 
Chapter 6 Check Fraud Final
Chapter 6 Check Fraud FinalChapter 6 Check Fraud Final
Chapter 6 Check Fraud FinalLucyndaGrider
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Anomaly Detection Petty
Anomaly Detection   PettyAnomaly Detection   Petty
Anomaly Detection PettyTodd Petty
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 

Was ist angesagt? (20)

Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Red Flags Fraud
Red Flags FraudRed Flags Fraud
Red Flags Fraud
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the Workplace
 
Understanding & Managing Fraud Rrisk
Understanding & Managing Fraud RriskUnderstanding & Managing Fraud Rrisk
Understanding & Managing Fraud Rrisk
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Fraud Risk and Control
Fraud Risk and ControlFraud Risk and Control
Fraud Risk and Control
 
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance IndustryFraud Prevention, Detection and Investigation in the Payday Advance Industry
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014
 
Chapter 6 Check Fraud Final
Chapter 6 Check Fraud FinalChapter 6 Check Fraud Final
Chapter 6 Check Fraud Final
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Summary presentation Highliths
Summary presentation HighlithsSummary presentation Highliths
Summary presentation Highliths
 
Anomaly Detection Petty
Anomaly Detection   PettyAnomaly Detection   Petty
Anomaly Detection Petty
 
Who Commits Fraud
Who Commits Fraud   Who Commits Fraud
Who Commits Fraud
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 

Andere mochten auch

Defining my values | 4people matters 2015
Defining my values | 4people matters 2015Defining my values | 4people matters 2015
Defining my values | 4people matters 2015Niki Anandi Koulouri
 
Presentación final de investigación
Presentación final de investigaciónPresentación final de investigación
Presentación final de investigaciónHikari0909
 
Geometria carlos cuen
Geometria carlos cuenGeometria carlos cuen
Geometria carlos cuenCarlos Cuen
 
Intervento sulla Leadership: Anthony Smith intervento sulla leadership IULM
Intervento sulla Leadership: Anthony Smith intervento sulla leadership IULMIntervento sulla Leadership: Anthony Smith intervento sulla leadership IULM
Intervento sulla Leadership: Anthony Smith intervento sulla leadership IULMMackster
 
info een dag in de daltonklas
info een dag in de daltonklas info een dag in de daltonklas
info een dag in de daltonklas daisy84
 
The zimbabwe dairy industry
The zimbabwe dairy industryThe zimbabwe dairy industry
The zimbabwe dairy industryEddington Gororo
 
Tabla de posiciones
Tabla de posicionesTabla de posiciones
Tabla de posicionesLui CaMo
 

Andere mochten auch (9)

Defining my values | 4people matters 2015
Defining my values | 4people matters 2015Defining my values | 4people matters 2015
Defining my values | 4people matters 2015
 
Presentación final de investigación
Presentación final de investigaciónPresentación final de investigación
Presentación final de investigación
 
Macias tprres esmeralda
Macias tprres esmeraldaMacias tprres esmeralda
Macias tprres esmeralda
 
Geometria carlos cuen
Geometria carlos cuenGeometria carlos cuen
Geometria carlos cuen
 
Intervento sulla Leadership: Anthony Smith intervento sulla leadership IULM
Intervento sulla Leadership: Anthony Smith intervento sulla leadership IULMIntervento sulla Leadership: Anthony Smith intervento sulla leadership IULM
Intervento sulla Leadership: Anthony Smith intervento sulla leadership IULM
 
info een dag in de daltonklas
info een dag in de daltonklas info een dag in de daltonklas
info een dag in de daltonklas
 
Tic. dario camacho
Tic. dario camachoTic. dario camacho
Tic. dario camacho
 
The zimbabwe dairy industry
The zimbabwe dairy industryThe zimbabwe dairy industry
The zimbabwe dairy industry
 
Tabla de posiciones
Tabla de posicionesTabla de posiciones
Tabla de posiciones
 

Ähnlich wie Protecting Your Organization Against Check and ACH Fraud

Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsFraudBusters
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010annmarieboyd
 
The following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxThe following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxssuser454af01
 
ECI Conference Presentation Ray Schick.ppt
ECI Conference Presentation Ray Schick.pptECI Conference Presentation Ray Schick.ppt
ECI Conference Presentation Ray Schick.pptnuredinabdella2
 
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfBhekumuzi Xaba
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudEvan Francen
 
New age of risk for contractors slide presentation
New age of risk for contractors slide presentationNew age of risk for contractors slide presentation
New age of risk for contractors slide presentation1paramount
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Accounting_Whitepapers
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3Habib Ullah Qamar
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Pairat Srivilairit
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisFraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 

Ähnlich wie Protecting Your Organization Against Check and ACH Fraud (20)

Best Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data AnalyticsBest Practices in Detecting Payable Fraud Using Data Analytics
Best Practices in Detecting Payable Fraud Using Data Analytics
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010Fraud In Our Midst, The Acfe 2010
Fraud In Our Midst, The Acfe 2010
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
The following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxThe following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docx
 
ECI Conference Presentation Ray Schick.ppt
ECI Conference Presentation Ray Schick.pptECI Conference Presentation Ray Schick.ppt
ECI Conference Presentation Ray Schick.ppt
 
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
New age of risk for contractors slide presentation
New age of risk for contractors slide presentationNew age of risk for contractors slide presentation
New age of risk for contractors slide presentation
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6Smart devine-act now before its too late-0313-v6
Smart devine-act now before its too late-0313-v6
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 

Mehr von FraudBusters

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudFraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisFraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudFraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisFraudBusters
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyFraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 

Mehr von FraudBusters (20)

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 

Kürzlich hochgeladen

Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...kajalverma014
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...batoole333
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfHenry Tapper
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...priyasharma62062
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxazadalisthp2020i
 
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...sanakhan51485
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdfSalimullah13
 
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai MultipleDubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiplekojalpk89
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...jeffreytingson
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsPriya Reddy
 
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetSareena Khatun
 
Benefits & Risk Of Stock Loans
Benefits & Risk Of Stock LoansBenefits & Risk Of Stock Loans
Benefits & Risk Of Stock LoansMartinRowse
 
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...Call Girls Mumbai
 
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...batoole333
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechFinland
 
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfAdnet Communications
 

Kürzlich hochgeladen (20)

Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
Female Escorts Service in Hyderabad Starting with 5000/- for Savita Escorts S...
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...
Turbhe Fantastic Escorts📞📞9833754194 Kopar Khairane Marathi Call Girls-Kopar ...
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptx
 
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
Escorts Indore Call Girls-9155612368-Vijay Nagar Decent Fantastic Call Girls ...
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdf
 
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai MultipleDubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
 
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
 
Benefits & Risk Of Stock Loans
Benefits & Risk Of Stock LoansBenefits & Risk Of Stock Loans
Benefits & Risk Of Stock Loans
 
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...Vip Call Girls Rasulgada😉  Bhubaneswar 9777949614 Housewife Call Girls Servic...
Vip Call Girls Rasulgada😉 Bhubaneswar 9777949614 Housewife Call Girls Servic...
 
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
Famous Kala Jadu, Black magic expert in Faisalabad and Kala ilam specialist i...
 
Technology industry / Finnish economic outlook
Technology industry / Finnish economic outlookTechnology industry / Finnish economic outlook
Technology industry / Finnish economic outlook
 
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Q1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdfQ1 2024 Conference Call Presentation vF.pdf
Q1 2024 Conference Call Presentation vF.pdf
 
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Tilak Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Protecting Your Organization Against Check and ACH Fraud

  • 1. Protecting Your Organization Against Check and ACH Fraud March 6, 2013 Special Guest Presenter: Paul McCormack, CFE Connectics Copyright © 2013 FraudResourceNet™ LLC About Peter Goldmann, MSc., CFE  President and Founder of White Collar Crime 101 Publisher of White-Collar Crime Fighter Developer of FraudAware® Anti-Fraud Training Monthly Columnist, The Fraud Examiner, ACFE Newsletter  Member of Editorial Advisory Board, ACFE  Author of “Fraud in the Markets” Explains how fraud fueled the financial crisis. Copyright © 2013 FraudResourceNet™ LLC
  • 2. About Jim Kaplan, MSc, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors  Auditor, Web Site Guru, Internet for Auditors Pioneer Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Copyright © 2013 FraudResourceNet™ LLC Paul McCormack, CFE  17 years of fraud, litigation and business consulting experience  Worked directly with agents from federal, state and local law enforcement agencies including the F.B.I., G.B.I., D.E.A., and the Secret Service  Previously managed check fraud detection for SunTrust Banks Copyright © 2013 FraudResourceNet™ LLC
  • 3. Webinar Housekeeping This webinar and its material are the property of AuditNet® and FraudAware®. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We will be recording the webinar and you will be provided access to that recording within five business days after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Please complete the evaluation to help us continuously improve our Webinars. You must answer the polling questions to qualify for CPE per NASBA. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet™ LLC Disclaimers  The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship.  Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC Copyright © 2013 FraudResourceNet™ LLC 5
  • 4. Today’s Agenda             Introduction Fraud Statistics Auditor’s Role in Fraud Detection Check & ACH Fraud Statistics Main Types of Check Fraud Red Flags of Check Fraud How ACH Fraud Occurs Red Flags of ACH Fraud Detecting Check and ACH Fraud Prevention/Control Measures Conclusion Questions Copyright © 2013 FraudResourceNet™ LLC The Auditor’s Role  IPPF Standard 1210.A3  Internal auditors must have sufficient knowledge of…available technology based audit techniques to perform their assigned work Copyright © 2013 FraudResourceNet™ LLC
  • 5. Fraud: The Big Picture According to major accounting firms, professional fraud examiners and law enforcement:  Fraud jumps significantly during tough economic times  Business losses due to fraud increased 20% in last 12 months, from $1.4 million to $1.7 million per billion dollars of sales. (Kroll 2010/2011 Global Fraud Report)  Average cost to for each incident of fraud is $160,000 (ACFE) Of Financial Statement fraud: $2 million  Approx. 60% of corporate fraud committed by insiders (PwC)  Approx. 50% of employees who commit fraud have been with their employers for over 5 years (ACFE) Copyright © 2013 FraudResourceNet™ LLC Check & ACH Fraud Facts  Checks continue to be the dominant payment form targeted by fraudsters  85 percent of companies surveyed reported that checks were targeted  The typical loss associated with payment fraud is $19,200  Most organizations do not automatically change out affected bank accounts associated with payments fraud  Seventy-four percent of organizations maintain separate accounts for different payment methods and types Source: 2012 AFP Payments Fraud and Control Survey Copyright © 2013 FraudResourceNet™ LLC
  • 6. Check & ACH Fraud Facts  Electronic check conversion services continue to experience a very low incidence of fraud (2%), making this service a good choice in helping minimize instances of check fraud.  17% of organizations that were targets of ACH fraud during 2011 suffered a financial loss as a result of such fraud  Positive pay, ACH filters and daily reconciliations are among the methods used to identify exception items that may include fraudulent transactions as well as errors and other rejects due to administrative issues Source: 2012 AFP Payments Fraud and Control Survey Copyright © 2013 FraudResourceNet™ LLC Check & ACH Fraud Facts  The most common reasons victim organizations are financially responsible for the losses sustained from ACH fraud include:  Not reconciling accounts on a timely basis  Not using ACH debit blocks or ACH debit filters  ACH return not being timely  Not using ACH positive pay Source: 2012 AFP Payments Fraud and Control Survey Copyright © 2013 FraudResourceNet™ LLC
  • 7. Polling Question 1 The majority of organizations targeted by ACH fraudsters suffer a financial loss. A. True B. False Copyright © 2013 FraudResourceNet™ LLC Main Types of Check Fraud  Alterations – Chemicals remove or alter the original information inscribed on a check (for example, the payee, the amount etc).  Counterfeit – Check was never issued by the organization, it is a copy (the quality can vary significantly). Check is negotiated and ultimately debited against the organization’s account Copyright © 2013 FraudResourceNet™ LLC
  • 8. Main Types of Check Fraud (cont)  Forged Endorsements / Signatures – Checks are stolen and then endorsed by someone other than the payee that the organization intended to receive the funds. An employee can also steal blank checks and forge official signature  Closed account fraud – Checks written against accounts that are closed and contain no funds Copyright © 2013 FraudResourceNet™ LLC Main Types of Check Fraud (cont)  Kiting - Kiting of funds involves writing checks against deposits that have not cleared. Money appears in two accounts - temporarily  Account takeover – Cyber-fraudster typically steals banking credentials by planting “malware” on target user’s computer. Almost immediately, wires, ACHs and occasionally checks are created. Once the money leaves the account it is laundered through a series of transactions making recovery of the funds all but impossible. Copyright © 2013 FraudResourceNet™ LLC
  • 9. Check Fraud Red Flags  Checks are presented out-of-sequence  Bank’s fraud department routinely calls to verify check fraud suspects  Vendors complain about missing check payments  Canceled check endorsements are illegible or inconsistent  Payees appear to have been altered or do not appear to be business-related Copyright © 2013 FraudResourceNet™ LLC Check Fraud Red Flags  Check contains misspellings, typos, and grammatical errors, or doesn't have a watermark.  Routing transit number (RTN) or ABA number at bottom of the check doesn't accurately include the two sets of numbers on the upper right corner next to the check number. (The RTN or ABA number is the nine-digit code on the bottom of the check).  First three numbers indicate the state and district office of the issuer. These numbers don't coincide on altered checks. Copyright © 2013 FraudResourceNet™ LLC
  • 10. Case Study #1  Kathleen Prince, the former bookkeeper / accountant for the Inner Circle Foster Family Agency received a sentence of 41 months for taking $708,924 from her employer for her personal use.  Prince made checks payable to herself as well as her creditors. She used the funds to pay her personal credit card bills, cell phone bills, and her mortgage. She also used to proceeds from the fraud to pay for a vacation to Hawaii.  To conceal the fraud from the board of directors, Prince altered the agency's accounting records and misrepresented the organization's health to board of directors. Copyright © 2013 FraudResourceNet™ LLC Case Study #1 – Lessons Learned  Check fraud is prevalent in all types of organizations. Charitable organizations are particularly vulnerable as they are unable, or unwilling to invest in additional controls or oversight to prevent it.  If board of directors allows a bookkeeper to control multiple elements of payment process, recording and reconciliation process, the probability that fraud will take place rises dramatically. Copyright © 2013 FraudResourceNet™ LLC
  • 11. Polling Question 2 Writing checks against deposits that have not cleared is a definition of A. B. C. D. Check alterations Closed account fraud Kiting Account takeover E. Copyright © 2013 FraudResourceNet™ LLC Case Study #2  Karen Febles, a former a New York bank employee was charged with stealing $1.8 million from a retired employee of the bank while tasked with managing his personal and professional finances. Between 2007 and 2011, Febles allegedly altered checks for higher amounts that had previously been signed by the account holder  Febles purchased a Range Rover with $52,720 in cash, a Mercedes-Benz with $34,650 in cash, spent approximately $45,000 on vacation cruises, more than $100,000 on real estate, more than $20,000 on other car payments and more than $20,000 on personal expenses Continued … Copyright © 2013 FraudResourceNet™ LLC
  • 12. Case Study #2 – Prevention Lessons  In addition to monitoring employee activities, all organizations should have software in place that monitors customer as well as employee account activity. Employees often mistakenly believe that they can use their personal bank accounts to conduct fraud unobserved.  Febles spent considerable funds on cars, vacations and real estate. It is possible that a fellow employee may have suspected that Febles was committing fraud. Key: If you have not done so already, deploy an anonymous hotline that employees can use to report concerns regarding employees, vendors and customers.  Failure to implement Segregation of Duties can be costly Copyright © 2013 FraudResourceNet™ LLC Polling Question 3 Choose all of the following that could be red flags of check fraud: A. Vendors complain about missing check payments B. Canceled check endorsements are illegible or inconsistent C. Payee name contains a typo D. Payees appear to have been altered or do not appear to be business-related A. Copyright © 2013 FraudResourceNet™ LLC
  • 13. How ACH Fraud Occurs  Very easily!  Need two pieces of data – routing number and bank account number = Corporate account ID theft  Transaction is initiated by fraudster via an Originating Depository Financial Institution (ODFI)  ODFI “batches” transactions and delivered via a clearing house to Receiving Depository Financial Institution  RDFI posts transactions customer accounts  Account holder is unaware of transaction until ACH debit appears in account Copyright © 2013 FraudResourceNet™ LLC ACH Fraud Red Flags  Accounts are experiencing a significant increase in ACH debits (payroll accounts are especially vulnerable)  Unexplained ACH debits for small amounts from unknown vendors  Bank’s fraud department calls to confirm ACH debits  Accounting personnel are unable to reconcile all debit activity in organization accounts Copyright © 2013 FraudResourceNet™ LLC
  • 14. ACH Fraud Notification  Consumers have 60 days to notify their bank. Corporate accounts have 2 days! Important: It is crucial that all accounts are reconciled on a daily basis  Banks routinely deny return requests outside of the 2 day window  Banks will enter litigation to defend their decision Copyright © 2013 FraudResourceNet™ LLC Case Study #3 – ACH Fraud  Mary Harris, a former treasury analyst for Central Parking Corporation, pleaded guilty to her role in an $1.9 million embezzlement.  Harris admitted that in her position she had access to organization bank accounts and the Automated Clearing House (“ACH”) system. Harris processed approximately 200 ACH transactions that deposited funds in her own bank account or the bank accounts of her relatives.  Harris concealed the fraud by making accounting entries in Central Parking’s accounting ledger and creating false emails to support the entries. Copyright © 2013 FraudResourceNet™ LLC
  • 15. Case Study #3 – Lesson Learned  A fraudster only needs two pieces of data - your bank’s routing number and the account number  Payroll accounts are often the destination for fraudulent ACH transactions as the routing number and account number is widely circulated  If your organization’s bank accounts see a significant increase in ACH debits, fraudsters may be testing your ability to detect fraudulent transactions before unleashing a number of debits Copyright © 2013 FraudResourceNet™ LLC Case Study #3 – Prevention Lessons  Don’t ignore calls from your bank’s fraud department. They have considerable “behind the scenes” information regarding what a fraudulent ACH debit looks like  If you cannot reconcile all debit activity in your organization’s accounts, look for reasons for the unreconciled amounts Copyright © 2013 FraudResourceNet™ LLC
  • 16. Case Study #3 – Prevention Lessons (continued)  Companies only have 2 days to notify their bank of a fraudulent ACH. Notify them immediately once detected  Given the short time period within which your organization is required to notify the bank, all accounts should be reconciled on a daily basis. Failure to do so will in automatic denial of any fraud claims made  Banks will often pursue litigation to defend their decision to deny the fraud claim Copyright © 2013 FraudResourceNet™ LLC Case Study #3 – Prevention Lessons (continued)  Since employees most often unwittingly provide fraudsters with the information they need to commit ACH fraud (bank account number & routing number), educate your employees on the dangers of ACH fraud. Helpful: Your bank will likely be able to provide examples of fraudulent phishing emails that criminals have used in the past  Pay attention to ACH fraud cases in the news. Consider whether a similar fraud could take place at your organization?  Designate one computer for all online banking transactions including ACH and wire Copyright © 2013 FraudResourceNet™ LLC
  • 17. Case Study #3 – Prevention Lessons (continued)  Ensure that all of your organization’s computers have robust anti-virus software installed that is kept up to date automatically (no manual intervention to accept update)  Task your organization’s IT department with conducting frequent reviews of the computer designated for online banking to ensure that it remains virus free  To avoid complacency as well as the threat of employee fraud, rotate responsibility for ACH transactions every 6 months Copyright © 2013 FraudResourceNet™ LLC Polling Question 4 Commercial accounts have ______ days to inform the bank of an ACH fraud A. B. C. D. 60 30 2 10 E. Copyright © 2013 FraudResourceNet™ LLC
  • 18. Check & ACH Anti-Fraud Tools  Positive pay and reverse positive pay  Positive pay - Bank will only pay Checks & ACHs that you provide  Reverse positive pay – Bank sends list of Checks & ACHs presented. Your staff reviews payment register to accept or reject  Check & ACH blocks – nothing can be debited  Check & ACH filters – select list of ACH debits allowed (approved companies)  Signature verification – check signatures are reviewed by bank (A service you must pay for to have specific checks reviewed prior to payment).  Dual control for online transactions – two levels of approval  Account alerts – flags unusual transactions Copyright © 2013 FraudResourceNet™ LLC Fraud Prevention – Bank Perspective  Bank must authenticate user as being authorized to access account and initiate transactions  The customer must act in an abnormal manner to be flagged  Transactions that are initiated are consistent with previous transactions, or companies of a similar size  Bank must do all of this while facilitating business for entire customer base  The bank and the corporate customer must work together  What tools does your bank have to detect Check & ACH fraud?  How will they notify you of suspected fraud?  Has your bank “missed” Check & ACH fraud in the past? Relying exclusively on your bank to prevent Check & ACH fraud will result in fraud Copyright © 2013 FraudResourceNet™ LLC
  • 19. Case Study #4 – ACH Fraud  Patricia K. Smith, former controller for Baierl Acura, pleaded guilty to taking $10.2 million from the dealership over a 7 year period. Smith moved money from dealership's business accounts to her personal account using over 800 Automated Clearing Housing (ACH) transfers. Smith used the proceeds to fund:     $1.8 million billed to American Express for private jet charters $44,500 Super Bowl XLV $32,500 for a luncheon for six people prepared by Ina Garten $5,000 for "The Vatican Package," which included Mass in Papal Audience  $2,500 for a Phantom of the Opera experience, including costume fitting, wig fitting, an escort onstage during the Hannibal Opera sequence, and four seats for the performance. Copyright © 2013 FraudResourceNet™ LLC Case Study #4 – Prevention Lessons (continued)  A bookkeeper or controller should never be trusted without verification place in to ensure that they are performing their job. Their work should periodically be reviewed by their manager on at least a monthly basis. From time to time, consider engaging a CPA to conduct a review or audit of their work.  Assuming that your organization's bank will detect and prevent embezzlement is a risky assumption. In the bank's defense, since Smith was an authorized user of the ACH system, it is difficult for the bank to uncover unusual activity in a sea of regular business transactions. Copyright © 2013 FraudResourceNet™ LLC
  • 20. Check & ACH Fraud Prevention Wrap-Up  Educate employees on ACH & Check fraud  Reverse engineer Check and ACH fraud in the news  Provide examples of fraudulent emails used to capture login information - What to look for in a fake website  Consider designating one computer for online banking  Robust anti-virus software that is up to date  Frequent reviews of computer to ensure virus free  Meet with your bank to understand Check & ACH fraud detection and prevention capabilities Copyright © 2013 FraudResourceNet™ LLC Check & ACH Fraud Prevention Wrap Up  Implement robust controls regarding the ordering, receipt and storage of check stock  Perform timely bank account reconciliations  Mail all checks as soon as they are signed  Enhance the “perception of detection” Copyright © 2013 FraudResourceNet™ LLC
  • 21. Check & ACH Fraud Prevention Wrap Up  Segregate duties so that more than one employee is involved in the issuance, recording and reconciliation of payments  Deploy an anonymous employee hotline  Don’t rely upon your bank to uncover embezzlement  Rotate employees involved in the payment process frequently  Mandate that employees use their allotted vacation Copyright © 2013 FraudResourceNet™ LLC Polling Question 5 Choose all the following are effective prevention measures against check and ACH fraud… A. Implement robust controls regarding the ordering, receipt and storage of check stock B. Perform timely bank account reconciliations C. Mail all checks as soon as they are signed D. Enhance the “perception of detection” Copyright © 2013 FraudResourceNet™ LLC
  • 22. Questions?  Any Questions? Don’t be Shy! Copyright © 2013 FraudResourceNet™ LLC Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Paul McCormack CFE paulmccor2008@gmail.com Copyright © 2013 FraudResourceNet™ LLC