SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Tom Ciolkosz
Sarah McConnell
James Foster
Preventing Nonprofit
Banking Fraud and the Tools
You Can Use!
NFP Banking Fraud & Tools for You!
• In the news
• Fraud
 The fraud triangle
 Internal controls
• Protecting your online environment
• Banking financial fraud
• Tools for you!
• Checklist
• Resources
Data Breach Headlines
Washington Post
Inside the hidden world of thefts, scams and phantom purchases at the
nation’s nonprofits
∙ For 14 years, the American Legacy Foundation has managed
hundreds of millions of dollars drawn from a government settlement
with big tobacco companies, priding itself on funding vital health
research and telling the unadorned truth about the deadly effects of
smoking.
∙ Yet the foundation, located just blocks from the White House, was
restrained when asked on a federal disclosure form whether it had
experienced an embezzlement or other “diversion” of its assets.
By Joe Stephens and Mary Pat Flaherty October 26, 2013
Washington Post
Inside the hidden world of thefts, scams and phantom purchases at the
nation’s nonprofits
∙ Legacy officials typed “yes” on Page 6 of their 2011 form and provided a six-
line explanation 32 pages later, disclosing that they “became aware” of a
diversion “in excess of $250,000 committed by a former employee.” They
wrote that the diversion was due to fraud and now say they believe they
fulfilled their disclosure requirement.
Washington Post
Inside the hidden world of thefts, scams and phantom purchases at the
nation’s nonprofits
∙ Records and interviews reveal the full story: an estimated $3.4
million loss, linked to purchases from a business described
sometimes as a computer supply firm and at others as a barbershop,
and to an assistant vice president who now runs a video game
emporium in Nigeria.
∙ Also not included in the disclosure report: details about how Legacy
officials waited nearly three years after an initial warning before they
called in investigators.
Question #1
Have you experienced fraud in your
organization or personal life?
What is Fraud?
Fraud is a deception deliberately practiced in order to
secure unfair or unlawful gain (adjectival form fraudulent;
to defraud is the verb).
The two main types of fraud
• Misappropriation of assets – theft of company's assets
• Fraudulent financial reporting – misrepresentations in
financial reports
How Prevalent is Fraud?
• 10% of fraud occur in
not-for-profit
organizations
• It typically lasts 18 months
• Approximately 55% were
committed by single
individuals
• Median loss of $100,000
∙ Statistics ∙ Primary Areas of Weaknesses*
• Lack of Controls
• Override of Existing Controls
• Lack of Management review
• Poor Tone at the top
*One of these factors was present in over
80% of the cases studied
* According to the Association of Certified Fraud Examiners
What are the Clues?
Behavioral Red Flags
• Living beyond means
• Refusal to take vacation
• Unwillingness to share duties
Unique Challenges to Non-Profits
More trusting culture
Lack of financial expertise in management positions
Lack of resources
Red Flags!
• Living beyond means
• Refusal to take vacation
• Unwillingness to share duties
What Can You Do – Internal
Controls!!
 Two types of internal controls
• Deterrence
• Detection
Question #2
What are your best practices for fraud
detection and deterrence?
Protecting Your Online Environment
Harvesting Information through Social
Media
Social Engineering: Phishing
Phishing, relates to acquiring that confidential
information by masquerading as a trustworthy
entity in an electronic communication.
Watch to watch for:
• Links to email
• Spelling and grammar
• Popular Company
• Urgency
Spoofing, is when a spammer sends out emails
using your email address in the From: field. The
idea is to make it seem like the message is from
you.
What to watch for:
You see mailer daemon error messages (returned
emails) in your inbox that do not match any
messages you sent
You get messages from people who received
email from you that you did not send.
Social Engineering: Spoofing
What is a Keylogger?
Whether it is called a keylogger, spyware or
monitoring software, it can be the equivalent
of digital surveillance, revealing every click and
touch, every download and conversation.
Malicious intent:
• Account information
• Credit card numbers
• User names
• Passwords
Keystroke Logging
Question #3
Have you ever experienced a social
engineering scheme?
Protect your online environment
∙ Be sure your bank uses a Two-factor authentication process. The best
way to utilize a two factor authentication communication is:
• Email
• Cell Phone
• Phone
Further Controls
∙ Educate your employees
∙ A strong security program should be paired with
employee education about the warning signs and safe
practices that you can implement.
∙ The best secure password is:
• Password
• 1234
• May2009marie
• S97@fde
Banking Financial Fraud
Check Fraud
Another way is for the fraudsters to get access to your
money is to create counterfeit checks through
stealing your check stock or obtaining a legitimate
check and copying it.
Solution:
Check Positive Pay - This is an antifraud service
offered by banks to help protect businesses against
fraud from altered and counterfeit checks. Positive
pay assists in the creation, transmission, and research
of check records sent to the bank for payment.
Fraudulent Check
What's Different?
$210.00
Problem:
Through remote deposit capture or mobile phone
deposit technology, check fraud involves individuals
double debiting. For example, an organization issues a
check to an individual and the individual deposits the
check through a scanner or smartphone.
The individual then quickly takes it to another bank to
cash it. Both transactions flow through the check
clearing process, which could result in the account
being debited twice. This could go undiscovered until
the account is reconciled.
Check Deposit Fraud
ACH Fraud
Problem:
The fraudster targets nonprofit organization accounts in search of
bigger payouts. Fraudsters will steal online banking credentials by
hacking computer networks and installing key logging software or
malware.
Once the thief has the right credentials, they can access the
organization's accounts and send out wires or ACH’s to another
country and into their own bank accounts.
Solution:
ACH Positive Pay - This allows clients to assign filtering or blocking
services to various accounts based on company IDs, standard entry
class codes, and dollar amounts.
Credit Card Fraud
∙ DVM Chip
• Change in laws
∙ Fraudulent transactions
∙ Inventory and review of cards
• Count
• Physical location
• Limited use
Question #4
Has anyone has a corporate or personal credit
card compromise? What about a bank
account?
Question #5
What controls do you have in place to prevent
bank fraud?
Pay attention and react quickly
∙ Look out for unexplained account or network activity, pop ups, and
suspicious emails. If detected, immediately contact your financial
institution, stop all online activity and remove any systems that may
have been compromised.
∙ Also consider ACH and Positive Pay
∙ Do you perform bank reconciliation on your operating account?
• Monthly
• Weekly
• Daily
• Quarterly
Understand your responsibilities and
liabilities
The Electronic Funds Transfer Act (EFT),
also known as Regulation E, was implemented in the U.S. in 1978 to establish the
rights and liabilities of consumers as well as the responsibilities of the financial
institution in EFT activities.
Regulation E covers a consumer under certain conditions, limiting loss to $50 if the
institution is notified within two business days.
There currently are no similar loss protections for commercial customers
The account agreement with your bank will detail what commercially
reasonable security measures are required by your organization.
What can you do tomorrow?
Talk to your IT department
• How are you protected from phishing, keystroke logging,
etc.?
• What training can you regularly give your employees?
• What is your password policy?
Talk to your bank
• Is Positive Pay available?
• Do they offer credit card protection?
What can you do tomorrow?
Review your internal controls (now and at least annually)
• Bank reconciliations
• Vacation policy
• Segregation of duties
• Credit card use
What is your culture for sharing fraud concerns? What is the
tone at the top?
Questions
36
Resources
You can also visit the following websites to learn more about how to protect your
nonprofit organization:
• Johnson Lambert LLP website: www.johnsonlambert.com
• Access National Bank website: www.accessnationalbank.com
• ACFE Fraud Prevention:
http://www.acfe.com/uploadedFiles/ACFE_Website/Content/documents/Fraud_Pre
v_Checkup_DL.pdf
• Greater Washington Society of CPAs: Nonprofit Accounting Basics:
http://www.nonprofitaccountingbasics.org/topic/internal-controls
• Federal Communications Commission: 10 Cybersecurity Strategies for
Small Business
https://www.uschamber.com/sites/default/files/legacy/issues/defense/files/10_
CYBER_Strategies_for_Small_Biz.pdf
Thank you for your participation!
Sarah McConnell
Principal
Johnson Lambert LLP
smcconnell@johnsonlambert.com
James Foster
CFO
Northern Virginia Association of Realtors
jfoster@nvar.com
Tom Ciolkosz
Vice President
Commercial Banker
Access National Bank
tomciolkosz@accessnationalbank.com

Weitere ähnliche Inhalte

Was ist angesagt?

Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpointmortgagerateutah
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Dinidu Weeraratne
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...central university of rajasthan
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Analysis of Frauds in Indian Banking Sector
Analysis of Frauds in Indian Banking SectorAnalysis of Frauds in Indian Banking Sector
Analysis of Frauds in Indian Banking Sectorijtsrd
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
Banking frauds presentation farrukh
Banking frauds presentation farrukhBanking frauds presentation farrukh
Banking frauds presentation farrukhMirza Farrukh Baig
 
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...inventionjournals
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International PerspectiveSteve Mitchinson
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 
KYC AML regulation in EU
KYC AML regulation in EUKYC AML regulation in EU
KYC AML regulation in EUMuthu Siva
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 

Was ist angesagt? (19)

Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Fraud forgery and scams powerpoint
Fraud forgery and scams powerpointFraud forgery and scams powerpoint
Fraud forgery and scams powerpoint
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Identity Theft Information for Businesses
Identity Theft Information for BusinessesIdentity Theft Information for Businesses
Identity Theft Information for Businesses
 
Banking servics
Banking servicsBanking servics
Banking servics
 
Analysis of Frauds in Indian Banking Sector
Analysis of Frauds in Indian Banking SectorAnalysis of Frauds in Indian Banking Sector
Analysis of Frauds in Indian Banking Sector
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Banking frauds presentation farrukh
Banking frauds presentation farrukhBanking frauds presentation farrukh
Banking frauds presentation farrukh
 
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
KYC AML regulation in EU
KYC AML regulation in EUKYC AML regulation in EU
KYC AML regulation in EU
 
Aml & kyc
Aml & kyc Aml & kyc
Aml & kyc
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 

Ähnlich wie Preventing Nonprofit Banking Fraud and the Tools You Can Use!

Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudEvan Francen
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfssuser7464571
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detectingscstatelibrary
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud Dixita S
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionSpringboard
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameSpringboard
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 

Ähnlich wie Preventing Nonprofit Banking Fraud and the Tools You Can Use! (20)

ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detecting
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 

Kürzlich hochgeladen

Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一S SDS
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technologyz xss
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdfmar yame
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证jdkhjh
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfshaunmashale756
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Sonam Pathan
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...Amil baba
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...Amil baba
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...Amil Baba Dawood bangali
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 

Kürzlich hochgeladen (20)

Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
(办理学位证)美国加州州立大学东湾分校毕业证成绩单原版一比一
 
212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology212MTAMount Durham University Bachelor's Diploma in Technology
212MTAMount Durham University Bachelor's Diploma in Technology
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
Managing Finances in a Small Business (yes).pdf
Managing Finances  in a Small Business (yes).pdfManaging Finances  in a Small Business (yes).pdf
Managing Finances in a Small Business (yes).pdf
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
原版1:1复刻堪萨斯大学毕业证KU毕业证留信学历认证
 
government_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdfgovernment_intervention_in_business_ownership[1].pdf
government_intervention_in_business_ownership[1].pdf
 
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
Call Girls Near Golden Tulip Essential Hotel, New Delhi 9873777170
 
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
NO1 Certified Amil Baba In Lahore Kala Jadu In Lahore Best Amil In Lahore Ami...
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
NO1 WorldWide Love marriage specialist baba ji Amil Baba Kala ilam powerful v...
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
NO1 WorldWide online istikhara for love marriage vashikaran specialist love p...
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 

Preventing Nonprofit Banking Fraud and the Tools You Can Use!

  • 1. Tom Ciolkosz Sarah McConnell James Foster Preventing Nonprofit Banking Fraud and the Tools You Can Use!
  • 2. NFP Banking Fraud & Tools for You! • In the news • Fraud  The fraud triangle  Internal controls • Protecting your online environment • Banking financial fraud • Tools for you! • Checklist • Resources
  • 4. Washington Post Inside the hidden world of thefts, scams and phantom purchases at the nation’s nonprofits ∙ For 14 years, the American Legacy Foundation has managed hundreds of millions of dollars drawn from a government settlement with big tobacco companies, priding itself on funding vital health research and telling the unadorned truth about the deadly effects of smoking. ∙ Yet the foundation, located just blocks from the White House, was restrained when asked on a federal disclosure form whether it had experienced an embezzlement or other “diversion” of its assets. By Joe Stephens and Mary Pat Flaherty October 26, 2013
  • 5. Washington Post Inside the hidden world of thefts, scams and phantom purchases at the nation’s nonprofits ∙ Legacy officials typed “yes” on Page 6 of their 2011 form and provided a six- line explanation 32 pages later, disclosing that they “became aware” of a diversion “in excess of $250,000 committed by a former employee.” They wrote that the diversion was due to fraud and now say they believe they fulfilled their disclosure requirement.
  • 6. Washington Post Inside the hidden world of thefts, scams and phantom purchases at the nation’s nonprofits ∙ Records and interviews reveal the full story: an estimated $3.4 million loss, linked to purchases from a business described sometimes as a computer supply firm and at others as a barbershop, and to an assistant vice president who now runs a video game emporium in Nigeria. ∙ Also not included in the disclosure report: details about how Legacy officials waited nearly three years after an initial warning before they called in investigators.
  • 7. Question #1 Have you experienced fraud in your organization or personal life?
  • 8. What is Fraud? Fraud is a deception deliberately practiced in order to secure unfair or unlawful gain (adjectival form fraudulent; to defraud is the verb). The two main types of fraud • Misappropriation of assets – theft of company's assets • Fraudulent financial reporting – misrepresentations in financial reports
  • 9. How Prevalent is Fraud? • 10% of fraud occur in not-for-profit organizations • It typically lasts 18 months • Approximately 55% were committed by single individuals • Median loss of $100,000 ∙ Statistics ∙ Primary Areas of Weaknesses* • Lack of Controls • Override of Existing Controls • Lack of Management review • Poor Tone at the top *One of these factors was present in over 80% of the cases studied * According to the Association of Certified Fraud Examiners
  • 10. What are the Clues?
  • 11. Behavioral Red Flags • Living beyond means • Refusal to take vacation • Unwillingness to share duties
  • 12. Unique Challenges to Non-Profits More trusting culture Lack of financial expertise in management positions Lack of resources Red Flags! • Living beyond means • Refusal to take vacation • Unwillingness to share duties
  • 13. What Can You Do – Internal Controls!!  Two types of internal controls • Deterrence • Detection
  • 14. Question #2 What are your best practices for fraud detection and deterrence?
  • 15. Protecting Your Online Environment
  • 17. Social Engineering: Phishing Phishing, relates to acquiring that confidential information by masquerading as a trustworthy entity in an electronic communication. Watch to watch for: • Links to email • Spelling and grammar • Popular Company • Urgency
  • 18.
  • 19. Spoofing, is when a spammer sends out emails using your email address in the From: field. The idea is to make it seem like the message is from you. What to watch for: You see mailer daemon error messages (returned emails) in your inbox that do not match any messages you sent You get messages from people who received email from you that you did not send. Social Engineering: Spoofing
  • 20. What is a Keylogger? Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every click and touch, every download and conversation. Malicious intent: • Account information • Credit card numbers • User names • Passwords Keystroke Logging
  • 21. Question #3 Have you ever experienced a social engineering scheme?
  • 22. Protect your online environment ∙ Be sure your bank uses a Two-factor authentication process. The best way to utilize a two factor authentication communication is: • Email • Cell Phone • Phone
  • 23. Further Controls ∙ Educate your employees ∙ A strong security program should be paired with employee education about the warning signs and safe practices that you can implement. ∙ The best secure password is: • Password • 1234 • May2009marie • S97@fde
  • 25. Check Fraud Another way is for the fraudsters to get access to your money is to create counterfeit checks through stealing your check stock or obtaining a legitimate check and copying it. Solution: Check Positive Pay - This is an antifraud service offered by banks to help protect businesses against fraud from altered and counterfeit checks. Positive pay assists in the creation, transmission, and research of check records sent to the bank for payment.
  • 27. Problem: Through remote deposit capture or mobile phone deposit technology, check fraud involves individuals double debiting. For example, an organization issues a check to an individual and the individual deposits the check through a scanner or smartphone. The individual then quickly takes it to another bank to cash it. Both transactions flow through the check clearing process, which could result in the account being debited twice. This could go undiscovered until the account is reconciled. Check Deposit Fraud
  • 28. ACH Fraud Problem: The fraudster targets nonprofit organization accounts in search of bigger payouts. Fraudsters will steal online banking credentials by hacking computer networks and installing key logging software or malware. Once the thief has the right credentials, they can access the organization's accounts and send out wires or ACH’s to another country and into their own bank accounts. Solution: ACH Positive Pay - This allows clients to assign filtering or blocking services to various accounts based on company IDs, standard entry class codes, and dollar amounts.
  • 29. Credit Card Fraud ∙ DVM Chip • Change in laws ∙ Fraudulent transactions ∙ Inventory and review of cards • Count • Physical location • Limited use
  • 30. Question #4 Has anyone has a corporate or personal credit card compromise? What about a bank account?
  • 31. Question #5 What controls do you have in place to prevent bank fraud?
  • 32. Pay attention and react quickly ∙ Look out for unexplained account or network activity, pop ups, and suspicious emails. If detected, immediately contact your financial institution, stop all online activity and remove any systems that may have been compromised. ∙ Also consider ACH and Positive Pay ∙ Do you perform bank reconciliation on your operating account? • Monthly • Weekly • Daily • Quarterly
  • 33. Understand your responsibilities and liabilities The Electronic Funds Transfer Act (EFT), also known as Regulation E, was implemented in the U.S. in 1978 to establish the rights and liabilities of consumers as well as the responsibilities of the financial institution in EFT activities. Regulation E covers a consumer under certain conditions, limiting loss to $50 if the institution is notified within two business days. There currently are no similar loss protections for commercial customers The account agreement with your bank will detail what commercially reasonable security measures are required by your organization.
  • 34. What can you do tomorrow? Talk to your IT department • How are you protected from phishing, keystroke logging, etc.? • What training can you regularly give your employees? • What is your password policy? Talk to your bank • Is Positive Pay available? • Do they offer credit card protection?
  • 35. What can you do tomorrow? Review your internal controls (now and at least annually) • Bank reconciliations • Vacation policy • Segregation of duties • Credit card use What is your culture for sharing fraud concerns? What is the tone at the top?
  • 37. Resources You can also visit the following websites to learn more about how to protect your nonprofit organization: • Johnson Lambert LLP website: www.johnsonlambert.com • Access National Bank website: www.accessnationalbank.com • ACFE Fraud Prevention: http://www.acfe.com/uploadedFiles/ACFE_Website/Content/documents/Fraud_Pre v_Checkup_DL.pdf • Greater Washington Society of CPAs: Nonprofit Accounting Basics: http://www.nonprofitaccountingbasics.org/topic/internal-controls • Federal Communications Commission: 10 Cybersecurity Strategies for Small Business https://www.uschamber.com/sites/default/files/legacy/issues/defense/files/10_ CYBER_Strategies_for_Small_Biz.pdf
  • 38. Thank you for your participation! Sarah McConnell Principal Johnson Lambert LLP smcconnell@johnsonlambert.com James Foster CFO Northern Virginia Association of Realtors jfoster@nvar.com Tom Ciolkosz Vice President Commercial Banker Access National Bank tomciolkosz@accessnationalbank.com