Fraud in the Church High Tech Style

Size: px
Start display at page:

Download "Fraud in the Church High Tech Style"

Transcription

1 Sunday, July 3, 2011 Fraud in the Church High Tech Style C9 1:00 PM 2:45 PM D9 (Repeat) 3:45 PM 5:30 PM Location Potomac 1 Fraud in the Church High Tech Style Verne Hargrave MBA, CPA, CFE Just as the nature of business transactions has changed due to the vast advances in technology, so, too, does the nature of fraud risk. No longer can churches rely solely on strong controls over offering count teams, check writing, and payroll processes in fraud prevention. A new threat is growing exponentially cyber fraud! A brief introduction to the fundamentals of fraud prevention will be followed by an in-depth discussion of four current cyber threats threatening churches. As each fraud technique is discussed, practical prevention techniques will be presented. Verne Hargrave is a Certified Fraud Examiner as well as a CPA.He joined PSK in 1978 and has been a shareholder since He concentrates in the area of not-for-profit organizations, principally churches and Christian ministries. He oversees and conducts numerous church audits and supervises the church accounting services department of PSK. Verne is a member of NACBA, and is a frequent speaker at various church and ministry-related seminars. He earned his BBA in accounting at the University of Texas at Arlington, in 1976, and obtained his CPA certificate in May In addition to his public accounting career, Verne served as a bi-vocational pastor at Grace Street Fellowship in Arlington, Texas, from 1993 to Verne is also author of Weeds in the Garden: The Growing Danger of Fraud Taking Root in the Church published by NACBA Press. Contact information: Verne Hargrave verne@pskcpa.com

2 Fraud in the Church High-Tech Style

3 The landscape of church and nonprofit organization fraud Not-for-profit organizations accounted for 9.6% of reported fraud incidents. Religious organizations accounted for 2.3% of reported cases. (2010 ACFE Report to the Nation on Occupational Fraud & Abuse) The median loss for nonprofit organizations amounted to $90,000. Median loss for religious organizations - $75,000. Organizations with fewer than 100 employees accounted for 31% of reported cases with a median loss of $155,000. Asset misappropriation accounted for the vast majority (90%) of all reported cases o Skimming 14.5%, $60,000 median loss o Cash theft 10%, $100,000 median loss o Expense reimbursements 15%, $33,000 median loss o Check tampering 13%, $131,000 median loss o Payroll 8.5%, $72,000 median loss o Cash on hand 12.6%, $23,000 median loss o Non-cash assets 16%, $90,000 median loss 2

4 Fraud Basics What is occupational fraud? Fraudulent Financial Reporting Intentional misstatements in financial reports. Examples: Inflated revenues or assets to meet targets established by a lender. Inflated contribution substantiation forms to generate fictitious tax deductions. Misleading payroll information generated to reduce taxable income or increase withholdings. Misappropriation of Assets The stealing or misuse of organization assets. Corruption The selling of influence through bribes, kickbacks, etc. 3

5 Fraud Basics Three ingredients of fraud PRESSURE RATIONALIZATION OPPORTUNITY 4

6 Four Versions of High-Tech Fraud Electronic Funds Transfer (EFT) Frauds - Criminals surreptitiously obtain banking credentials by hacking into a church computer, and stealing money from the church bank accounts. Identity Theft - Within the information technology system of most churches resides a treasure trove of information coveted by fraudsters. This information includes names, addresses, birthdates and in some cases, banking information of their members. Churches have a fiduciary responsibility to protect this data from misuse. Computer Forgery - A new generation of check forgers has emerged with the advent of the computer. Assisted by scanners, color printers and graphics software, forging checks has become much easier to accomplish and difficult to detect. Data Input Manipulation - Input manipulation is the most common form of computer crime due to the fact that it does not require sophisticated computer knowledge on the part of the perpetrator. With few controls, fraudsters can create forged documents (Contribution substantiation forms for example) or cover the tracks of other thefts they may have committed. 5

7 Electronic Funds Transfer (EFT) Frauds The Headlines: Over a weekend, a Catholic Diocese was the victim of a $600,000 ACH fraud theft. The church said it was victimized by criminals who illegally obtained its banking information in order to transfer funds to several money mules scattered across the United States. The diocese is but the latest of many such incidents targeting mid-level targets. According to FBI spokesmen, mid-level organizations don t have the same level of scrutiny that major organizations go through, and they are both less protected and less aware of the dangers. What Happened? How the criminals got the Diocese s banking credentials was never fully determined. Law enforcement officials say the Diocese seems to have been the victim of a highly sophisticated operation, most likely based overseas, which engages participation of individuals who unknowingly act as intermediaries of the funds obtained by theft. What made it possible? Lack of an adequate separation of duties Lack of oversight Poor reconciliation procedures 6

8 How to keep it from happening in your church Use dual controls in transacting ACH and wire transfer payments Execute all online banking activities from a dedicated, standalone and completely locked-down computer system from where and Web browsing are not possible Limit administrative rights on users workstations to prevent inadvertent downloading of malware Reconcile all banking transactions on a DAILY basis 7

9 Identity Theft The Headlines: Computer hackers (who have never been identified) used a computer virus to access a church s information system. The thieves were able to obtain the church s EIN number, bank information including account numbers, routing numbers, and authorized check signers and personal data of church membership. The information was used to apply for loans, open credit cards, and access the church s and its members bank accounts. What Happened? The virus was introduced by the opening of an containing an infected attachment or pop-up. Once inside, the virus Copied the church s computer hard drive Transported the files to an obscure website, probably offshore 8

10 The files were reviewed by the criminals in a search for sensitive information such as: Employer Identification Number Bank account numbers Routing details Check signatures Scanned checks Scanned bank statements Also could have used a key logger to obtain user names and passwords. Once obtained, the hackers accessed the church bank accounts and helped themselves to the church s funds. What made it possible? Careless opening of s Browsing of unsecured websites Personal USB (external) drives Manually loaded by an insider 9

11 How to keep it from happening in your church Firewalls Utilize software that regulates access to the church s information system. Common providers: Cisco CheckPoint Sonic Wall Fortinet Watchguard Anti-virus Utilize scanning software to detect the presence of a virus. Scanning should be network wide, including servers, computers, and external drives. Common providers: Norton McAfee Trend Vipre Penetration Test Engage a third-party provider to test the church s firewall at least once every six months. Physical Security Keep your servers in a LOCKED room! 10

12 Passwords Use complex passwords: Twenty characters Combine alpha, numeric, caps and special characters Incorporate limited attempt access Administration Develop AND follow a written IT policy Educate the church staff about: The danger of unfamiliar s, pop-ups, downloads and browsing questionable websites. 11

13 The Headlines: Computer Forgery Three members of a counterfeit check ring conspiracy were sentenced for running a two-year fraud scheme that caused more than $50,000 in losses. According to evidence introduced during the trial, from 2007 through 2010, the perpetrators engaged in a scheme to create and pass counterfeit company checks at various banks throughout the area. What Happened? The criminals recruited dozens of individuals to provide copies of legitimate checks that were then used to create counterfeit checks by using computers and laser printers. Other individuals were recruited to present and cash the counterfeit checks at various financial institutions and other businesses. The perpetrators also recruited people to open bank accounts at various financial institutions. The accounts were used to cash counterfeit checks. The fraudsters also promised and provided payment to these individuals for their participation in cashing counterfeit checks. 12

14 What made it possible? Lack of a proper segregation of accounting and check paying duties Lack of security over check stock How to keep it from happening in your church Keep your blank check stock under lock and key! Use checks with embedded security features Utilize Positive Pay services provided by the church s bank Conduct intense bank reconciliation procedures which include an inspection of cancelled checks. (Front and back) 13

15 The Headlines: Data Input Manipulation A church financial secretary was charged with embezzling more than $250,000. She was accused of devising a scheme to defraud using the U.S. Mail to send payments for her own bills and credit card purchases. The perpetrator, who had access to all modules of her church s information system, covered her tracks by doctoring vendor information, payroll records and charitable contribution substantiation reports. What Happened? The perpetrator wrote church checks to cover her personal bills and credit card charges. She then manipulated the cash disbursement register by changing vendor names to normal church vendors. After realizing that her re-directed cash expenditures had become excessive, she allocated her illicit expenditures in small amounts to various budget line items. Realizing that excess cash had accumulated in the church s payroll bank account, she drained the account by doctoring payroll information in the form of phantom employees. 14

16 Feeling guilty about the size of her theft, the financial secretary began to pay back the stolen money. To cover this inflow, she created phantom contributors and generated phony contribution substantiation reports. What made it possible? Absence of proper segregation of duties in the bill paying process Failure to partition the various IT system modules No well defined bill approval process Lack of adequate oversight over financial reporting How to keep it from happening in your church Implement an independent, extensive review of bank account reconciliations Adopt a formal vendor application process Implement regular communication with vendors Perform periodic payroll audits Consider implementing an occasional confirmation of charitable contributions exercise 15

17 Conduct an exhaustive review of budget reports: Budget to actual analysis On a test basis, compare general ledger detail to budget line items Perform an independent review of journal entries Perform periodic review of cash disbursement activity 16

18 Contact Information Verne Hargrave MBA, CPA, CFE PSK LLP 3001 Medlin Drive Suite 100 Arlington, Texas Fax verne.hargrave@pskcpa.com 17

Fraud in the Church What the Survey Tells Us

Fraud in the Church What the Survey Tells Us Thursday, July 12, 2012 Fraud in the Church What the Survey Tells Us C9 1:00 PM 2:45 PM D9 (Repeat) 3:45 PM 5:30 PM Location Room 336 Using survey results, this session assesses the depth of churches awareness

More information

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and

More information

Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine

Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine 1 Dear Nonprofit Leader, The single greatest asset of a nonprofit is arguably its reputation. When theft or misappropriation of assets

More information

Fraud and internal controls, Part 3: Internal fraud schemes

Fraud and internal controls, Part 3: Internal fraud schemes Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.

Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit. Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner tstrause@fosaudit.com 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current

More information

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations

More information

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the

More information

Guidelines for Congregations Internal Control Best Practices

Guidelines for Congregations Internal Control Best Practices Guidelines for Congregations Internal Control Best Practices A resource provided by the Office of the Treasurer of the Evangelical Lutheran Church in America In order to exercise good stewardship and care

More information

Banking Solutions for Nonprofits 101. Four Money Saving Strategies for Nonprofits with Bank Products

Banking Solutions for Nonprofits 101. Four Money Saving Strategies for Nonprofits with Bank Products Banking Solutions for Nonprofits 101 Four Money Saving Strategies for Nonprofits with Bank Products Understanding Bank Options for Nonprofit Organizations What type of accounts are available for Nonprofits

More information

Safeguarding Your information and accounts

Safeguarding Your information and accounts Safeguarding Your information and accounts D Bank with confidence The security of your funds and information is a top priority at Liberty Bank. We do our utmost every day to prevent fraud and identity

More information

Torn Identity: Preventing New Forms of Corporate Identity Theft

Torn Identity: Preventing New Forms of Corporate Identity Theft Torn Identity: Preventing New Forms of Corporate Identity Theft Bonnie J. Hertz, CTP Cash Manager North Pacific Group, Inc. Greg Hansen VP, Product Management Wells Fargo Bank 1 Agenda Overview of fraud

More information

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception

More information

Fraud Prevention Checklist for Small Businesses

Fraud Prevention Checklist for Small Businesses Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can

More information

Questions You Should be Asking NOW to Protect Your Business!

Questions You Should be Asking NOW to Protect Your Business! Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional

More information

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing

More information

5 Important Controls to Mitigate Employee Fraud

5 Important Controls to Mitigate Employee Fraud 5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

1. SEGREGATION OF DUTIES IS ESSENTIAL

1. SEGREGATION OF DUTIES IS ESSENTIAL The way a church handles money can present a positive or negative witness. Churches need to be diligent in handling money to encourage integrity and positive Biblical stewardship. Every step should be

More information

Help Protect Your Firm and Clients from Cyber Fraud

Help Protect Your Firm and Clients from Cyber Fraud One Step Ahead: Help Protect Your Firm and Clients from Cyber Fraud Actions for advisors and investors to consider In Brief: Threats grow more sophisticated: Just as technology advances, so do the tools

More information

Fraud Prevention: The Prevention and Detection of Fraud Begins with You

Fraud Prevention: The Prevention and Detection of Fraud Begins with You Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies

More information

Sobel & Co. s Nonprofit and Social Services Group presents. Your Organization is Vulnerable: The Facts About Nonprofits and Fraud

Sobel & Co. s Nonprofit and Social Services Group presents. Your Organization is Vulnerable: The Facts About Nonprofits and Fraud Sobel & Co. s Nonprofit and Social Services Group presents Your Organization is Vulnerable: The Facts About Nonprofits and Fraud Why Smart People Do Dumb Things If you are above average intelligence -

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes

More information

Kesef Accounting Service. USCJ Webinar March 24, 2015 Securing your assets is more than locking the doors

Kesef Accounting Service. USCJ Webinar March 24, 2015 Securing your assets is more than locking the doors Kesef Accounting Service USCJ Webinar March 24, 2015 Securing your assets is more than locking the doors Kesef Accounting Service There are two primary ways to improve internal controls * Add more staff

More information

Alternatives for Managing Commercial Payments Risk

Alternatives for Managing Commercial Payments Risk Alternatives for Managing Commercial Payments Risk FDIC Symposium Arlington, VA May 11, 2010 Deborah Shaw Managing Director, Network Enforcement & Risk Management NACHA The Electronic Payments Association

More information

CHECK FRAUD. Federal Reserve System

CHECK FRAUD. Federal Reserve System CHECK FRAUD Federal Reserve System Check fraud affects every financial institution, every business, and every individual throughout the United States and around the world. Industry sources estimate that

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

Leonard W. Vona, CPA, CFE

Leonard W. Vona, CPA, CFE Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: lwvcfe@aol.com Part of an auditor s job is

More information

Accounts Payable Best Practices

Accounts Payable Best Practices Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can

More information

CHAPTER 5 COMPUTER FRAUD AND SECURITY

CHAPTER 5 COMPUTER FRAUD AND SECURITY CHAPTER 5 COMPUTER FRAUD AND SECURITY Overview Information systems are becoming increasingly more complex and society is becoming increasingly more dependent on these systems. Companies also face a growing

More information

716 West Ave Austin, TX 78701-2727 USA

716 West Ave Austin, TX 78701-2727 USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the

More information

Internal Controls over Cash for Small Nonprofits

Internal Controls over Cash for Small Nonprofits Internal Controls over Cash for Small Nonprofits Internal controls may be a sensitive issue in small nonprofit organizations. These organizations are built on the concepts of honesty, truthfulness, and

More information

Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements

Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements Economic Crime and the Online World 22 nd Annual ECI Conference November 2, 2011 Moderator: Bernard Hyman Jr., Esq. (315)

More information

FRAUD RISK ASSESSMENT

FRAUD RISK ASSESSMENT FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by

More information

Steven Boyer Vice-President, Gallagher Bassett Services Inc.

Steven Boyer Vice-President, Gallagher Bassett Services Inc. Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud

More information

How To Handle A Fraud At Psc

How To Handle A Fraud At Psc FRAUD POLICY Purpose and Background PSC is committed to the highest standards of moral and ethical behavior. The purpose of PSC s Fraud Policy is to foster an environment that promotes awareness to fraudulent

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center

MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948

More information

Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer

Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association

More information

The policy and procedural guidelines contained in this handbook are designed to:

The policy and procedural guidelines contained in this handbook are designed to: BASIC POLICY STATEMENT The Mikva Challenge is committed to responsible financial management. The entire organization including the board of directors, administrators, and staff will work together to make

More information

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D.

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D. Top Five Employee Fraud Schemes Forensic Solutions, LLC Forensic accounting and litigation support services Presented by: Thomas Buckhoff, Ph.D., CPA/CFF, CFE Fraudsters love cash! Cash is the asset most

More information

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,

More information

Guidelines for Congregations Internal Control Best Practices

Guidelines for Congregations Internal Control Best Practices Guidelines for Congregations Internal Control Best Practices A resource provided by the Office of the Treasurer of the Evangelical Lutheran Church in America Congregations should establish and maintain

More information

2008 Report to the Nation

2008 Report to the Nation 2008 Report to the Nation on Occupational Fraud & Abuse Letter from the President When the Association of Certified Fraud Examiners was founded 20 years ago, we knew that occupational fraud was a significant

More information

Reliance Bank Fraud Prevention Best Practices

Reliance Bank Fraud Prevention Best Practices Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.

More information

Sharon Kurek, CPA, CFE Director of Internal Audit

Sharon Kurek, CPA, CFE Director of Internal Audit Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness

More information

Payments Fraud Best Practices

Payments Fraud Best Practices Stephen W. Markwell Disbursements Product Executive J.P. Morgan Pamela R. Malmos Director Finance, Treasury Operations ConAgra Foods, Inc. Fraud Prevention Laura Howley, CTP Director, Global Treasury Operations

More information

Office of the Inspector General

Office of the Inspector General Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April

More information

by: Scott Baranowski, CIA

by: Scott Baranowski, CIA Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf

More information

Phishing for Fraud: Don't Let your Company Get Hooked!

Phishing for Fraud: Don't Let your Company Get Hooked! Phishing for Fraud: Don't Let your Company Get Hooked! March 2009 Approved for 1 CTP/CCM recertification credit by the Association for Financial Professionals 1 Today s Speakers: Joe Potuzak is Senior

More information

September 20, 2013 Senior IT Examiner Gene Lilienthal

September 20, 2013 Senior IT Examiner Gene Lilienthal Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank

More information

Corporate Account Take Over (CATO) Guide

Corporate Account Take Over (CATO) Guide Corporate Account Take Over (CATO) Guide This guide was created to increase our customers awareness of the potential risks and threats that are associated with Internet and electronic- based services,

More information

Best Practices: Reducing the Risks of Corporate Account Takeovers

Best Practices: Reducing the Risks of Corporate Account Takeovers Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States

More information

INTRODUCTION TO FRAUD EXAMINATION

INTRODUCTION TO FRAUD EXAMINATION INTRODUCTION TO FRAUD EXAMINATION GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed

More information

GUIDE TO PROTECTING YOUR BUSINESS

GUIDE TO PROTECTING YOUR BUSINESS GUIDE TO PROTECTING YOUR BUSINESS GT44GPBW As a small business owner, fraud is a significant threat to your business. According to a 2012 study by the Association of Certified Fraud Examiners, the smallest

More information

How To Prevent Fraud On A Credit Card

How To Prevent Fraud On A Credit Card Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies

More information

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

Fraud Awareness Training

Fraud Awareness Training UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for

More information

PREVENTING AND DETECTING FRAUD IN NOT-FOR-PROFIT ORGANIZATIONS UPDATED EDITION

PREVENTING AND DETECTING FRAUD IN NOT-FOR-PROFIT ORGANIZATIONS UPDATED EDITION PREVENTING AND DETECTING FRAUD IN NOT-FOR-PROFIT ORGANIZATIONS UPDATED EDITION Preventing and Detecting Fraud in Not-For-Profit Organizations Table of Contents Page I. An Overview of Fraud in the United

More information

E Commerce and Internet Security

E Commerce and Internet Security E Commerce and Internet Security Zachary Rosen, CFE, CIA President, ACFE Czech Republic Chapter Introduction The Internet has become a global phenomenon reshaping the way we communicate and conduct business.

More information

Office of the Inspector General

Office of the Inspector General Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs Second Edition American Recovery and Reinvestment

More information

Preventing Corporate Account Takeover Fraud

Preventing Corporate Account Takeover Fraud Preventing Corporate Account Takeover Fraud Joe Potuzak Senior Vice President Payment Solutions Risk Manager Member FDIC 1 About Our Speaker Joe Potuzak is the Risk Manager for BB&T s Payment Solutions

More information

Recognizing It When You See It: What Fraud Looks Like in the Public Sector

Recognizing It When You See It: What Fraud Looks Like in the Public Sector Recognizing It When You See It: What Fraud Looks Like in the Public Sector QR Code Presenters: Fiona Chen, President, Fiona Chen Consulting Frank Crawford, President, Crawford & Associates P.C. Vicki Hellenbrand,

More information

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2010 Global Fraud Study Letter from the President When the ACFE published its first Report to the Nation on Occupational Fraud and Abuse in 1996, it

More information

Identity Theft Protection

Identity Theft Protection Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms

More information

ACE elite fraudprotector

ACE elite fraudprotector ACE elite fraudprotector Commercial Crime Insurance Policy ACE elite fraudprotector Insurance Policy (ed. AU 09/10) It wouldn t happen to us ACE elite fraudprotector Insurance Policy Fraud is a major threat

More information

Cash Flow Management: The Life of Your Business

Cash Flow Management: The Life of Your Business Cash Flow Management: The Life of Your Business Brian S. Gottschalk CPA Partner GellerRagans Certified Public Accountants Advisors Cash Flow- defined Movement of money received and spent: the pattern of

More information

FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011

FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011 FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011 Presented by Gary J. Cassiello, CPA, ABV, CFF garyc@jgspc.com 845-692-9500 Today s Outline Why is Forensic Accounting important? Executive

More information

Fraud stories from the field: The Audit Committee and Board s role

Fraud stories from the field: The Audit Committee and Board s role Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Fraud stories from the field: The Audit Committee and Board s role Your Presenters

More information

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information

More information

Trust Safety Update. Central Alberta Bar Society Red Deer June 3, 2015

Trust Safety Update. Central Alberta Bar Society Red Deer June 3, 2015 Trust Safety Update Central Alberta Bar Society Red Deer June 3, 2015 Today s Presentation Fraud Schemes & Lawyer s Trust Accounts Risk Mitigation strategies Examples etransactions and Trust Accounts Trust

More information

CAPACITY BUILDING AND OVERSIGHT BEST PRACTICES

CAPACITY BUILDING AND OVERSIGHT BEST PRACTICES CAPACITY BUILDING AND OVERSIGHT BEST PRACTICES NOT-FOR-PROFIT VENDOR REVIEWS MAYORS OFFICE OF CONTRACT SERVICES 1) Not-for-profit organization has effective and dynamic governance structure a) At least

More information

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business Internet Banking / Cash Management Fraud Prevention Best Practices Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization

More information

7/22/2014. From Treadway To the Cube (1987 2014) So, Who is COSO? What Does COSO Do?

7/22/2014. From Treadway To the Cube (1987 2014) So, Who is COSO? What Does COSO Do? From Treadway To the Cube (1987 2014) National Society of Accountants for Cooperatives (NSAC) CLAconnect.com Instructor: Ron Durkin, CPA/CFF, CFE, CIRA National Principal in Charge Fraud & Misconduct Investigations

More information

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY Letter from the President & CEO More than 15 years ago, the ACFE s founder and Chairman, Dr. Joseph T. Wells, CFE, CPA, conceptualized

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Six Financial Oversight Strategies for Nonprofits

Six Financial Oversight Strategies for Nonprofits Six Financial Oversight Strategies for Nonprofits You Inspire Us! 1) Greet your new friends! 2) Surf the binder and resources 3) Enjoy The Hope Center 4) Watch for MORE resources in 7 days: ECFA.org/Content/Six-Financial-Oversight-Strategiesfor-Nonprofits

More information

Payment Fraud and Risk Management

Payment Fraud and Risk Management Payment Fraud and Risk Management Act Today! 1. Help protect your computer against viruses and spyware by using anti-virus and anti-spyware software and automatic updates. Scan your computer regularly

More information

FINANCIAL CONTROLS POLICIES AND PROCEDURES FOR SMALL NONPROFIT ORGANIZATIONS

FINANCIAL CONTROLS POLICIES AND PROCEDURES FOR SMALL NONPROFIT ORGANIZATIONS By Cindy Cumfer NOTE: These policies and procedures are designed for small nonprofits that do not have an administrator with financial expertise. They are set up to divide the fiscal control roles between

More information

Business ebanking Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special

More information

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK

EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK EMERGING TRENDS IN FRAUD: CRIMINALS HAVE FOUND THE WEAKEST LINK Fraud Investigations Division: Global Security & Investigations Ed Cook Executive Director Regional Investigations Objectives: Provide a

More information

6865 Windcrest Drive Suite 100 Plano, TX 75024 Main: 972.202.8000 w w w. C o r n w e l l J a c k s o n. c o m

6865 Windcrest Drive Suite 100 Plano, TX 75024 Main: 972.202.8000 w w w. C o r n w e l l J a c k s o n. c o m Protect Your Restaurant from Employee Embezzlement By Scott Bates, CPA Mitigating the risk of loss in restaurants through theft is an ongoing challenge. Automation has improved security in transactions

More information

IT Security Risks & Trends

IT Security Risks & Trends IT Security Risks & Trends Key Threats to All Businesses 1 1 What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012

Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers. Privacy, Governmental Liaison and Disclosure May 9, 2012 Identity Theft and Online Fraud IRS Efforts to Protect Taxpayers Privacy, Governmental Liaison and Disclosure May 9, 2012 Today s presentation How identity theft is a threat to the taxpayer What IRS is

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

Fraud Risks in Higher Education

Fraud Risks in Higher Education iftonlar 2014 Cl Fraud Risks in Higher Education AACS Annual Conference November 17, 2014 CLAconnect.com Diane C. DiFebbo, CPA, CFE Brenda Scherer, CPA Learning Objectives Understand how fraud can occur

More information

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS This one-day course will provide an officer with the essential investigative foundation to conduct a financial crimes investigation in today s technology driven

More information

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS This one-day course will provide an officer with the essential investigative foundation to conduct a financial crimes investigation in today s technology driven

More information

Internal Controls for Small Business Accounting

Internal Controls for Small Business Accounting Internal Controls for Small Business Accounting Dr. Robert H. Spencer, K2 Enterprises Administrative Controls Administrative controls are defined as those measures that control operations and transactions

More information

Fraud Risk Assessment for Service Providers FRAUD RISK ASSESSMENT

Fraud Risk Assessment for Service Providers FRAUD RISK ASSESSMENT Fraud for Service Providers FRAUD RISK ASSESSMENT FRAUD RISK ASSESSMENT FOR SERVICE PROVIDERS This document is also downloadable from DoCS website www.community.nsw.gov.au NSW Department of Community Services

More information

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention

More information

Forensic Accounting. A Glimpse Into Forensic Accounting. Portland State University. 10.29.14 Professional Nancy Young, CPA, CISA, CFE Moss Adams, LLP

Forensic Accounting. A Glimpse Into Forensic Accounting. Portland State University. 10.29.14 Professional Nancy Young, CPA, CISA, CFE Moss Adams, LLP Forensic Accounting A Glimpse Into Forensic Accounting 10.29.14 Professional Nancy Young, CPA, CISA, CFE Moss Adams, LLP Summary by Michael Wong Manager of Presentations εα Portland State University Introduction

More information

Introduction to Fraud Examination. World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA

Introduction to Fraud Examination. World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA Introduction to Fraud Examination World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed

More information

INVESTIGATING AND PROSECUTING MONEY LAUNDERING

INVESTIGATING AND PROSECUTING MONEY LAUNDERING INVESTIGATING AND PROSECUTING MONEY LAUNDERING This one-day course will discuss the criminal elements and case law for N.J.S.A criminal statue 2C:21-25, Financial Facilitation of Criminal Activity, also

More information

Combating Fraud on Corporate Checking Accounts

Combating Fraud on Corporate Checking Accounts Combating Fraud on Corporate Checking Accounts A Bank of America White Paper One in a series of white papers prepared by Bank of America on key issues of interest to corporate treasurers. The information

More information

Internal Controls and Political Committees

Internal Controls and Political Committees Internal Controls and Political Committees Under the Federal Election Campaign Act (FECA) and the Commission s regulations all political committees are required to file accurate and complete disclosure

More information

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015 12/16/2015 CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE December 17, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner, BKD, LLP amorelock@bkd.com Jeff Eiserman

More information

Financial Services Group

Financial Services Group Fraud Detection and Prevention Presented by: Carrie Kennedy, CPA, Partner Anthony Porter, CPA, Manager 1 The material appearing in this presentation is for informational purposes only and should not be

More information