Raising the Bar on Fraud Prevention



Similar documents
Top 5 Reasons to Outsource MORE!

Report True Fraud Protection: Securing People, Process and Personal Data

Digital Empowerment Foundation


2014 Cost of Data Breach Study: Global Analysis

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

How to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

PCI Compliance for Healthcare

Cyber Insurance as one element of the Cyber risk management strategy

White Paper. Data Breach Mitigation in the Healthcare Industry

2013 Cost of Data Breach Study: Global Analysis

Bottomline Healthcare. Privacy and Data Security

2013 Cost of Data Breach Study: Global Analysis

A strategic approach to fraud

Preemptive security solutions for healthcare

Protect Your Business and Customers from Online Fraud

2015 Cost of Data Breach Study: Global Analysis

CGI Cyber Risk Advisory and Management Services for Insurers

IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper

Information Security & Privacy

Mitigating and managing cyber risk: ten issues to consider

Application Security in the Software Development Lifecycle

Data Breaches and Customer Loyalty Report

The Growing Threat of Medical Identity Fraud: A Call to Action. Presented by: Bill Barr, Development Coordinator, MIFA

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

Three Steps to Help Manage Security Alert Overload

Introducing SAP Fraud Management. Jérôme Pugnet

EDITION CLOUD REPORT HEALTHCARE AND LIFE SCIENCES LEAD IN FINDING AND PREVENTING SENSITIVE DATA LOSS

Cyber Risks in Italian market

Evaluating DMARC Effectiveness for the Financial Services Industry

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Converting commercial payment data into critical, cost-saving intelligence.

1) DOES YOUR SOFTWARE

Create Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum

Report. Top 5 Reasons to Outsource

BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

WHITE PAPER Moving Beyond the FFIEC Guidelines

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET

Exploring the Landscape of Philippine Cybersecurity

The Business Case for Security Information Management

Web Protection for Your Business, Customers and Data

E Commerce and Internet Security

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

HIGH-RISK USER MONITORING

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

White paper. Four Best Practices for Secure Web Access

Data Loss Prevention and HIPAA. Kit Robinson Director

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Security Solutions for HIPAA Compliance

2015 Cost of Data Breach Study: United States

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE

How To Protect Your Data From Theft

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Compromises in Healthcare Privacy due to Data Breaches

I ve been breached! Now what?

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Address C-level Cybersecurity issues to enable and secure Digital transformation

2H 2015 SHADOW DATA REPORT

ERM Symposium April Moderator Nancy Bennett

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

High-Risk User Monitoring

2016 The global ABB integrity program.

Managing data security and privacy risk of third-party vendors

Sarbanes-Oxley: Beyond. Using compliance requirements to boost business performance. An RIS White Paper Sponsored by:

DEMONSTRATING THE ROI FOR SIEM

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

How To Ensure Financial Compliance

Sharon Kurek, CPA, CFE Director of Internal Audit

Fraud Prevention Checklist for Small Businesses

10 Smart Ideas for. Keeping Data Safe. From Hackers

Fraud Risk Management and Internal Audting

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Securing and protecting the organization s most sensitive data

Payment Card Industry Data Security Standard

Security and Privacy of Electronic Medical Records

Fraud Risk Management

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

How To Buy Nitro Security

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Comprehensive real-time protection against Advanced Threats and data theft

MANAGED SECURITY SERVICES (MSS)

Managed Services. Business Intelligence Solutions

NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES

Small businesses: What you need to know about cyber security

Demonstrating the ROI for SIEM: Tales from the Trenches

Four steps to improving cloud security and compliance

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

SECURITY RISK MANAGEMENT

Information Security Risk Management

RUAG Cyber Security. More security for your data

Protecting your business against External Fraud

Transcription:

Raising the Bar on Fraud Prevention This article is available for download on Teleperformance s website. For more information about articles, cases, white papers go to: www.teleperformance.com

The Ongoing Challenge of Prevention From cyber-threats and data breaches to social media scams and mobile attacks, fraud is rampant and rapidly growing. It is an understatement to say that security breaches are a significant issue. Attackers are moving faster, getting smarter, and becoming more agile in their efforts to steal sensitive customer data with no signs of slowing down. In 2014, more than one billion records were breached worldwide, a 78% increase from the previous year. 1 Organizations are constantly challenged with staying one step ahead of fraudsters to protect customer information, company brand image, and revenues. It is unrealistic to think that any organization is immune to attack. One fact is clear: fraud attacks will continue to be a norm in the business landscape, and companies need to be ready. In 2014, more than one billion records were breached worldwide, a 78% increase from the previous year. Gemalto and SafeNet As the worldwide leader in multichannel customer experience management, security is a critical item for Teleperformance. Providing a highly secure environment for our clients, their customers, and our employees is a top priority, so we make sure to offer innovative security solutions that are ahead of the market. The growing, pervasive threat to data security underscores the point that security should be everyone s responsibility, and ongoing, proactive prevention should be a part of every company s culture. This report explores the recent data breach environment from a global perspective and shares information on how Teleperformance is leading the industry with a strong information security system backed by world-class strategies, processes, and technology. Teleperformance continues to raise the bar with its security measures by using a strategy that not only helps to prevent breaches but also anticipates potential threats. 1-Gemalto and SafeNet, Breach Level Index Annual, breachlevelindex.com, 2014. Actual number of records breached: 1,023,108,267. 2

The High Cost of Security Breaches According to a 2014 global data breach study that included 314 companies from 10 countries, the average total cost of a data breach increased 15% from the previous year, to $3.5 million. A closer look at the results shows that the average business cost loss due to a breach varies greatly between countries (see figure 1), with the highest in the United States at $3.3 million and the lowest in India at $252,876. These costs include abnormal customer churn, increased customer acquisition activities, reputation losses, and weakened goodwill. 2 The differences in cost can be credited to variations in data protection regulations and laws within each country as well as the types of attacks made against companies. 2-Ponemon Institute, 2014 Cost of Data Breach Study: Global Analysis, ponemon.org, 2014. The average total cost of a data breach increased 15% from the previous year. Ponemon Institute> Measured in US$ USA $3,324,959 France Germany UK Saudi Arabia $1,692,192 $1,637,509 $1,587,463 $1,527,085 Italy Australia Japan Brazil $984,055 $784,391 $759,312 $657,587 Figure 1: Average Business Costs Loss (Ponemon Institute, 2014 Ponemon Cost of Data Breach Study ) India $252,876 $0 $500,000 $1,000,000 $1,500,000 $2,000,000 $2,500,000 $3,000,000 $3,500,000 3

In addition, as figure 2 shows, some of the most regulated industries had significantly higher per capita data breach costs healthcare ($359), education ($294), pharmaceutical ($227), and financial services ($206) than the lowest-ranked industries, public ($100) and retail ($105). Consolidated view (n=314), measured in US$ Per capita cost Healthcare Education Pharmaceutical Financial Communications Industrial Consumer Services Energy Technology Media Hospitality Transportation Research Retail Public $177 $160 $155 $145 $141 $138 $137 $122 $121 $119 $105 $100 $206 $227 $294 $359 Figure 2: Per Capita Cost by Industry Classification (Ponemon Institute, 2014 Ponemon Cost of Data Breach Study ) $0 $50 $100 $150 $200 $250 $300 $350 $400 4

A global occupational fraud study carried out by the Association of Certified Fraud Examiners (ACFE), based on 1,483 occupational fraud cases investigated by CFEs, gives evidence of how some breaches are happening as a result of weak internal controls (see figure 3). The study found that fraud schemes that occurred at victim organizations that had implemented any of several common anti-fraud controls were significantly less costly and were detected much more quickly than frauds at organizations lacking these controls. Moreover, the widespread and increasing number and cost of security breaches demonstrates an urgent need for proactive detection and prevention measures. Lack of Internal Controls 32,2% 35,5% 37,8% MOST IMPORTANT CONTRIBUTING FACTOR Lack of Management Review Override of Existing Internal Controls Poor Tone at the Top Lack of Competent Personnel in Oversight Roles *Other Lack of Independent Checks/Audits Lack of Employee Fraud Education Lack of Clear Lines of Authority Lack of Mechanism 4,9% 3,5% 3,3% 5,6% 2,9% 2,5% 1,9% 1,5% 1,8% 1,8% 0,7% 0,3% 0,6% 2,2% 8,4% 8,4% 9,1% 7,1% 7,3% 6,9% 20% 18,1% 17,9% 18,9% 19,4% 19,2% Figure 3: Primary Internal Control Weakness Observed by CFE (Association of Certified Fraud Examiners, to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study ) 0% 5% 10% 15% 20% 25% 30% 35% 40% *Other-category was not included in the 2010 PERCENT OF CASES 2010 2012 2014 5

Teleperformance s 5 Pillars of Security and Fraud Prevention The emphasis of Teleperformance s security and fraud prevention program is to prevent fraud when possible and detect fraud activity in a early stage, when prevention is not possible. Since the introduction of the fraud risk assessment, the program has matured and includes continual monitoring and auditing to minimize risk and improve compliance with the fraud risk treatment plan. The program is organized according to five main pillars, which form a framework for a comprehensive, proactive approach to fraud prevention: Highly Trained People Cutting-Edge Technology Well-Defined Security Processes Security Management Methodologies Stringent Policies 6

1-Highly Trained People One of the fundamental aspects of a successful and effective security strategy is recruitment and selection of the right people. Since Teleperformance is a People Business, the human resources team plays a key role in managing the company s most valuable asset its people. Teleperformance s HR professionals follow a step-by-step method when hiring new people, which include background checks for all employees specific to past employers, criminal history, and all checks as permitted by local law, such as drug testing. In addition to screening employees for security, the hiring process uses an analytical solution with a predictive model that provides a recruiting score. This score is an indicator for correct job matching, which reduces attrition and recruitment costs locally and globally, improves performance, and allows better hiring decisions. Further, Teleperformance works with each client to create a customized hiring profile specific to client requirements and program needs. Security Training Once hired, team members are fully educated to improve data security. This is accomplished through security training, clear communication, a certified security team, and a global security playbook. Each employee receives onboarding training, which includes a module to educate employees on company security policies and procedures. Additional training modules are available for fraud prevention and instruction on proper procedures for handling sensitive customer information and financial data in digital, hard copy, and verbal forms. Clear Communication We have continuous and clear communication on stringent security practices, which promotes a culture of protection and security. From identification badges to screen savers and posters, all have security symbols and language to remind employees of the high standards and awareness for fraud prevention. This type of internal campaign puts security at the forefront of all activities in a contact center, and fosters a strong security culture. The best method to prevent employee fraud, according to the ACFE, is to educate employees (and would-be perpetrators) about the controls in place that will detect fraudulent activity, as well as the likelihood of getting caught and the consequences when caught. Certified Security Team A key feature of Teleperformance s global security team includes security analysts, security consultants, risk consultants, compliance specialists, and auditors that hold a wide variety of certifications, such as CISSP (Certified Information Systems Security Professional) CFE (Certified Fraud Examiner) CISA (Certified Information Systems Auditor) ISO Certified Lead Auditor and Project Management Professional (PMP) Global Security Playbook The global security playbook consists of detailed guidelines on security policies and standards. Again, emphasizing the importance of providing clear communication, the guidelines are fully descriptive and illustrated with tools, screenshots, photos, and videos. A virtual tour video offers employees a look at some of Teleperformance s Best-in-Class sites. 2-Cutting-Edge Technology Teleperformance invests in cutting-edge tools and technologies to provide an excellent customer experience that is safe, secure, and efficient for clients and their customers. The company s proprietary technologies and tools help its partners to save on costs associated with updating or replacing outdated IT infrastructures. Numerous industries, such as credit cards, banking, and e-commerce, have stringent regulations and laws for security and consumer protections against fraud and identity theft. Outsourcing partnerships can make companies aware of new developments and security requirements, helping them to avoid costly and unending investments for technology and system upgrades. Beyond the standard firewalls, anti-viruses, and other commonly used security technologies, Teleperformance utilizes multiple technologies designed to improve the end customer security experience, prevent fraud and maintain integrity and privacy of personal identifiable information, and detect fraud or security risks in real time. For example, there is secured communication technology 7

between the customer and agent to avoid verbal exposure of personal identifiable information (PII) such as but not limited to credit card information. This technology securely captures the PII in non-verbal form and inserts the PII into the client CRM without ever exposing the PII to the agent. TP Security Until recently, companies have lacked resources that provide real-time security alerts. Real-time alerts are not only extremely important in rapidly identifying risks but also helping to mitigate costs associated with any data records that may have been breached. Teleperformance s real-time alert tool, TP Security, provides statistical monitoring technology of agent activities to trigger real-time alerts based upon predefined correlation criteria for each individual client program. Additionally, this technology will shed light on statistical numbers that might represent fraudulent activity and require investigation. Once a security risk is detected, TP Security sends a fraud alert to the security team. This alert includes a detailed agent profile that helps to quickly identify and intercept offending agents. TP Policy A mapping tool is necessary to manage requirements for compliance, auditing, and reporting. TP Policy maps numerous compliance and legal requirements to client requirements and Teleperformance policies. This tool has reporting dashboard technology that enables a daily view into the exact compliance of the campaign fraud prevention program, and enables midstream corrections so that the program maintains high levels of anti-fraud compliance. IT Tools and Control To re-inforce its strong focus on technology and security, Teleperformance has certifications from leading security standards, such as PCI/DSS, ISO 27001/2, and HIPAA. In fact, Teleperformance established the benchmark in contact center information security by becoming the first contact center service provider to achieve PCI/DSS certification. The company has worked closely with technology and security leaders to develop compliance auditing and certification, risk management technology, and secure solutions. As a result, Teleperformance provides a system that detects PCI violations on clients systems. 3-Well-Defined Security Processes Teleperformance s security processes include methods to map data, processes, and operations. This identifies security breaches in processes and systems by utilizing assessments for fraud risk and operations risk. Risk Assessment The fraud risk assessment (FRA), for example, provides a detailed mapping of processes, and system and resource interactions to identify critical points that can create a negative impact or create potential breaches in an operation. To complement the FRA, Teleperformance conducts an operations risk assessment, which involves performing another FRA after 90 days of program management but with a focus on the operational process environment. After the FRA is conducted, Teleperformance and the client agree on prevention and/or early detection strategies for each discovered risk ( risk remediation strategy ). This involves Teleperformance account management, Teleperformance security analysts, and key individuals from the client to discuss and agree on a treatment strategy for each documented risk. The goal is to agree as a team on the strategy to prevent risks or early detection strategies for risks that cannot be prevented. Following the strategy, the process is implemented as standard practice within the program. While some of the discovered risks may be preventable, some risks require ongoing monitoring for early detection of possible fraud activity. For these ongoing activities, Teleperformance tracks compliance as frequently as needed to ensure the early detection activities are implemented as agreed by both parties. This reporting information will be available to the client on a weekly basis to show actual compliance with each and every risk treatment plan. Audit and Certification To identify any problems within processes and technologies, Teleperformance performs internal and external security audits. Executed by a dedicated team of certified security professionals, the internal audits strive to coordinate and implement security policies throughout the organization. Upon successful implementation of the program and audit, each client and/or operational site is certified to meet the minimum standards within the Teleperformance s security requirements. 8

4-Security Management Methodologies To ensure that its programs are aligned with Best-in- Class security practices, Teleperformance implements the following management methodologies, in addition to many others: Security Committee As the governing body for Teleperformance s fraud prevention program, this committee tracks and evaluates global essential security policies and procedures. Additionally, the committee stays abreast of new threats within the market and evaluates these risks to determine if policy changes are necessary. Transparent Security Partnership A fully transparent partnership between companies is essential for successful, secure multichannel programs. After a program ramp-up, Teleperformance forms security committees with clients in order to share best practices and discuss security breaches identified in assessments. Operational Standards Integrated with Security All security procedures and policies are integrated with Teleperformance s operational standards, such as TOPS and BEST. This improves compliance of security policies and procedures within programs and levels within the company. TOPS (Teleperformance Operational Standards) describes the core operation standards and procedures established to service Teleperformance programs by the operation team. TOPS best practices represent the core framework of the company s operation management. Its main purpose is to promote usage of the best practices in all contact centers around the world. BEST (Baseline Enterprise Standards for Teleperformance) includes worldwide best practices for areas such as recruitment and selection, and training and development. BEST benefits include improved practices and metrics at the company, operational, and people level. 5-Stringent Policies Stringent policies within Teleperformance programs enhance data security for all clients. When team members follow the policies, threats of fraud and data leaks are significantly reduced. For example, all staff members are well trained on the correct use of social media and the Internet. All workspaces are regulated so employees have only what they need in order to perform their jobs, such as a PC, monitor, headset, mouse and mouse pad, and phone unit and nothing else. Electronic devices, purses, and bags are not permitted in the program areas. Workstations have only approved applications and access for web filtering. No removable media devices are allowed. A login/password is required in order to access a program or account. Teleperformance sites have strict facility access controls in place, with assigned identification badges. As an added precaution, Teleperformance provides an employee hotline so employees have a safe and confidential way to report any suspicious fraud activities. The use of hotlines is also highly recommended by the ACFE. In the fraud cases analyzed by the ACFE in its 2014 Global Fraud Study, 51% were tips reported for organizations with hotlines, versus 33% reported for organizations without hotlines (see figure 4). This demonstrates a considerable impact that hotlines can have on identifying employee fraud. 9

Closing Thoughts: Raising the Bar Figure 4: Impact of Hotlines (Association of Certified Fraud Examiners, to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study ) DETECTION METHOD Tip Internal Audit Management Review Acount Reconciliation By Accident Surveillance/Monitoring Document Examination External Audit Notified by Law Enforcement IT Controls Confession Other 5,1% 7,9% 4,2% 2,9% 1,7% 2% 6,4% 1,3% 5,2% 1,3% 2,7% 1,3% 0,9% 0,6% 0,9% 0,3% 0,7% 9,5% 15,2% 13,2% 14,6% 17,7% 33,3% 0% 10% 20% 30% 40% 50% 60% 51% Although security threats and data breaches are now the norm in the business landscape, there are many ways companies can facilitate fraud prevention and early detection. It starts with having a comprehensive security strategy in place supported by high-quality policies, processes, and technology to protect customers and employees. With a strong security culture at the core if its foundation, Teleperformance has helped thousands of companies across dozens of industries provide a secure and extraordinary omnichannel customer experience. Teleperformance established the benchmark in contact center information security by becoming the first contact center to achieve PCI/DSS certification. Teleperformance s industry-leading privacy controls have also been recognized with third-party recommendations from MasterCard, and certifications of compliance from ISO 27001/2, HIPAA, and Safe Harbor, among others. Now that certification has become the norm, Teleperformance believes it is time to raise the bar again, and encourages businesses to make a deeper commitment to ongoing information security maintenance work, and promote a security culture within their organizations. PERCENT OF CASES Organizations Without Hotlines Organizations With Hotlines 10

About Teleperformance Worldwide Leader in Multichannel Customer Experience We are a People company with a people-centric strategy, interacting with people all over the world. It s all about People. They are part of who we are and what we do. We analyze their behaviors. We understand their wants and needs. That s why we deliver outstanding customer experiences through integrated multichannel solutions to enhance customer experience results for our clients. We are recognized in the market by leading analyst firms. Teleperformance has added innovation to contact center security that often surpasses the client s internal security controls for fraud prevention and early detection. In short, for companies that absolutely require the highest degree of data and customer information security, Teleperformance is indisputably the industry leader. Michael DeSalles, Industry Analyst, Frost & Sullivan 11

For more information: Follow us: