The Facets of Fraud. A layered approach to fraud prevention



Similar documents
Decision Solutions Consulting Group. Leading Solutions for Leading Enterprises

White Paper. Account Opening: The Front Door of Fraud. Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

Fraud Solution for Financial Services

Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper

I See Fraud Rings. by Dr. Stephen Coggeshall Chief Analytics and Science Officer. November 2012 WHITEPAPER

TSYS Managed Services. Reduce your fraud exposure and losses by utilizing Fraud Mitigation Services from

An effective approach to preventing application fraud. Experian Fraud Analytics

Suite. Market - Leading Data, Analytics & Scoring

Fraud detection in newly opened accounts. Connecting data helps predict identity theft

Business Information Services. Product overview

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

Designing an Identity Theft Prevention Program

A strategic approach to fraud

RC284. Protect Yourself Against Identity Theft

White Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper

Best Practices in Account Takeover

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

ALERTS NOTIFICATION USER GUIDE

An Oracle White Paper October An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions

Now is the time for a fresh approach to detecting fraud

Mortgage Services > Today s mortgage lenders are faced with. constant challenges Equifax can help. CONSUMER INFORMATION SOLUTIONS

Deception scams drive increase in financial fraud

Bust-out fraud. Knowing what to look for can safeguard the bottom line. An Experian white paper

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

Prepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target.

Peter Hill, Oracle Reveleus & Mantas

WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation

EMDEON PAYMENT INTEGRITY SERVICES

Fraud Prevention Checklist for Small Businesses

Preventing Health Care Fraud

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

Selecting the right cybercrime-prevention solution

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

one admin. one tool. Providing instant access to hundreds of industry leading verification tools.

CREDIT SCORE USER GUIDE

Strategically Detecting And Mitigating Employee Fraud

Empowering Brokers to Identify and Combat Mortgage Fraud

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The market leader in ID verification and authentication

Using Data Mining to Detect Insurance Fraud

Recognize the many faces of fraud

Managing the Risk of Fraud in Mobile Money. Authors: Lara Gilman and Michael Joyce

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

fraud at the door Identify fraud at the first point of contact

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Data Management Services > Master data management: a critical cornerstone

Driving License. National Insurance Number

HOME DEPOT DATA BREACH

Managing IT Security with Penetration Testing

Medicaid Fraud Prevention & Detection

Advanced Threat Protection with Dell SecureWorks Security Services

Using Data Mining to Detect Insurance Fraud

Guide to Preventing Social Engineering Fraud

IBM Counter Fraud Signature Solutions

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

WHITE PAPER Fighting Banking Fraud Without Driving Away Customers

CREDIT CARD FRAUD PREVENTION IN NONPROFITS

Market Intelligence Cell. Fighting Financial Crime

Stop advanced targeted attacks, identify high risk users and control Insider Threats

A Unique Perspective into the World of Identity Fraud

FICO Enterprise Fraud and Security Management. > Protection with a holistic view.

No company provides a more powerful fraud detection solution than. Experian, the global leader in information solutions.

Breach Found. Did It Hurt?

Application Security in the Software Development Lifecycle

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Detect, Prevent, and Deter Fraud in Big Data Environments

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

The Predictive Fraud and Abuse Analytic and Risk Management System

WHITE PAPER Moving Beyond the FFIEC Guidelines

How the Past Changes the Future of Fraud

This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.

SUBJECT: Identity Theft / Patient Misidentification POLICY NUMBER: Page 1 of 16 GENERATED BY: Integrity Compliance Office APPROVED BY:

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Transcription:

The Facets of Fraud A layered approach to fraud prevention

Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate the extent of the issue. Fraud can be defined as any wrongful or criminal deception intended to result in personal or financial gain. The different faces of fraud make it hard to measure, often leading organizations to firmly believe they are not victims of deception or vastly underestimating the extent of the issue. What they do acknowledge is a problem with credit losses or high collection activity without realizing some borrowers have no intention of honouring the account or loan.

Whether a fraudster takes out one large line of credit under a false name or maintains several small, legitimate accounts to build enough trust to apply for a high-limit credit card, the common denominator is intent. Where Does It Begin? The story of fraud starts with an identity. A distinction can then be made between fraudsters who: Use their own identity (first party fraud). Create a fictitious identity (first party fraud). Use another person s identity (third party fraud). In the case of first party fraud, the perpetrators open accounts using false information or they misrepresent their real identity by lying on credit application forms. A common example of first party fraud is a bust-out, where multiple accounts are opened and charges are put against them with the intention of abandoning the account, or busting out. Third party fraud may also be referred to as true name fraud, where a real identity is being leveraged by the perpetrator. Third party fraud often starts with identity theft where someone impersonates another individual by using information such as their name, social insurance number (SIN) or credit card number, without their permission. While individual consumers have become increasingly aware of the threat of identity theft, businesses also need to be vigilant in their identity verification measures to protect themselves and their customers against fraud, whether first party or third party. Points of Attack Once an identity has been chosen, fraudsters have an array of methods they can use to manipulate your business. Fraudsters will be looking for the easiest and most profitable point of attack within your institution. The points of attack and the fraud methods used against a financial institution will vary based on the products and services the institution offers. For example, credit card fraud will represent very different challenges than cheque fraud. This is further complicated by electronic versus non-electronic transaction services. Different considerations need to be taken into account when protecting an etransfer versus a line of credit, for example. The Fraud Players Fraud is a difficult behaviour to define and even more difficult to predict. The perpetrators are constantly changing their methods, making patterns hard to establish. Although methods may vary, three common fraud personas are: The Quick Striker: The most inclined to hit and run whereby they are looking to quickly maximize their financial gain, then disappear and move onto the next institution or scheme. The Opportunist: Actively probing to look for an easy entry point, or in the case of third party fraud, looking to capitalize on a lack of awareness or defense on individual consumers. The Sleeper: Patiently build loyalty with institutions by maintaining several legitimate accounts before opening the moneymaker. Outside of isolated crimes of opportunity, organizations should be equally (if not more) wary of organized fraud rings that incorporate different fraud players into a long term strategy that makes a steady, substantial income out of fraud. When these rings are nation-wide, they are incredibly destructive and difficult to pinpoint. Once they begin to branch out internationally to fund foreign crime, not only is the reputation of the victim organization at stake, but finding and prosecuting the criminals becomes a longer, more daunting process. Understanding how the identities, methods and types interact is a key in catching fraud before it impacts your business. Learning these correlations will help your organization narrow down your search for fraud offenders and minimize, if not prevent, your losses. While being able to detect fraud as it is occurring is helpful in reducing losses, the ultimate goal should be to prevent it from affecting you.

Layered Approach to Fraud Management The best strategy involves multiple layers of defense.

Equifax Layered Approach In the fight against fraud, there is no cookie cutter, one-size-fits all approach. Just as you might use several tools to repair a leaking faucet, several solutions may need to work together for specific fraud detection and mitigation situations. Equifax recommends a layered approach to implementing a fraud prevention program in your organization which addresses the following areas: Prevention Detection Investigation Containment & Recovery Analysis & Recommendations With the right mix of processes, policies, analytics, and technology, you not only minimize losses, but you also improve compliance and staff productivity. ANALYSIS & RECOMMENDATIONS Root cause analysis Trend analysis / peer comparison Action plan for identified points of compromise PREVENTION Identity verification & authentication Know your customer (KYC) policy Staff training programs Fraud Risk Assessment Implementing the right program starts with performing a fraud risk assessment of your organization. Identify possible fraud risk: gather information to assess the possible fraud risks that could apply to the organization. Assess significant, inherent fraud risk and its likelihood: fraud risk based on historical information, known fraud schemes, and interviews with staff, including business process owners. Respond to likely/significant inherent and residual risks: the response should address the identified risks and perform a cost-benefit analysis of fraud risks over which the organization wants to implement controls or specific detection procedures. Fraud risk exposure should be assessed regularly by the organization to identify specific potential schemes and events that the business needs to mitigate. Assessments should be performed on a systematic and recurring basis, involve appropriate personnel, consider relevant fraud schemes and scenarios, and mapping those fraud schemes and scenarios to mitigating controls. DETECTION Client data validation Device verification Analytics for profiling & behavioural modelling CONTAINMENT & RECOVERY Action to stop losses & contact customers Recovery activities Data breach response services INVESTIGATION Comprehensive case management Validation of suspicious transactions Identify points of compromise

Identity and Fraud Solutions Equifax empowers businesses and consumers with information they can trust. A global leader in information solutions, we leverage one of the largest sources of consumer and commercial data, along with advanced analytics and proprietary technology, to create customized insights that enrich both the performance of businesses and the lives of consumers.

The Equifax identity and fraud solution portfolio provides your organization with an integrated suite of real-time, industry-leading defenses against fraud. The portfolio consists of identity screening, verification and authentication tools, and enterprise fraud management solutions that work in real time to minimize losses from various types of fraud. Equifax augments our solutions with unique data assets, predictive analytics and fraud consulting services. Identity Management Solutions eidcompare eidcompare is a real time, identity proofing solution. eidcompare helps to determine whether an identity is valid and if the individual claiming the identity is who they say they are. eidcompare cross checks applicant data against Equifax data sources to validate the identity and to determine whether that identity has been reported as misused or associated with potential fraudulent activity. eidverifier This knowledge-based authentication process uses shared secret information that should only be known by the customer and Equifax, to present a variety of multiple choice questions. Only the identity owner should be able to correctly answer a sufficient number of the security questions to be deemed legitimate. Business Confirm Business Confirm is a business identification service used to validate the existence of a corporation and its status, the entity type, registration/incorporation date and to identify the company directors. Deceased ID Equifax s Deceased ID solution is a database of deceased Canadians that can be used as a diagnostic tool to expedite the validation or cleansing of your client database to verify continued existence. Fraud Prevention Solutions QuickMatch QuickMatch is a unique tool that verifies key identification data against the data contained in Equifax s consumer credit database to determine if a credit card is being presented by its rightful owner. Safescan Safescan is an interactive warning system that detects potential fraud by spotting irregularities, as well as confirmed misuse in names, addresses, SINs, and telephone numbers. If irregular or misused information is detected, Safescan generates a warning advising you to take a closer look at the information on the application. Citadel Citadel is a web-based, Equifax-hosted enterprise fraud management solution that helps to identify high-risk or potentially fraudulent activities before they negatively impact your business. The solution matches input data to Equifax s consortium fraud and historical client data to help detect fraud patterns based on user-controlled business rules. A suite of linkage analysis tools help to uncover indirect connections between seemingly unrelated data, which may constitute an organized fraud ring. Professional Services & Analytics Data Breach Response Services Our professional services are employed once an organization experiences a data breach; the service provides notification to affected customers, call centre services, credit monitoring and / or credit file alerts. Custom Analytics Due to our deep expertise in predictive modeling and comprehensive fraud data sources, Equifax is able to offer custom analytical services to address your specific business challenges. Fraud Consulting Services Our in-house fraud consultants have a unique customer centric approach to understanding strategies, pain points and business objectives. They have deep industry knowledge with the support of dedicated customer relationship teams and subject matter experts that come together with our customers to consult, develop and deploy successful fraud solutions.

Equifax Capabilities VALUE-ADDED ANALYTICAL INSIGHTS TECHNOLOGY SOLUTIONS THAT INTEGRATE DATA & INSIGHTS BROAD-BASED & UNIQUE DATA ASSETS CLIENT NEEDS CONSUMER CREDIT COMMERCIAL FRAUD MORTGAGE TELCO 3RD PARTY CUSTOM & GENERIC SCORES SCORECARD MODELING SCORE VALIDATIONS CUSTOM ANALYTICS CONSULTING SERVICES ASP SOLUTIONS RULES BASED ENGINES DECISIONING PLATFORMS WORKFLOW MANAGEMENT ENTERPRISE FRAUD MANAGEMNET Combine the power of Equifax s vast data resources with superior analytics, consulting services and state-of-the art enabling technologies to deliver an integrated fraud solution. Talk to Equifax today and see how our data can positively impact every phase of your account lifecycles. www.equifax.ca Contact Us Today Call 1-855-233-9226 to speak to an Equifax Advisor or visit us at www.equifax.ca/reducefraud Certain conditions apply to all offers. Equifax and EFX are registered trademarks of Equifax Canada Co. Inform Enrich Empower is a trademark of Equifax Inc., used here under license. 2014 Equifax Canada Co. All rights reserved