SlideShare a Scribd company logo
1 of 34
December 14, 2015
Steve Hazan
Small Business
Fraud
Who is SECU?
• Maryland’s largest Credit Union
• 22 Branches
• Over 225,000 members
• $2.8 billion in assets
• …and yes, we bank MD businesses!
Overview
1. Who Pays For Fraud?
2. The Fraud “Triangle”
3. How Do I Protect My Business?
3
“If you make it easy for people
to steal from you they will”
-Frank Abagnale
4
Catch Me If You Can
5
Who Pays for Fraud?
• We All Do
– Higher prices for goods & services
– Higher interest rates
– Lost time & Resources
– Reputational Risk
• Target, Home Depot breaches
6
Sobering Statistics
• 5% of All Revenues are lost to fraud*
• World wide $3.7 trillion lost in revenues*
• Companies with<100 Employees are particularly vulnerable*
• Small businesses make up 31.8% of fraud, highest
percentage of any business category*
• Median small business loss of $155K vs. $120K loss for larger
businesses*
– *Source: Association of Certified Fraud Examiners (ACFE)
– **Bureau of Justice Statistics
7
The Fraud “Triangle”
Motive Opportunity
Rationalization
8
Motive
• Greed
• Financial Pressure
• Employee Disenfranchisement
• Entitlement to more compensation
9
Opportunity
• Employees may yield to temptation when
faced with personal financial stress
• Ex. Drug, Divorce, Gambling
• 87% of perpetrators have never been
charged with or convicted of a fraud
related offense
10
Rationalization
• Many people rationalize fraud by telling
themselves that they will only “temporarily”
borrow the money and eventually return it
• Attitude created by management or
owners can create rationalization.
11
Why are small businesses a target?
• Lack of security
• Longer shelf life
• Lack of preparation
• Unaware of the risks
13
Check Fraud
• 82% business owners indicated that checks were
targeted at their companies*
• Checks were the payment instrument with the highest
average value of unauthorized transactions in 2012**
• The average unauthorized check transaction was $1,221
in 2012**
*2014 AFP Payments Fraud and Control Survey by JP Morgan
**Federal Reserve Payments Study
14
Check Fraud Schemes
• Altering Checks
• Counterfeit Checks
• Forged Signatures
• Checks drawn on closed accounts
15
How do I Protect My Business from
Check Fraud?
• Destroy unused checks from closed accounts
• Separate responsibilities for employees handling
checks
• Verify and reconcile bank statements and
transactions frequently
• Store check stock in secured and locked area
16
Small Business Credit Card Fraud
• 43% of financial business owners were exposed
to debit / credit card fraud attacks in 2013*
• Credit / Debit cards were the payment
instrument with the second highest average
value of unauthorized transactions in 2012*
*2014 AFP Payments Fraud and Control Survey by JP Morgan
17
How do I Protect My Business from
Credit Card Fraud?
• Starting October 2015, merchants must upgrade
their systems to “chip and signature” aka EVM
• Companies who fail to adopt EVM will be held
liable
• Laws transfer the risk to the business owner
from the banks
18
How is the Chip Card Method More
Secure?
A unique one-time code is generated behind the scenes that is needed for the
transaction to be approved, a feature that is very difficult to replicate in a
counterfeit card.
19
Cyber Crime
• 83% of Small Businesses have no formal measures
against cyber threats*
• About 50% of all attacks are aimed at Small
Businesses*
• 44% of fraud incidents involved cybercrime in 2013 and
2014**
• Courts seldom hold banks liable for cyber attacks,
burden of responsibility is on business owner to protect
themselves
• *Forbes Entrepreneurs
• **Price Waterhouse Cooper
20
Types of Cyber Crime
• Phishing
• Spoofing
• Corporate Account Take Over
• Theft of sensitive information or client
information
• Theft of intellectual property
21
Phishing Emails
• Emails that appears to come from a legitimate business
requesting “verification” of information and warning of
some adverse consequence if it is not provided
• The email usually contains a link to a fraudulent web
page
22
Phishing Email Examples
23
Phishing Email Examples
24
Spoofing
• A malicious party impersonates another device
or user on a network in order to launch attacks
against network hosts, steal data, spread
malware or bypass access controls
• Most commonly done by hacking an account
and making it appear as though an email came
from a legitimate source
25
Target Hacking Incident
• Target HVAC sub-contractor was hacked
• Hackers installed malware onto the contractor’s computer, who had
access to Target computer system
• Hacking software was actively collecting data from live customer
transactions at Target
• Hackers stole the credit card numbers and other personal
information of up to 70 million customers.
• Target agreed to a $39 million settlement with several U.S. banks*
*Money.cnn.com
26
How Do I Protect My Business
from Cyber Crime?
1. Identify and shape up weak points
2. Designate a banking only computer
3. Back Up Information
4. Educate Employees
5. Get Insured
27
How Do I Protect My Business
from internal fraud?
• Institute Policies to segregate accounting
duties or outsource functions to 3rd parties
• Conduct background checks/review credit
history before hiring employees with access
to cash or accounting duties
• Dual Signatures for payments over a certain
threshold
28
How Do I Protect My Business
from internal fraud?
• Vacation Policy
• Positive Pay
• ACH Blocks/Filters
• Migrate payments to Purchasing Card Platform
• Code of Conduct/Policies in place
• Employee Assistance Program for those
struggling with emotional, health or financial
issues
29
Combating Business Fraud
1. Be Proactive
2. Establish Hiring Procedures
3. Train Employees to identify fraud
4. Conduct Regular Audits
5. Call in an expert
30
Strike Back!
• The IRS considers embezzled funds as
income. Failure to report it constitutes tax
evasion.
• Issue 1099 to perpetrators
31
Resources
• Your Financial Institution
• Your CPA
• www.abagnale.com
• www.irs.gov
• www.sba.gov
• www.aicpa.org
• www.forbes.com
• www.bankofamerica.com
• Association of Certified Fraud Examiners (AFCE) www.acfe.com
• www.visa.com
• www.pwc.com
• www.jpmorgan.com
32
Questions?
33
Certificate of Completion
This Certifies That
___________
Attended the 2 Hour Seminar
Small Business Fraud
________ _________
Date Presenter
*Note: It is the primary responsibility of each licensee to fulfill the requirements of the law (CPE) and to be able to document, to the Board’s
satisfaction, such fulfillment. All active licensees must maintain, for 4 years, records sustaining (proof of attendance, course outline & expertise
of instructor) the continuing education credits claimed by them as a prerequisite for renewal of their license. For more information PLEASE refer to
Continuing Education Policies from the State Boards (410) 333- 6322
34

More Related Content

What's hot

Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsEMAC Consulting Group
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudEvan Francen
 
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury, LLP
 
keys to fraud prevention in the public sector
keys to fraud prevention in the public sectorkeys to fraud prevention in the public sector
keys to fraud prevention in the public sectorRon Steinkamp
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
Fraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentFraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentRon Steinkamp
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGARon Steinkamp
 
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference PresentationRon Steinkamp
 
BKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic AccountingBKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic AccountingMojoFinancial
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolHaládik Consulting, s.r.o.
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and ReportingBrown Smith Wallace
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresVeriti Consulting LLC
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud InvestigationSalih Islam
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiEMAC Consulting Group
 
MGI Fraud Report 2017
MGI Fraud Report 2017MGI Fraud Report 2017
MGI Fraud Report 2017Steve Greene
 

What's hot (20)

Fraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management ConsultantsFraud risk management training - Elsam Management Consultants
Fraud risk management training - Elsam Management Consultants
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's MissMcKonly & Asbury Webinar - Skimming: What the Auditor's Miss
McKonly & Asbury Webinar - Skimming: What the Auditor's Miss
 
keys to fraud prevention in the public sector
keys to fraud prevention in the public sectorkeys to fraud prevention in the public sector
keys to fraud prevention in the public sector
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local GovernmentFraud Prevention & Detection for Local Government
Fraud Prevention & Detection for Local Government
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Public Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGAPublic Sector Fraud - Mid-MO AGA
Public Sector Fraud - Mid-MO AGA
 
2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation2016 MSCPA Fraud Conference Presentation
2016 MSCPA Fraud Conference Presentation
 
BKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic AccountingBKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic Accounting
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Fraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part iiFraud risk management and interrogation techniques part ii
Fraud risk management and interrogation techniques part ii
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
MGI Fraud Report 2017
MGI Fraud Report 2017MGI Fraud Report 2017
MGI Fraud Report 2017
 

Viewers also liked

Viewers also liked (18)

WeGoLook Overview - Affiliates
WeGoLook Overview - AffiliatesWeGoLook Overview - Affiliates
WeGoLook Overview - Affiliates
 
Visa du lich zimbabwe
Visa du lich zimbabweVisa du lich zimbabwe
Visa du lich zimbabwe
 
Ciclo hidrologico
Ciclo hidrologicoCiclo hidrologico
Ciclo hidrologico
 
Italian cooporation project
Italian cooporation projectItalian cooporation project
Italian cooporation project
 
La navidad
La navidadLa navidad
La navidad
 
Ventas por mes
Ventas por mesVentas por mes
Ventas por mes
 
Ventas por mes 4
Ventas por mes 4Ventas por mes 4
Ventas por mes 4
 
Escorrentia
EscorrentiaEscorrentia
Escorrentia
 
全米オープンテニス2015 ドロー&トーナメント表
全米オープンテニス2015 ドロー&トーナメント表全米オープンテニス2015 ドロー&トーナメント表
全米オープンテニス2015 ドロー&トーナメント表
 
Five things you should know about electrical safety at home
Five things you should know about electrical safety at homeFive things you should know about electrical safety at home
Five things you should know about electrical safety at home
 
NON RESIDENCE TAX ADVICE
NON RESIDENCE TAX ADVICENON RESIDENCE TAX ADVICE
NON RESIDENCE TAX ADVICE
 
Human Body
Human BodyHuman Body
Human Body
 
Prsn
PrsnPrsn
Prsn
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
SPORE AND CONE BEARING PLANTS, VEGETATIVE PROPAGATION
SPORE AND CONE BEARING PLANTS, VEGETATIVE PROPAGATIONSPORE AND CONE BEARING PLANTS, VEGETATIVE PROPAGATION
SPORE AND CONE BEARING PLANTS, VEGETATIVE PROPAGATION
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 

Similar to Protect Your Small Business from Fraud

financial ethical issues Ihsanullah mansoor
financial ethical issues Ihsanullah  mansoorfinancial ethical issues Ihsanullah  mansoor
financial ethical issues Ihsanullah mansoorihsan467
 
Preventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingPreventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingInfrrdInc
 
Be prepared to deal with fraud for web
Be prepared to deal with fraud for webBe prepared to deal with fraud for web
Be prepared to deal with fraud for webKatie Farrow
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramPerficient, Inc.
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
FI Challenges in Unprecedented Times.pptx
FI Challenges in Unprecedented Times.pptxFI Challenges in Unprecedented Times.pptx
FI Challenges in Unprecedented Times.pptxssuserb45cfa
 
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskThe CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskKyriba Corporation
 
Revised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalRevised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalToni Smart
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
KnowyourcustomerViral Jain
 
Anti-Money Laundering -1.pptx
Anti-Money Laundering -1.pptxAnti-Money Laundering -1.pptx
Anti-Money Laundering -1.pptxManasSinghania2
 
Detecting and investigating vendor fraud mvw
Detecting and investigating vendor fraud mvwDetecting and investigating vendor fraud mvw
Detecting and investigating vendor fraud mvwCase IQ
 
2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The FraudRaffa Learning Community
 
Fooling the auditor - Understand the People Risk
Fooling the auditor - Understand the People RiskFooling the auditor - Understand the People Risk
Fooling the auditor - Understand the People RiskJenny Reid
 
Ethical issue in finance
Ethical issue in financeEthical issue in finance
Ethical issue in financePankaj Chandel
 

Similar to Protect Your Small Business from Fraud (20)

financial ethical issues Ihsanullah mansoor
financial ethical issues Ihsanullah  mansoorfinancial ethical issues Ihsanullah  mansoor
financial ethical issues Ihsanullah mansoor
 
Preventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingPreventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document Processing
 
Be prepared to deal with fraud for web
Be prepared to deal with fraud for webBe prepared to deal with fraud for web
Be prepared to deal with fraud for web
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
FI Challenges in Unprecedented Times.pptx
FI Challenges in Unprecedented Times.pptxFI Challenges in Unprecedented Times.pptx
FI Challenges in Unprecedented Times.pptx
 
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskThe CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
 
Revised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalRevised Fraud Powerpoint Final
Revised Fraud Powerpoint Final
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
Banking1
Banking1Banking1
Banking1
 
Knowyourcustomer
KnowyourcustomerKnowyourcustomer
Knowyourcustomer
 
Anti-Money Laundering -1.pptx
Anti-Money Laundering -1.pptxAnti-Money Laundering -1.pptx
Anti-Money Laundering -1.pptx
 
Detecting and investigating vendor fraud mvw
Detecting and investigating vendor fraud mvwDetecting and investigating vendor fraud mvw
Detecting and investigating vendor fraud mvw
 
2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud
 
Our way of fighting fraud
Our way of fighting fraudOur way of fighting fraud
Our way of fighting fraud
 
Fooling the auditor - Understand the People Risk
Fooling the auditor - Understand the People RiskFooling the auditor - Understand the People Risk
Fooling the auditor - Understand the People Risk
 
Ethical issue in finance
Ethical issue in financeEthical issue in finance
Ethical issue in finance
 
presentation.pptx
presentation.pptxpresentation.pptx
presentation.pptx
 
2012 777 The Seven Blind Spots in Business and How to Prevent Them
2012 777   The Seven Blind Spots in Business and How to Prevent Them2012 777   The Seven Blind Spots in Business and How to Prevent Them
2012 777 The Seven Blind Spots in Business and How to Prevent Them
 

Protect Your Small Business from Fraud

  • 1. December 14, 2015 Steve Hazan Small Business Fraud
  • 2. Who is SECU? • Maryland’s largest Credit Union • 22 Branches • Over 225,000 members • $2.8 billion in assets • …and yes, we bank MD businesses!
  • 3. Overview 1. Who Pays For Fraud? 2. The Fraud “Triangle” 3. How Do I Protect My Business? 3
  • 4. “If you make it easy for people to steal from you they will” -Frank Abagnale 4
  • 5. Catch Me If You Can 5
  • 6. Who Pays for Fraud? • We All Do – Higher prices for goods & services – Higher interest rates – Lost time & Resources – Reputational Risk • Target, Home Depot breaches 6
  • 7. Sobering Statistics • 5% of All Revenues are lost to fraud* • World wide $3.7 trillion lost in revenues* • Companies with<100 Employees are particularly vulnerable* • Small businesses make up 31.8% of fraud, highest percentage of any business category* • Median small business loss of $155K vs. $120K loss for larger businesses* – *Source: Association of Certified Fraud Examiners (ACFE) – **Bureau of Justice Statistics 7
  • 8. The Fraud “Triangle” Motive Opportunity Rationalization 8
  • 9. Motive • Greed • Financial Pressure • Employee Disenfranchisement • Entitlement to more compensation 9
  • 10. Opportunity • Employees may yield to temptation when faced with personal financial stress • Ex. Drug, Divorce, Gambling • 87% of perpetrators have never been charged with or convicted of a fraud related offense 10
  • 11. Rationalization • Many people rationalize fraud by telling themselves that they will only “temporarily” borrow the money and eventually return it • Attitude created by management or owners can create rationalization. 11
  • 12.
  • 13. Why are small businesses a target? • Lack of security • Longer shelf life • Lack of preparation • Unaware of the risks 13
  • 14. Check Fraud • 82% business owners indicated that checks were targeted at their companies* • Checks were the payment instrument with the highest average value of unauthorized transactions in 2012** • The average unauthorized check transaction was $1,221 in 2012** *2014 AFP Payments Fraud and Control Survey by JP Morgan **Federal Reserve Payments Study 14
  • 15. Check Fraud Schemes • Altering Checks • Counterfeit Checks • Forged Signatures • Checks drawn on closed accounts 15
  • 16. How do I Protect My Business from Check Fraud? • Destroy unused checks from closed accounts • Separate responsibilities for employees handling checks • Verify and reconcile bank statements and transactions frequently • Store check stock in secured and locked area 16
  • 17. Small Business Credit Card Fraud • 43% of financial business owners were exposed to debit / credit card fraud attacks in 2013* • Credit / Debit cards were the payment instrument with the second highest average value of unauthorized transactions in 2012* *2014 AFP Payments Fraud and Control Survey by JP Morgan 17
  • 18. How do I Protect My Business from Credit Card Fraud? • Starting October 2015, merchants must upgrade their systems to “chip and signature” aka EVM • Companies who fail to adopt EVM will be held liable • Laws transfer the risk to the business owner from the banks 18
  • 19. How is the Chip Card Method More Secure? A unique one-time code is generated behind the scenes that is needed for the transaction to be approved, a feature that is very difficult to replicate in a counterfeit card. 19
  • 20. Cyber Crime • 83% of Small Businesses have no formal measures against cyber threats* • About 50% of all attacks are aimed at Small Businesses* • 44% of fraud incidents involved cybercrime in 2013 and 2014** • Courts seldom hold banks liable for cyber attacks, burden of responsibility is on business owner to protect themselves • *Forbes Entrepreneurs • **Price Waterhouse Cooper 20
  • 21. Types of Cyber Crime • Phishing • Spoofing • Corporate Account Take Over • Theft of sensitive information or client information • Theft of intellectual property 21
  • 22. Phishing Emails • Emails that appears to come from a legitimate business requesting “verification” of information and warning of some adverse consequence if it is not provided • The email usually contains a link to a fraudulent web page 22
  • 25. Spoofing • A malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls • Most commonly done by hacking an account and making it appear as though an email came from a legitimate source 25
  • 26. Target Hacking Incident • Target HVAC sub-contractor was hacked • Hackers installed malware onto the contractor’s computer, who had access to Target computer system • Hacking software was actively collecting data from live customer transactions at Target • Hackers stole the credit card numbers and other personal information of up to 70 million customers. • Target agreed to a $39 million settlement with several U.S. banks* *Money.cnn.com 26
  • 27. How Do I Protect My Business from Cyber Crime? 1. Identify and shape up weak points 2. Designate a banking only computer 3. Back Up Information 4. Educate Employees 5. Get Insured 27
  • 28. How Do I Protect My Business from internal fraud? • Institute Policies to segregate accounting duties or outsource functions to 3rd parties • Conduct background checks/review credit history before hiring employees with access to cash or accounting duties • Dual Signatures for payments over a certain threshold 28
  • 29. How Do I Protect My Business from internal fraud? • Vacation Policy • Positive Pay • ACH Blocks/Filters • Migrate payments to Purchasing Card Platform • Code of Conduct/Policies in place • Employee Assistance Program for those struggling with emotional, health or financial issues 29
  • 30. Combating Business Fraud 1. Be Proactive 2. Establish Hiring Procedures 3. Train Employees to identify fraud 4. Conduct Regular Audits 5. Call in an expert 30
  • 31. Strike Back! • The IRS considers embezzled funds as income. Failure to report it constitutes tax evasion. • Issue 1099 to perpetrators 31
  • 32. Resources • Your Financial Institution • Your CPA • www.abagnale.com • www.irs.gov • www.sba.gov • www.aicpa.org • www.forbes.com • www.bankofamerica.com • Association of Certified Fraud Examiners (AFCE) www.acfe.com • www.visa.com • www.pwc.com • www.jpmorgan.com 32
  • 34. Certificate of Completion This Certifies That ___________ Attended the 2 Hour Seminar Small Business Fraud ________ _________ Date Presenter *Note: It is the primary responsibility of each licensee to fulfill the requirements of the law (CPE) and to be able to document, to the Board’s satisfaction, such fulfillment. All active licensees must maintain, for 4 years, records sustaining (proof of attendance, course outline & expertise of instructor) the continuing education credits claimed by them as a prerequisite for renewal of their license. For more information PLEASE refer to Continuing Education Policies from the State Boards (410) 333- 6322 34

Editor's Notes

  1. Opened since 1951 Field of Membership originally State Employee’s; Has expanded so nearly all of Maryland can qualify for membership All products and services of a traditional bank, including online, mobile, ATM network, deposit and loan products, business banking Core Values: Service, Education, Commitment, Understanding Mission: Promote the financial well being of those we service
  2. If employees believe management has unfair compensation or benefits, they will assume the company can do away with a “small amount”
  3. Lack of security Often do not have anti-fraud practices in place. Longer shelf life Takes a long time for consumers to become aware a small business has been hacked, resulting in longer usage by hackers of consumer information. Small businesses often do not reconcile bank statements in a timely manner.
  4. Identify and shape up weak points Take time to come up with complex passwords and change them regularly Do not use same passwords for all or most accounts Designate a banking only computer Computers not used for other activities such as email or web surfing are much harder for hackers to gain access to. Review bank transactions daily to detect fraud in real time 3. Back Up Information Cyber attacks can contribute to lost of data as well as money Ex. Cloud Computing, Drop Box, Carbonite 4. Educate Employees Negligent employees are the most common cause of data breaches
  5. Be Proactive Establish Anti-fraud Hotline ACFE found that roughly 42% of fraud cases reported were via hotlines Anti-fraud policy and code of conduct Implementing systems that actively monitor and analyze company data 5. Call in an expert Enlist the expertise of a Certified Fraud Examiner