
A truth about fraud
Read Time: 6 mins
Written By:
Laura Downing, CFE
As Barbra Streisand sang, "People who need people are the luckiest people in the world." Unfortunately, they're also the major cause of data breaches.
Organizations — as we reported in parts one and two of this study — could drastically reduce and prevent most internal and many external data breaches if they implemented risk management strategies with ongoing data protection and security awareness programs to educate all employees and third parties.
"No matter how much companies spend on digital defenses, hackers often still get in [to computer networks] by persuading an employee to click on a link or cough up a password," wrote Danny Yadron in his April 19, 2015, article, The Man Who Hacks Your Employees, in The Wall Street Journal. Are the people problems that underlie internal threats more troublesome than they appear? Yes, because, in addition to driving the internal threats, these problems also drive most of the external ones and, as a result, increase the risk of a data breach. Why is that?
As shown in part one of this study, a variety of internal and external causal factors precipitate data breaches — those driven by external hackers are the most compelling. Also, constant threats include current and former employees, third-party contractors (such as external auditors and lawyers) and those who are responsible for disposing of data properly because they all have access to records containing personally identifiable information (PII) and are entrusted to use it in a professional manner.
Also, if the security measures that protect PII are inadequate, then the probability of data breaches from either internal or external threats is fairly equal. And if organizations don't secure their data centers by allowing unauthorized entry or if they leave physical records exposed or devices containing them unsecured, then possibilities of data breaches in the form of internal or external thefts is increased.
These situations, of course, can lead to current or former employees and others stealing records. If organizations don't secure internet and intranet networks with the most recent software and industry-standard network data security firewalls, records are exposed to internal and external hackers. Risk is also elevated when organizations 1) don't have policies to prevent terminated employees from accessing PII and 2) don't screen and train third parties such as companies hired to transport or dispose of sensitive records plus employees, auditors and consultants who have access to PII and transfer it to their laptops and take it outside the organization.
Organizations have the power to prevent the vast majority of these data breaches if they can control their major cause: simple phishing schemes. For example, in the opening case of part one, 30 banks lost more than $100 billion because of a simple phishing scheme that tricked employees into giving control of bank transfer activities to external hackers. (See The Great Bank Robbery: Carbanak cybergang steals $1bn from 100 financial institutions worldwide, Viral News, Feb. 16, 2015 at Kaspersky Lab.) Wow! This beats working for a living. If the bank had trained these employees properly (e.g., in this case, how to detect phishing schemes), these losses could've been prevented.
But therein lies the rub: Many large and small organizations — cognizant of the great risks — are attempting to train their employees, but still are seeing data breaches. What to do? We have some recommendations.
The following security measures and guidelines, although not comprehensive, are some excellent starting points for organizations to include in their security awareness and data protection programs. However, none of these methods will work if top management doesn't actively and humanely espouse them. The tone at the top concept doesn't just work to compel C-suiters to avoid bad conduct but to also exhibit good behavior.
We can't stop all data breaches because people are going to make non-malicious mistakes that provide the opportunities for PII to be compromised, such as leaving their desktops on when taking lunch breaks or forgetting to shred documents before disposing them in a trash receptacle. But we sure can do a better job of controlling these types of threats and preventing the more malicious ones.
Organizations have the power to prevent the vast majority of these data breaches if they can control their major cause: simple phishing schemes.
These basic suggestions, although not meant to cover every aspect of data security, will be good starting points to help reduce and manage risks associated with internal and external data breaches and thus help to protect PII and other important information. Some are obvious but still easily dismissed.
The following established practices, from a data-recovery site, can help maximize internet network data security.
According to the data-recovery website, intrusion detection is the basic driver for networking security and is the science of the detection of malicious activity on a computer network. Intrusion detection, strongly related to the internal and external causal factors identified in this study, is classified into:
Misuse or malicious activity compromising networking security from within the computer network (typically internal organizational fraud), which reflect the "internal" causal factors of this study.
Hacker or cracker attacks from outside the computer network compromising networking security that require external intrusion detection, which reflect "external" causal factors.
This method relies on checking for any new or strange accesses to the computer network. (It's also known as behavior-based intrusion detection for networking security.)
Some standard patterns of intrusion into computer networks and pattern-based intrusion detection rely on checking if some of these patterns are repeated on computer networks. (It's also known as knowledge-based intrusion detection for networking security.)
According to the data-recovery website, if an organization has limited qualified intrusion-detection staff, then knowledge-based intrusion detection systems are better than behavior-based intrusion detection systems for networking security because the number of false alarms is less in knowledge-based intrusion systems.
Host-based intrusion detection software constantly monitors computer servers to normally detect internal malicious activity in log files.
These methods, which rely on monitoring network traffic and detecting intrusions into host computers via real-time or offline logs, are typically useful for networking security of external computers.
Data Recovery offers this advice to make intrusion detection systems more efficient:
The findings of this three–part study of Privacy Rights Clearinghouse (PRCH) data breaches and related compromised records over 10 years strongly indicate that organizations from every type of industry are experiencing serious long-term problems with various types of internal and external data breaches and are therefore relinquishing millions of compromised records. Hence, the FBI continues to rank identity theft as the No. 1 fraud problem.
The situation actually is much worse than indicated because the data breaches analyzed in this study represent only a small but representative sample of the actual data breaches, and the reported compromised records are grossly understated, according to the PRCH. Most U.S. organizations, at least, that incur data breaches are reluctant to report them because they take advantage of loopholes in state data notification laws that allow them to opt out.
Organizations can develop more workable safeguards for protecting records by classifying data breaches, related compromised records and industry sectors with the practical methodological framework of the Holtfreter and Harrington model.
Organizations in every industry sector — private and public — need to step up to the plate and develop comprehensive risk management strategies that include strong ongoing data protection and security awareness programs to help protect the PII and other sensitive information of their customers, clients and employees.
I know you're convinced. But in my wildest dreams, I'd love to gather top management in a huge arena and preach these prevention, detection and deterrence methods and tell them the financial and behavioral expenditures far outweigh the costs in the aftermath of data breaches.
Our recommendations in these articles are just a starting point that can lead to reducing identity theft throughout the world. Good luck!
Robert E. Holtfreter, Ph.D., CFE, CICA, CBA, is distinguished professor of accounting and research at Central Washington University in Ellensburg, Washington. He's also on the ACFE Advisory Council and the ACFE Editorial Advisory Committee. His email address is: doctorh007@gmail.com.
Adrian Harrington, an Associate Member of the ACFE, is Holtfreter's research assistant and a former student in his Fraud Examination class. His email address is: aaharrington87@gmail.com.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 6 mins
Written By:
Laura Downing, CFE
Read Time: 5 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 5 mins
Written By:
Annette Simmons-Brown, CFE
Read Time: 6 mins
Written By:
Laura Downing, CFE
Read Time: 5 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 5 mins
Written By:
Annette Simmons-Brown, CFE