01-election-fraud-1

ELECTION FRAUD

As we gear up for the upcoming national elections, it is important to understand the fraudulent practices around Elections and how we as anti-fraud experts can help mitigate them for a better democracy. WHAT IS ELECTION FRAUD Election fraud al ...

2021-bl-measuring-risk-management_1200x628

RISK MANAGEMENT

The process of recognizing, assessing, controlling, and responding to threats to an organization's capital and earnings that occur during a business's life cycle is known as risk management. According to ISO 31000, risk management process is a ...

0_gj16HSbkLtEuSkw9

WHISTLEBLOWING

The growth of whistleblowing began with the global financial crisis of 2007/2008, which reawakened the globe to the need for corporate corruption to be addressed. Whistleblowing is a word used when a person, generally an employee, discloses knowl ...

VAULT_Internal-Controls-Blog-1

POOR INTERNAL CONTROLS

Internal controls are the systems, regulations, and procedures put in place by a firm or organization to assure the accuracy of financial and accounting data, encourage accountability, and prevent fraud. These controls can assist enhance operational ...

AdobeStock_204077439-1000x500

PHISHING

Phishing is a sort of social engineering-based cyberattack. By impersonating a legitimate entity or institution, fraudsters contact their targets by sending fraudulent messages via email, text message, or phone call, tricking them into disclosing se ...

Fraud-OTP-1-1

ONE-TIME PASSWORD (OTP) FRAUD

It is common knowledge that fraud can occur using any means possible. A more common occurrence around us today is with the One-Time Password or Pin also known as OTP. The (OTP) is a password that is only valid for one login session or transaction on ...

2fa

TWO-FACTOR AUTHENTICATION

Authentication factors are multiple authentication methods that can be used to verify a person's identity. The bulk of Two-factor Authentication (2FA) methods focus on the first three authentication elements, and most authentication methods rely on ...