synthetic-identity-theft-ft

Synthetic Identity Fraud

Synthetic identity fraud, often referred to as synthetic identity theft, involves combining fake credentials with a suggested identity that isn't connected to a real person. In order to build a new identity, thieves may use actual and fraudulent ...

MONEY LAUNDRING

TRADE-BASED MONEY LAUNDERING (TBML)

Money laundering is no new term, especially in the world of fraud. Yearly, agencies are consistently updating their methods of prevention when it comes to money laundering schemes. Money is moved by criminal organizations and terrorist financiers to ...

608-6084305_fraud-triangle-circle-hd-png-download

THE FRAUD TRIANGLE

It is important we understand the factors behind the occurrence of fraud from the how, why, what, where, and who in order to combat fraud. The circumstance that leads embezzlers to the act of committing fraud was of keen interest to Donald R. Cresse ...

Ponzi-schemes

PONZI SCHEME

My friend John Doe was introduced to a forex platform that pays a monthly interest rate of 15% plus. He had the option of investing his money for six months or a year. According to the investment contract, he might withdraw his funds before the end ...

BEC_Business_E-Mail_Compromise_EN

BUSINESS EMAIL COMPROMISE

Business Email Compromise (BEC) is also known as email account compromise, man-in the-email attack. Not only is this type of fraud one of the most financially damaging online crimes, but it is also costlier than other fraud attacks combined. It is b ...

Folder with close up on the word claims and a note where it is written under investigation. Concept of insurance fraud, 3d Illustration

INSURANCE FRAUD

A person or company arranges a guarantee of compensation when there are specific losses, illness, damage and even death by paying a specified premium. This is called Insurance. Insurance can also be referred to as a contract which is represented ...

fraud-response-plan

FRAUD RESPONSE PLAN

If fraud is suspected, it should be reported to either Your line managerInternal auditDirector of financeProcurement or monitoring officerAn external agency A fraud response plan should be in place to help ensure that an organization responds ...

2fa

TWO-FACTOR AUTHENTICATION

Authentication factors are multiple authentication methods that can be used to verify a person's identity. The bulk of Two-factor Authentication (2FA) methods focus on the first three authentication elements, and most authentication methods rely on ...