KYC requirements – Guidelines for secure...

A Peek Behind the Curtain to...

A Peek Behind the Curtain to...

Businesses face a growing threat of account take over attacks as fraudsters become more sophisticated and take advantage of advances in technology. This week, we’re pulling back the curtain to take a closer look at them and how to add this to your fraud protection strategy. 

Fraud Trivia: Phishing

Phishing is a prevalent type of social engineering that aims to steal data from the message receiver. Typically, this data includes personal information, usernames and passwords, and/or financial information. Phishing is consistently named as one of the top 5 types of cybersecurity attacks.

Read More

KYC compliance – The key to...

KYC compliance – The key to...

In today’s digital-first world, businesses face increasing risks of financial crime, including fraud, money laundering and terrorist financing, and identity theft. As these crimes grow more sophisticated, … Read More

A New Model for Assessing Fraud...

A New Model for Assessing Fraud...

Let me introduce a new model for assessing fraud risk mitigation. Before you read my blog, remember sarcasm is good, if it makes you think. Remember our theme, to look behind the curtain. The curtain is the current professional audit standards.

Read More

Is Fraud Auditing About Mitigating or...

Is Fraud Auditing About Mitigating or...

Current audit standards call for us to use a mitigation standard when it comes to audits This means that unless you want to be an outlaw, your assessment will end with mitigate. However, the question I want you to ask yourself is, right now do we have enough information to properly assess the mitigate question?

Read More