SAFEGUARDING YOUR ASSETS AND PREVENTING FRAUD

Slides:



Advertisements
Similar presentations
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
Advertisements

Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
9 - 1 Computer-Based Information Systems Control.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
7-1 FRAUD, INTERNAL CONTROL, AND CASH Financial Accounting, Sixth Edition 7.
Audits: How to Prepare and What to Expect Council of Senior Business Administrators Focus Session April 21, 2004 James Laird Assistant Dean for Finance.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Objectives of Internal Controls Protect the firm’s assets Ensure reliability of accounting records Promote operating efficiency Ensure adherence with management’s.
FORENSIC ACCOUNTING - BA124 - Spring 2005Slide 4-1 Today’s Topics n Preventing Fraud-Part II n Eliminating opportunities for fraud n Dealing with Fraud.
Copyright © 2007 Prentice-Hall. All rights reserved 1 Internal Control & Cash Chapter 8.
INTERNAL CONTROLS. Session Objectives Understand why an organization should have internal controls Understand the key components of internal controls.
Chapter 4 Internal Controls McGraw-Hill/Irwin
New Data Regulation Law 201 CMR TJX Video.
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Auditors: Why do they ask all those questions? LGC Resource April 2015 Penny Austin, Assistant Director – IS Local Government Audit.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Awareness Training
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Introduction to Internal Control Systems
Where’s the Money Going? 10 Things You Should Know about Internal Controls and Fraud Donna S. Brown, CPA Bob Powell, CPA November 12, 2010.
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
©Holm Publications Security Awareness Presentation.
Business & Technology A safety & soundness perspective Information Meetings September / October 2004.
Chapter 7 Internal Control and Cash
Information Systems Security Operational Control for Information Security.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Internal Controls and Fraud Convery Describe an Internal Controls System and its elements Identify specific Internal Control issues in a NPO Consider.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
By: Asfa Khan and Huda Mukhtar
8-1 Accounting Principles Using Excel for Success PowerPoint Presentation by: Douglas Cloud, Professor Emeritus Accounting, Pepperdine University © 2011.
INTERNAL CONTROLS What are they? Why should I care?
Managing Chapter Funds Brent Woods, Esq., CAE, SPHR NIGP Executive Director for Business Operations and Finance.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
7-1 FRAUD, INTERNAL CONTROL, AND CASH 7 Remember… people will lie, cheat and steal! Not everybody…. and not all the time.… but they do….
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Occupational FRAUD in the Governmental Sector Ronny Daigle, PhD, CPA (AL), CFE, CGMA Professor of Accounting
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
I S P S loss Prevention.
Managing the IT Function
Chapter 3: IRS and FTC Data Security Rules
Internal Controls.
BEST PRACTICES Will Lewis.
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
Internal controls 01-Nov-2017.
Unit 4 IT Security Kerris Davies.
Internal Controls.
Internal Controls.
Presentation transcript:

SAFEGUARDING YOUR ASSETS AND PREVENTING FRAUD Internal Controls Segregation of duties Audit, Review or Compilation Preparation of bank reconciliation Proper approval of vendor invoices/original copies Training/cross-training Senior Mgmt & Employees Screening & background checks of new hires Rotation of personnel in clerical positions Mandatory vacation Observe employee behavior Periodic review of procedures Warning Signs No vacation taken; first to arrive, last to leave Employee lifestyle Employee protection of their work Lack of internal controls No sharing info between Senior Mgmt or employees Bank statements not reconciled promptly Check stock in open areas and not secured New vendors added without proper controls Promotions/transfers declined by employee Fire drill mentality to complete a report Vendors call re: lack of payment/service change Frequent bank calls for transaction verification Preventative Measures Engage outside professional to test controls Engage outside accounting firm for audit Hire management company Separate bank accounts Bank products-positive pay, alert technology Security features on checks and documents More than one Senior Mgmt involved Proper control to add new vendors Review insurance for Fidelity, Crime, Cyber Protection of computer hardware & software Update and review procedures Cyber Security Protect computer hardware & software Dedicated PC-no personal use/open (WiFi) areas Back-up files/Controls to limit access Proper use of passwords, token authentication Use of firewalls, spyware & virus programs Monitor internet activity Update software promptly/ Unload unused software Scan PC regularly for spyware & viruses Use audit trail in bank programs Use separate user accounts Create continuity/recovery plan

SAFEGUARDING YOUR ASSETS AND PREVENTING FRAUD Steps to Take if a Fraud Occurs Quick & rapid response necessary Engage a forensic accountant Seek legal counsel Contact insurance company or broker/agent Contact banker IT personnel should not try to find problem Maintain integrity of data Close bank accounts/open new accounts Call law enforcement (if advised by legal counsel) Implement new controls/prevent more losses Cancel credit cards, if necessary Maintain the integrity of documents Secure computers used by the perpetrator Implement continuity/recovery plan, if needed Cancel personnel who can approve EFT’s Take action/perpetrator has consequences Communicate with employees at proper time Send Form 1099 to the perpetrator Tips to Remember Fraud is a crime of opportunity Fraud can make anyone a victim. Fraud occurs for many reasons-be aware Something sounds too good to be true, it probably is Perpetrators take the path of least resistance Anyone can be a perpetrator-be aware Don’t become complacent Be proactive. Reaction is too late Behavior is a key point-be cognizant of it Read all monthly reports Research other parties in transactions Never let your guard down Be aware of emails from unknown senders Create a positive work environment Train your employees Don’t be lazy-investigate all incidents Be sure there are checks and balances Tone at the top-lead by example