November 17 presentation

advertisement
Best Practices in Protecting
your Information
Steve Peacock
November 17, 2011
NorthSky Nonprofit Network
Workshop
Presentation Overview
•
•
•
•
Rehmann Overview
Non Profit Industry Experience
Fraud Risk Management
Digital Risk Management
Rehmann Overview
• A Michigan corporation founded in 1941.
• The 38th largest accounting and business consulting
firm in the United States.
• Second largest Michigan-based public accounting
firm. Eleven offices and more than 600 associates.
www.rehmann.com
One
Rehmann…
 Corporate Investigators – Offers a global approach to mitigate risk and
ensure informed business decisions.
 CPAs & Consultants - Provides clients with expertise in all areas of
accounting, tax and assurance.
 Wealth Advisors - Whether it's personal wealth management or the right
retirement plan for your employees, we develop financial plans and
strategies to meet long-term objectives.
…One Team, One Focus, Your Success
Non Profit Experience
• Currently serve over 650 non-profits and nearly 500
governmental units
• Our Nexia affiliates audit numerous non-profit
organizations
• Executives average 15-20 years of experience
• Annual firm-wide training and planning session for
non-profit engagement teams
• Dedicated staff focused on non-profit industry
Non-Profit Experience
• Devoted 140,000 hours to over 650 non-profit and
governmental audit clients last year.
• Industry association involvement
– MNA, MACPA, AICPA
• Keep current with industry issues and
pronouncements
– FASB and GAGAS
– A-133
Non-Profit Experience
• OMB Circular A-133 experience
– Perform 200+ A-133 audits annually for a total of
over $400 million of federal awards expenditures
tested
• Form 990 experience
• Indirect Cost Plans
• Risk Assessments
www.rehmann.com
Corporate Investigative Services (CIS) specializes in:
◘ Litigation support
◘ Threat Response & Asset Protection
◘ Insurance defense
◘ Investigative Services
◘ Background/Due Diligence
◘ Computer & Information Technology Security
◘ Fraud Risk Assessments
◘ Forensic accounting
www.rehmann.com
Managing
Fraud Risks
www.rehmann.com
The “411” on Fraud
◘ The Perpetrators (The Threats?)
◘ How Fraud is Committed
◘ Detection and Prevention
◘ Questions to consider
◘ Fraud Risk Assessment
www.rehmann.com
Threats
◘ In 2/3 of schemes, person acts alone.
◘ 50% are in accounting or upper management.
◘ More than ½ involve a fraudster over age of 50.
◘ Conspiracies increase loss amount by over 25%.
◘ The majority of occupational frauds are committed by employees and
managers as opposed to owners. While owners and executives are involved
less often, the median loss in their frauds is much higher at approximately
$800,000.
◘ There is no correlation between the length of service and the timing of
initiation of the fraud. Generally speaking though, longer serving employees
tend to commit larger frauds.
www.rehmann.com
How is Fraud Committed
Three categories of occupational fraud and abuse:
◘ Asset Misappropriation (80%)
 Cash: larceny; skimming; fraudulent disbursement
 Inventory and all other assets
◘ Fraudulent Statements (7%)
 Financial: asset/revenue over or under misstatements
 Non-Financial: internal and external documents
◘ Bribery and Corruption (13%)
 Conflicts of interest; bribery; illegal gratuities; economic extortion
www.rehmann.com
How Fraud is Detected
◘ Tips - 39.6%
◘ Internal audits – 23.8%
→ 60% from employees
◘ By accident – 21.3%
→ 20% from customers
◘ Internal controls – 18.4%
→ 16% from vendors
◘ External audit – 10.9%
→
◘ Other .9%
4% other
Note: %’s are greater than 100% due to multiple methods identified by respondents
www.rehmann.com
Causes of Fraud
◘ Resentment
◘ Opportunity
◘ Technology
◘ Justifications
◘ Misplaced trust
◘ Overbearing and ultra-thrifty management
www.rehmann.com
Warning Signs
Disorganized operations in bookkeeping
Unrecorded transactions
Missing records
Excessive voids or credits
Unreconciled bank accounts
www.rehmann.com
What to Look For
◘ Living beyond means
◘ Special circumstances that require money
(divorce/death in family/medical care)
◘ Gambling, alcohol and drugs
◘ Out of balance situations
◘ Close relationship with suppliers
◘ Employees that become upset when questioned
www.rehmann.com
Fraud Prevention
◘ “Trust” is not an internal control, “Hope” is not a strategy
◘ Develop a fraud training program
◘ Implement an employee code of ethics
◘ Develop and follow internal controls
◘ Conduct periodic independent reviews of financial information
◘ Conduct employee backgrounds
◘ Conduct random investigations of suspected fraudulent comp
claims
◘ Set up an employee issue hot line
www.rehmann.com
Fraud Prevention Continued…
◘ Expect fraud
◘ Assess your risk
◘ Segregate duties
◘ Make approvals meaningful
◘ Screen and monitor vendors
◘ Review canceled checks
◘ Monitor write-offs
◘ Zero Tolerance – Prosecute Offenders
www.rehmann.com
Questions to Consider
• If a fraud were alleged in your organization, would you be
prepared to investigate and discover the truth?
• How has the current economic climate impacted your
internal controls?
→ Re-evaluate as circumstances change?
→ Commitment to code of ethics?
www.rehmann.com
Be Proactive…
 Create a culture of high
ethical standards
 Constantly evaluate antifraud processes and controls
 Implement an oversight
program
www.rehmann.com
Risk Assessments
◘
Despite the various requirements to
do a fraud risk assessment, no single
standard exists.
◘
Parts of the requirements show up in
the accounting or audit standards and
others in the updated federal
sentencing guidelines.
◘
No single standard pointing the way.
◘
"There is no single way to do it right
but lots of ways to do it wrong.”
www.rehmann.com
Common Qualities of Fair Assessments
◘ Include clear methods of identifying and
measuring fraud vulnerabilities.
◘ Companies whose management is allowed
to talk openly about the potential for fraud
are more likely to have conducted proper
assessments.
◘ Beneficial if the company has provided an
open forum to discuss the possibilities and
has heard from middle managers,
employees, control owners and the board.
www.rehmann.com
Digital Risk
Management
www.rehmann.com
How your information is obtained…
◘ Business record theft
◘ Stolen wallet, mail, etc.
◘ Shoulder surfing
◘ Change of address form
◘ Desk surfing
◘ Spyware
◘ Web surfing / Public records
◘ Keylogger
◘ Dumpster diving
◘ Phishing / Pharming
◘ Skimming
◘ Under the color of authority
(social engineering)
www.rehmann.com
Spyware - The Story!
Imagine if intruders entered your home without your
knowledge or permission.
The interlopers looked at all your confidential papers copying credit card, social security and bank account
numbers before carefully replacing everything as if
undisturbed.
The only change they made was a slight rearrangement of
some of the items at the back of your closet.
That’s Spyware…
www.rehmann.com
Spyware Continued…
◘ Spyware applications are typically bundled as a hidden
component of freeware or shareware programs or
attached to malicious emails or websites.
◘ Once installed, spyware can monitor user activity,
gather information about e-mail addresses, passwords,
and credit card numbers in the background, then
transmit this information to someone else.
◘ Many spyware removal tools have been released.
Some are spyware!
www.rehmann.com
Phishing Definition
Phishing is the act of tricking someone into giving
them confidential information or tricking them into
doing something that they normally wouldn’t do or
shouldn’t do.
– Example: sending an e-mail to a user falsely claiming
to be an established legitimate enterprise in an
attempt to scam the user into surrendering private
information that will be used for identity theft.
www.rehmann.com
•
•
•
•
•
Phishing
for the
‘Big One’
-----Original Message----From: System Administration [mailto:administration@fedreservebank.us]
Sent: Monday, January 26, 2009 8:35 PM
To: XXXXXXXXX
Subject: Attention - Read Carefully
•
•
•
•
•
y
Important:
You're getting this letter in connection with new directions issued by U.S.
Treasury Department. The directions concern U.S. Federal Wire online payments.
•
•
•
On January 21, 2009 a large-scaled phishing attack started and has been still
lasting. A great number of banks and credit unions is affected by this attack
and quantity of illegal wire transfers has reached an extremely high level.
•
•
•
•
•
•
•
•
•
U.S. Treasury Department, Federal Reserve and Federal Deposit Insurance
Corporation (FDIC) in common worked out a complex of immediate actions for the
highest possible reduction of fraudulent operations. We regret to inform you
that definite restrictions will be applied to all Federal Wire transfers from
January 26 till February 6.
Here you can get more detailed information regarding the affected banks and
U.S. Treasury Department restrictions:
http://security.ebanks-connect.net/375891638/wire/
Federal Reserve Bank System Administration
FEDERAL RESERVE BANK
www.rehmann.com
Pharming Definition
Pharming involves Trojan programs, worms, or
other virus technologies that attack the Internet
browser address bar and is much more
sophisticated than phishing.
When users type in a valid URL they are
redirected to the criminals' websites instead of the
intended valid website.
www.rehmann.com
From: PayPal Inc. <service@paypal.com>
To: xxxxxxx@sbcglobal.net
Sent: Tuesday, March 14, 2006 2:18:21 PM
Subject: Account Notice!
Would you respond?
Unauthorized access to your PayPal account!
We recently noticed more attempts to log in to your PayPal account from a foreign IP address.
If you accessed your account while traveling, the unusual log in attempts may have been initiated by you.
However, if you are the rightful holder of the account, please visit Paypal as soon as possible to verify your
identity:
Click here to verify your account
You can also verify your account by logging into your PayPal account at http://paypal.com/us/. If you choose
to ignore our request, you leave us no choice but to temporally suspend your account.
We ask that you allow at least 72 hours for the case to be investigated and we strongly recommend to verify
your account in that time.
Thank you for using PayPal!
The PayPal Team
Please do not reply to this email. This mailbox is not monitored and you will not receive a response. For
assistance, login to your PayPal account and choose the Help link located in the top right corner of any
PayPal page.
To receive email notifications in plain text instead of HTML, update your preferences here.
PayPal Email ID PP468
www.rehmann.com
Is this legitimate?
www.rehmann.com
Social Engineering
◘ Bypasses the most sophisticated
security measures.
◘ Targets weakest link…humans.
◘ Extremely successful.
◘ Attack scenarios are limitless.
• Social Engineering
– “Successful or unsuccessful attempts to
influence a person(s) into either revealing
information or acting in a manner that
would result in unauthorized access,
unauthorized use, or unauthorized
disclosure, to an information system,
network, or data.”
(Rogers & Berti, 2001)
– Basically, using deception or persuasion
to “con” someone into providing
information or access they would not
usually have provided.
www.rehmann.com
The Equipment
www.rehmann.com
Don’t get hooked…
◘
◘
◘
◘
◘
◘
◘
◘
◘
◘
◘
◘
Consult system support personnel if you work from home
Keep anti-virus/spyware software updated
Use a firewall
Secure wireless connections
Don’t open unknown email attachments
Don’t run programs of unknown origin
Keep applications/operating system patched
Turn off your computer when not in use
Select strong passwords
Select strong and different online passwords
Don’t email personal or financial information
Review credit report and bank statements
Protective Measures
• Use a dedicated computer for all online transactions
and implement white listing methods to prevent the
system from going to any site/address that does not
have a documented business need.
• Educate users on good cyber security practices to
include how to avoid having malware installed on a
computer and new malware trends.
• Utilize a security expert to test your network or run
security software that will aid you in closing known
vulnerabilities.
Protective Measures
• Change the default login names and passwords on
routers, firewalls, other network equipment and
software.
• Make sure the banking site you are using starts with
“https://” instead of “http://”. The “s” indicates a secure
transaction.
• Never use a link to reach your financial institution;
emails and search engine links should not be trusted.
Type the bank’s website address into the Internet
browser’s address bar every time.
www.rehmann.com
What to do…

Report the incident to the fraud
department of the three major
credit bureaus.

Contact the fraud department of
each of your creditors.

Contact your financial
institution.

Contact law enforcement.
Emerging Targets in
Financial transactions
• Cyber criminals target small to medium-sized
businesses due to the fact that they lack the complex
security of a large corporation, but maintain a larger
cash balance than most individuals.
• The majority of these attacks require the attacker to
compromise the target computer, install a keylogger,
retrieve the keylogger’s information, and force the
target user to answer banking security questions.
Average Loss
• Small and medium-sized commercial, educational,
and state and local government organizations
(“SMEs”) in the United States are losing on average
$100,000-$200,000 per day to criminals who steal
their money using various forms of Malware designed
to leverage weaknesses in both the wire transfer and
ACH process.
Most Targeted Industries
Source- Anti-Phishing Work Group 1st Quarter 2010 Report
Handling of Customer Information
• Employees must use all reasonable care in protecting
customer information .
• Any printed reports, receipts, etc. that contain customer
information must be shredded when the information is
no longer needed – place in shred bins for proper
disposal.
• Any electronic media such as diskettes, hard drives,
magnetic tapes, or CD-ROM disks that contain or
previously contained customer information must be
destroyed or securely wiped to prevent recovery of
information.
• Employees should contact their supervisor and/or
Network Administrator for the proper destruction
procedure of electronic media.
Public Conversations
• Do not discuss sensitive information in halls,
elevators, lobbies, lunchrooms, restaurants,
lavatories, parking lots, or other public areas.
• If you should overhear other employees discussing
sensitive and confidential information, politely caution
them that they may be overheard.
• Confidential or sensitive information must not be
discussed with any employee that does not have a
need to know the information.
Social Networking Sites
• Reputational Risk
• Do NOT post any form of customer
information or Bank information.
Questions??????????
Download