Anticipating insider threats before they happen
Online access to services and benefits are expanding rapidly through the public sector as we become more and more acclimated to “always on” services. As the online channels expand, so do the number of fraudulent users and compromised accounts. Insiders may also take advantage of easy online access to hijack legitimate services or syphon off payments and services to fraudulent accounts.
You need more than perimeter security to create a protected environment for sensitive citizen and government data and programs. The process starts with a focus on prevention measures when the user applies for access, including identity proofing that covers a broad range of data elements to verify the applicant’s identity.
A strong indicator of potential fraud is a change in a person’s financial situation – either unusual financial problems or living beyond their means. Unlike fraud mitigation programs that only report data periodically, best-in-class solutions interpret potential fraudulent activity patterns in real-time by monitoring suspicious activities across an entire network of financial data and other related industries — delivering scores and attributes that provide a basis for assessing the risk.
A tiered process reviews user and account information within a channel, across channels, and links data between internal and external sources. Tip-offs to fraud from internal analytics might include application anomalies, unusually usage, access from multiple locations, or data in common. Linkage of internal and external data points and analysis of that data gives agencies a new way to uncover potential fraud including insider threats.
Recommended For You
Online consumers can make their purchase with various payment options, like credit card, Apple Pay or PayPal. As a result, […]
As an HR professional, it’s your priority to protect employee data. You may not realize it, but responding to employment […]
The CERCA Spring Conference, held on May 16, capped a broadly successful 2018 filing season that saw tax identity theft reduced by […]
Hackers. They steal and sell data, especially at the point of sale and during customer acquisition periods. No customer wants […]