Employees may be trusted with certain procurement responsibilities which can provide opportunities to commit fraud-related offenders. It’s difficult to identify the risks. A common sense approach is always essential.
In this white paper, learn more about our comprehensive approach to deterring and preventing Procurement Fraud
Invoice Redirection fraud (or Mandate Fraud) occurs when your company receives a request to change a direct debit, standing order or bank transfer mandate, from someone purporting to be from another organisation to which regular payments are made, for example a business supplier. It generally takes place when a criminal impersonates your company and deceives the customer into making payment of the company’s genuine invoices to a fraudulent third party account instead.
In this white paper, learn more about our comprehensive approach to deterring and preventing Invoice Redirection fraud (or Mandate Fraud).
Private Automatic Branch Exchange (PABX) Fraud has serious consequences for organizations operating in an international business environment. In such an environment, organizations are operating under serious pressure, competition is stiff and margins are tight. This, in conjunction with trying to adapt to unfamiliar legal systems, conventions and specific political circumstances, can make doing business in an international environment very difficult. There is therefore much depending on whether an organization can win a contract, obtain a license or market a product in good time.
In this white paper, learn more about our comprehensive approach to deterring and preventing Private Automatic Branch Exchange (PABX).
Business Email Compromise (BEC) Fraud (or CEO Fraud) is similar to Invoice Redirection Fraud however in this case junior employees in the finance department of a company receive an email from a fraud perpetrator purporting to be the Chief Executive Officer stating that an important deal or some other urgent matter is pending and that a substantial payment needs to be processed immediately.
In this white paper, learn more about our comprehensive approach to deterring and preventing Business Email Compromise (BEC) Fraud (or CEO Fraud)
Fraud perpetrators may cold call you claiming there are problems with your computer and they can help you to solve them. Those fraud perpetrators often use the names of well-known companies such as Microsoft, Apple or IBM. They could even use the name of your broadband provider to sound more legitimate.
In this white paper, learn more about our comprehensive approach to deterring and preventing Computer Software Service Fraud.
Telephone fraud involves criminals contacting you by phone (vishing) or by text (Smishing) pretending to be your bank, credit card issuer, utility company or often a computer company. During the conversation they will try and trick you into giving personal, banking or security information. Fraud perpetrators may also convince you to make a money transfer to them or inform you that you have won a prize and need to send money to release it. Their intention is to use this information to commit fraud against you or other parties in your name.
In this white paper, learn more about our comprehensive approach to deterring and preventing Telephone Fraud.
Email fraud (“Phishing”) involves fraud perpetrators making contact by email and can take a number of forms. The email may appear to be from a reputable company however when one clicks on the email or attachment or link within the email, malicious software (malware) is downloaded onto the PC or other device allowing the fraud perpetrator to track online activity and identify personal or financial information for fraudulent purposes. Both individuals and companies can be victims of this type of crime.
In this white paper, learn more about our comprehensive approach to deterring and preventing Email Fraud
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.