fraudulent

Results 1 - 25 of 37Sort Results By: Published Date | Title | Company Name
Published By: Iovation     Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity. Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to: Detect and respond to fraudulent activity before incurring losses Leverage human insight and machine learning to identify advanced fraud Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale Block more fraud while reducing fraud prevention costs This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
Tags : 
    
Iovation
Published By: Iovation     Published Date: Aug 02, 2019
Insurance fraud is back with a vengeance. With four out of ten mobile claims estimated to be fraudulent, using connected devices have made it easier than ever for fraudsters to commit insurance crimes. Gather insights from the live panel discussion hosted by MoneyLIVE & TransUnion. As fraud experts examine current trends & impacts of insurance fraud in today's digital age and learn how to overcome insurance fraud while protecting your customer relationships. What you will learn: Key trends behind fraud and the way in which they are impacting insurers. How to tackle fraud and identify red flags by using a holistic approach. Explore trigger points that can help warn insurers of when there is a high chance of fraudulent activity. Identify the genuine customers and their genuine claims from the fraudsters.
Tags : 
botnet, insurance claims fraud, fraud rings, account takeover
    
Iovation
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
    
Akamai Technologies Australia
Published By: SAP Concur     Published Date: Sep 25, 2019
"Regardless of your organization’s industry, size, or location, travel and expense spend mistakes or fraud can have significant financial consequences. However, by establishing checks and balances to put you in control of employee spend, and making it easy for employees to comply with policies, you can mitigate, detect, and prevent losses due to accidental errors or fraudulent activities. Download this tipsheet to find out how you can cultivate compliance to better protect your business today."
Tags : 
    
SAP Concur
Published By: WNS     Published Date: Apr 06, 2017
In the recent past, a New York City court convicted 13 people including six medical professionals who had, over several years, milked auto insurance companies of millions in fraudulent claims.
Tags : 
insurance, auto insurance, wns, benefits of wns
    
WNS
Published By: IBM Watson Health     Published Date: Dec 12, 2018
Data analytic solutions help improve the value of health and human services, drive better decision-making and lower costs. See how the right solutions can contribute to millions of dollars saved through fraudulent claims detection, offer insights into the social determinants of health and benefit social programs.
Tags : 
government, health and human services, artificial intelligence, data, cognitive insights, medicaid, fraud reduction, social program management, healthcare technology
    
IBM Watson Health
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia
Published By: UL     Published Date: Sep 12, 2018
Performance textiles and fabrics are rapidly bringing apparel and footwear products into the 21st century. Manufacturers today are innovating at breakneck speed and bringing to the market synthetic textiles and fabrics with enhanced performance characteristics, or that feature embedded fibers or topical applications. This has led to the widespread introduction of advanced performance apparel and footwear that offer you new levels of comfort and safety. At the same time, sorting through claims regarding the performance characteristics of these advanced textiles and fabrics can present real challenges for manufacturers, retailers and you. At a minimum, the myriad of vague, conflicting or unsubstantiated marketing claims and characterizations used to promote these materials often result in frustration and disappointment. And fraudulent representations can unnecessarily expose apparel manufacturers and retail buyers to potentially hazardous chemicals and other risks.
Tags : 
    
UL
Published By: Riskified     Published Date: Aug 06, 2019
For online retailers, CNP fraud is a serious problem that will only get larger as the eCommerce market continues to grow. According to a recent report by Juniper Research, the cost of fraudulent eCommerce transactions is projected to rapidly increase over the next 5 years, reaching approximately $71 billion by 2022
Tags : 
    
Riskified
Published By: CA Technologies     Published Date: Feb 08, 2018
CNP fraud is showing no signs of deceleration and is, in fact, expanding rapidly. New trends and new threats call for a revolutionary approach to effectively stop fraud. Learn how to deploy solutions that can quickly distinguish between genuine and fraudulent transactions and take appropriate action instantly. Explore the CA Risk Analytics Network.
Tags : 
    
CA Technologies
Published By: IBM     Published Date: May 26, 2017
A significant challenge for many organizations has been enabling their analysts to find the "unknown unknown." Whether that unknown is malware lurking within the enterprise or within slight variations in fraudulent transactions, the result has been the same: enterprises continue to fall victim to cybercrime. IBM is addressing this challenge with IBM i2 Enterprise Insight Analysis. By pairing multi-dimensional visual analysis capabilities with powerful analytics tools, IBM is giving the analyst team an effective early-detection, cyberintelligence weapon for its arsenal.
Tags : 
security. ibm, ibm i2, cyber-intelligence, fraud, malware
    
IBM
Published By: Fiserv     Published Date: Jul 09, 2018
Cash may be popular with consumers, but it often presents challenges and extra costs for retailers. Manually handling, counting, reconciling and depositing cash every day, or multiple times a day, can be expensive. Smart safe technology and automated cash handling can help and benefit all areas of your business – from Finance to Operations to Loss Prevention – but, more importantly, your customers. Read this eBook to learn the four key benefits of automated cash handling: • Maximize your cash flow • Gain more flexibility with open systems • Reduce shrinkage and reconciliation • Care for customers instead of counting cash
Tags : 
cash automation, smart safe, cash handling, cash-in-transit, cash management, cit, cash vault, cash counting, cash reconciliation, cash transaction, fraudulent currency, counterfeit detection, counting errors, shrinkage, reconciliation
    
Fiserv
Published By: IBM     Published Date: Apr 26, 2016
New channels and cashless payment ecosystems have created greater risk for financial institutions; the increase in fraudulent activities has compounded the need for more rapid detection and counter measures. Please view this webcast and learn: - The key challenges financial institutions face in rapidly detecting, responding and countering new fraud schemes - The value a cognitive computing approach offers an institution; enabling them to make swifter, more accurate decisions while providing more control and transparency
Tags : 
ibm, ibm banking industries, risk management, predictive analytics, fraud, cognitive computing, finance
    
IBM
Published By: IBM     Published Date: Jul 27, 2016
IBM's i2 Analyst’s Notebook offers a wide range of analysis and visualization capabilities that can aid in the identification of key actionable intelligence. Download this IBM White Paper to discover and deliver actionable intelligence to help identify, predict and prevent criminal, terrorist, and fraudulent activities with IBM i2 Analyst's Notebook.
Tags : 
ibm, cyber threat analysis, ibm i2 analyst notebook, analyst, cyber security, business intelligence
    
IBM
Published By: IBM     Published Date: Oct 06, 2016
IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.
Tags : 
cyber security, intelligence, prevention, ibm, data protection
    
IBM
Published By: IBM     Published Date: Jan 26, 2017
The IBM Counter-Fraud Management for Insurance solution is designed to help insurers prevent and intercept attempted fraud while detecting, identifying, and building the case against past fraudulent activity and improper payments.
Tags : 
ibm, analytics, insurance, counter-fraud management, fraud, finance
    
IBM
Published By: Proofpoint     Published Date: May 30, 2018
Email fraud is rife – business email compromise (BEC) is costing companies billions, and consumer phishing is at an all-time high. The majority of these email attacks are also preventable. Utilising the power of email authentication, Email Fraud Defence protects your organisation from all phishing attacks that spoof trusted domains. Visibility of who is sending email across your email ecosystem allows you to authorise all legitimate senders and block fraudulent emails before they reach your employees, customers and business partners. Protect your email ecosystem from today’s advanced email threats including business email compromise (BEC) and consumer phishing. Proofpoint Email Fraud Defence gives you the visibility, toolset and services needed to authorise legitimate email senders and block fraudulent messages before they reach the inbox.
Tags : 
    
Proofpoint
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Without a standard and secure environment for social media, your organization remains vulnerable to malware, unauthorized or fraudulent accounts, and data leakage. IT departments are usually the ones who get called in to clean up the mess. Why not take control of the situation now? Download this guide to HootSuite Enterprise for IT departments today.
Tags : 
social media, social media management, enterprise, hootsuite, solutions guide, security, permissions
    
uberVU via HootSuite
Published By: AppZen     Published Date: Oct 21, 2019
Invoicing and payments problems can take a variety of forms: fraudulent invoices, invoices that don't represent negotiated terms, or just plain duplicates. Join David Wishinsky, Sr. Product Marketing Manager at AppZen, as he reveals 15 critical invoice audit and contract compliance use cases that AI makes possible.
Tags : 
    
AppZen
Published By: FICO     Published Date: Sep 12, 2017
PSD2 puts accountability for unauthorised or fraudulent payments squarely on payment service providers. PSPs are now obliged to confirm their customer’s identity robustly when making payments and when managing their accounts. But these measures threaten to put barriers in the way of the frictionless journey that customers want.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO
Published By: AppZen     Published Date: Jul 15, 2019
Invoicing and payments problems can take a variety of forms: fraudulent invoices, invoices that don't represent negotiated terms, or just plain duplicates. Join David Wishinsky, Sr. Product Marketing Manager at AppZen, as he reveals 15 critical invoice audit and contract compliance use cases that AI makes possible.
Tags : 
    
AppZen
Published By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : 
fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats, mission critical assets
    
ArcSight
Published By: FICO     Published Date: Feb 06, 2018
Interpol reports social engineering as the “broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential information and funds.” Scammers use sophisticated psychological manipulation techniques to build a level of trust with their victim, having them divulge confidential information or authenticate the fraudulent activity as genuine. They will typically claim to be from the bank or well known and trusted consumer brands.
Tags : 
social, engineering, fraud, cyber, security, scams
    
FICO
Published By: LifeLock     Published Date: Jan 17, 2018
In the spring of 2015, 4 employees from the company’s primary manufacturing plant discovered that fraudulent tax returns had been filed using their names, addresses and social security numbers. These were random incidents and not the result of a company data breach. After repeated attempts involving many hours trying to personally remediate the problem, the employees turned to the head of HR for aid in resolving the situation.
Tags : 
    
LifeLock
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.