SlideShare a Scribd company logo
1 of 38
Download to read offline
Tom Ciolkosz
Sarah McConnell
James Foster
Preventing Nonprofit
Banking Fraud and the Tools
You Can Use!
NFP Banking Fraud & Tools for You!
• In the news
• Fraud
 The fraud triangle
 Internal controls
• Protecting your online environment
• Banking financial fraud
• Tools for you!
• Checklist
• Resources
Data Breach Headlines
Washington Post
Inside the hidden world of thefts, scams and phantom purchases at the
nation’s nonprofits
∙ For 14 years, the American Legacy Foundation has managed
hundreds of millions of dollars drawn from a government settlement
with big tobacco companies, priding itself on funding vital health
research and telling the unadorned truth about the deadly effects of
smoking.
∙ Yet the foundation, located just blocks from the White House, was
restrained when asked on a federal disclosure form whether it had
experienced an embezzlement or other “diversion” of its assets.
By Joe Stephens and Mary Pat Flaherty October 26, 2013
Washington Post
Inside the hidden world of thefts, scams and phantom purchases at the
nation’s nonprofits
∙ Legacy officials typed “yes” on Page 6 of their 2011 form and provided a six-
line explanation 32 pages later, disclosing that they “became aware” of a
diversion “in excess of $250,000 committed by a former employee.” They
wrote that the diversion was due to fraud and now say they believe they
fulfilled their disclosure requirement.
Washington Post
Inside the hidden world of thefts, scams and phantom purchases at the
nation’s nonprofits
∙ Records and interviews reveal the full story: an estimated $3.4
million loss, linked to purchases from a business described
sometimes as a computer supply firm and at others as a barbershop,
and to an assistant vice president who now runs a video game
emporium in Nigeria.
∙ Also not included in the disclosure report: details about how Legacy
officials waited nearly three years after an initial warning before they
called in investigators.
Question #1
Have you experienced fraud in your
organization or personal life?
What is Fraud?
Fraud is a deception deliberately practiced in order to
secure unfair or unlawful gain (adjectival form fraudulent;
to defraud is the verb).
The two main types of fraud
• Misappropriation of assets – theft of company's assets
• Fraudulent financial reporting – misrepresentations in
financial reports
How Prevalent is Fraud?
• 10% of fraud occur in
not-for-profit
organizations
• It typically lasts 18 months
• Approximately 55% were
committed by single
individuals
• Median loss of $100,000
∙ Statistics ∙ Primary Areas of Weaknesses*
• Lack of Controls
• Override of Existing Controls
• Lack of Management review
• Poor Tone at the top
*One of these factors was present in over
80% of the cases studied
* According to the Association of Certified Fraud Examiners
What are the Clues?
Behavioral Red Flags
• Living beyond means
• Refusal to take vacation
• Unwillingness to share duties
Unique Challenges to Non-Profits
More trusting culture
Lack of financial expertise in management positions
Lack of resources
Red Flags!
• Living beyond means
• Refusal to take vacation
• Unwillingness to share duties
What Can You Do – Internal
Controls!!
 Two types of internal controls
• Deterrence
• Detection
Question #2
What are your best practices for fraud
detection and deterrence?
Protecting Your Online Environment
Harvesting Information through Social
Media
Social Engineering: Phishing
Phishing, relates to acquiring that confidential
information by masquerading as a trustworthy
entity in an electronic communication.
Watch to watch for:
• Links to email
• Spelling and grammar
• Popular Company
• Urgency
Spoofing, is when a spammer sends out emails
using your email address in the From: field. The
idea is to make it seem like the message is from
you.
What to watch for:
You see mailer daemon error messages (returned
emails) in your inbox that do not match any
messages you sent
You get messages from people who received
email from you that you did not send.
Social Engineering: Spoofing
What is a Keylogger?
Whether it is called a keylogger, spyware or
monitoring software, it can be the equivalent
of digital surveillance, revealing every click and
touch, every download and conversation.
Malicious intent:
• Account information
• Credit card numbers
• User names
• Passwords
Keystroke Logging
Question #3
Have you ever experienced a social
engineering scheme?
Protect your online environment
∙ Be sure your bank uses a Two-factor authentication process. The best
way to utilize a two factor authentication communication is:
• Email
• Cell Phone
• Phone
Further Controls
∙ Educate your employees
∙ A strong security program should be paired with
employee education about the warning signs and safe
practices that you can implement.
∙ The best secure password is:
• Password
• 1234
• May2009marie
• S97@fde
Banking Financial Fraud
Check Fraud
Another way is for the fraudsters to get access to your
money is to create counterfeit checks through
stealing your check stock or obtaining a legitimate
check and copying it.
Solution:
Check Positive Pay - This is an antifraud service
offered by banks to help protect businesses against
fraud from altered and counterfeit checks. Positive
pay assists in the creation, transmission, and research
of check records sent to the bank for payment.
Fraudulent Check
What's Different?
$210.00
Problem:
Through remote deposit capture or mobile phone
deposit technology, check fraud involves individuals
double debiting. For example, an organization issues a
check to an individual and the individual deposits the
check through a scanner or smartphone.
The individual then quickly takes it to another bank to
cash it. Both transactions flow through the check
clearing process, which could result in the account
being debited twice. This could go undiscovered until
the account is reconciled.
Check Deposit Fraud
ACH Fraud
Problem:
The fraudster targets nonprofit organization accounts in search of
bigger payouts. Fraudsters will steal online banking credentials by
hacking computer networks and installing key logging software or
malware.
Once the thief has the right credentials, they can access the
organization's accounts and send out wires or ACH’s to another
country and into their own bank accounts.
Solution:
ACH Positive Pay - This allows clients to assign filtering or blocking
services to various accounts based on company IDs, standard entry
class codes, and dollar amounts.
Credit Card Fraud
∙ DVM Chip
• Change in laws
∙ Fraudulent transactions
∙ Inventory and review of cards
• Count
• Physical location
• Limited use
Question #4
Has anyone has a corporate or personal credit
card compromise? What about a bank
account?
Question #5
What controls do you have in place to prevent
bank fraud?
Pay attention and react quickly
∙ Look out for unexplained account or network activity, pop ups, and
suspicious emails. If detected, immediately contact your financial
institution, stop all online activity and remove any systems that may
have been compromised.
∙ Also consider ACH and Positive Pay
∙ Do you perform bank reconciliation on your operating account?
• Monthly
• Weekly
• Daily
• Quarterly
Understand your responsibilities and
liabilities
The Electronic Funds Transfer Act (EFT),
also known as Regulation E, was implemented in the U.S. in 1978 to establish the
rights and liabilities of consumers as well as the responsibilities of the financial
institution in EFT activities.
Regulation E covers a consumer under certain conditions, limiting loss to $50 if the
institution is notified within two business days.
There currently are no similar loss protections for commercial customers
The account agreement with your bank will detail what commercially
reasonable security measures are required by your organization.
What can you do tomorrow?
Talk to your IT department
• How are you protected from phishing, keystroke logging,
etc.?
• What training can you regularly give your employees?
• What is your password policy?
Talk to your bank
• Is Positive Pay available?
• Do they offer credit card protection?
What can you do tomorrow?
Review your internal controls (now and at least annually)
• Bank reconciliations
• Vacation policy
• Segregation of duties
• Credit card use
What is your culture for sharing fraud concerns? What is the
tone at the top?
Questions
36
Resources
You can also visit the following websites to learn more about how to protect your
nonprofit organization:
• Johnson Lambert LLP website: www.johnsonlambert.com
• Access National Bank website: www.accessnationalbank.com
• ACFE Fraud Prevention:
http://www.acfe.com/uploadedFiles/ACFE_Website/Content/documents/Fraud_Pre
v_Checkup_DL.pdf
• Greater Washington Society of CPAs: Nonprofit Accounting Basics:
http://www.nonprofitaccountingbasics.org/topic/internal-controls
• Federal Communications Commission: 10 Cybersecurity Strategies for
Small Business
https://www.uschamber.com/sites/default/files/legacy/issues/defense/files/10_
CYBER_Strategies_for_Small_Biz.pdf
Thank you for your participation!
Sarah McConnell
Principal
Johnson Lambert LLP
smcconnell@johnsonlambert.com
James Foster
CFO
Northern Virginia Association of Realtors
jfoster@nvar.com
Tom Ciolkosz
Vice President
Commercial Banker
Access National Bank
tomciolkosz@accessnationalbank.com

More Related Content

What's hot

Data theft
Data theftData theft
Data theft
Laura
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
Don Grauel
 

What's hot (19)

Data theft
Data theftData theft
Data theft
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Internet fraud
Internet fraudInternet fraud
Internet fraud
 
Fraud An International Perspective
Fraud   An International PerspectiveFraud   An International Perspective
Fraud An International Perspective
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
 
Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detecting
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Scams and-fraud-presentation
Scams and-fraud-presentationScams and-fraud-presentation
Scams and-fraud-presentation
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Cyngus vlct leave behind v3
Cyngus vlct leave behind v3Cyngus vlct leave behind v3
Cyngus vlct leave behind v3
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 

Viewers also liked (16)

About Aritzia 2011
About Aritzia 2011About Aritzia 2011
About Aritzia 2011
 
Why Access National Bank 2012
Why Access National Bank 2012Why Access National Bank 2012
Why Access National Bank 2012
 
Hawkley reunion office 2010 2
Hawkley reunion office 2010 2Hawkley reunion office 2010 2
Hawkley reunion office 2010 2
 
Powerpoint first one of many to come
Powerpoint first one of many to comePowerpoint first one of many to come
Powerpoint first one of many to come
 
Panamericanos clausura 2
Panamericanos clausura 2Panamericanos clausura 2
Panamericanos clausura 2
 
Access 4 Q11 Earnings
Access 4 Q11 EarningsAccess 4 Q11 Earnings
Access 4 Q11 Earnings
 
Exproject2
Exproject2Exproject2
Exproject2
 
Chicno project
Chicno project Chicno project
Chicno project
 
Mexican final project yaya
Mexican final project yayaMexican final project yaya
Mexican final project yaya
 
基于增量的挖掘关联规则
基于增量的挖掘关联规则基于增量的挖掘关联规则
基于增量的挖掘关联规则
 
Modelo pop
Modelo popModelo pop
Modelo pop
 
A NOSA VILA: BUEU
A NOSA VILA: BUEUA NOSA VILA: BUEU
A NOSA VILA: BUEU
 
11 класс информационная культура человека
11 класс информационная культура человека11 класс информационная культура человека
11 класс информационная культура человека
 
Impuesto sobre las ventas por pagar
Impuesto sobre las ventas por pagarImpuesto sobre las ventas por pagar
Impuesto sobre las ventas por pagar
 
Edat mitjana
Edat mitjanaEdat mitjana
Edat mitjana
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 

Similar to FHRBOC Preventing NFP Banking Fraud

PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 

Similar to FHRBOC Preventing NFP Banking Fraud (20)

IB Fraud
IB FraudIB Fraud
IB Fraud
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
CRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdfCRC Alert November 2019 Final.pdf
CRC Alert November 2019 Final.pdf
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Reclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To RecoveryReclaiming Your Identity: 10 Steps To Recovery
Reclaiming Your Identity: 10 Steps To Recovery
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 
BBB Market Monitor: April 2017
BBB Market Monitor: April 2017BBB Market Monitor: April 2017
BBB Market Monitor: April 2017
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 

FHRBOC Preventing NFP Banking Fraud

  • 1. Tom Ciolkosz Sarah McConnell James Foster Preventing Nonprofit Banking Fraud and the Tools You Can Use!
  • 2. NFP Banking Fraud & Tools for You! • In the news • Fraud  The fraud triangle  Internal controls • Protecting your online environment • Banking financial fraud • Tools for you! • Checklist • Resources
  • 4. Washington Post Inside the hidden world of thefts, scams and phantom purchases at the nation’s nonprofits ∙ For 14 years, the American Legacy Foundation has managed hundreds of millions of dollars drawn from a government settlement with big tobacco companies, priding itself on funding vital health research and telling the unadorned truth about the deadly effects of smoking. ∙ Yet the foundation, located just blocks from the White House, was restrained when asked on a federal disclosure form whether it had experienced an embezzlement or other “diversion” of its assets. By Joe Stephens and Mary Pat Flaherty October 26, 2013
  • 5. Washington Post Inside the hidden world of thefts, scams and phantom purchases at the nation’s nonprofits ∙ Legacy officials typed “yes” on Page 6 of their 2011 form and provided a six- line explanation 32 pages later, disclosing that they “became aware” of a diversion “in excess of $250,000 committed by a former employee.” They wrote that the diversion was due to fraud and now say they believe they fulfilled their disclosure requirement.
  • 6. Washington Post Inside the hidden world of thefts, scams and phantom purchases at the nation’s nonprofits ∙ Records and interviews reveal the full story: an estimated $3.4 million loss, linked to purchases from a business described sometimes as a computer supply firm and at others as a barbershop, and to an assistant vice president who now runs a video game emporium in Nigeria. ∙ Also not included in the disclosure report: details about how Legacy officials waited nearly three years after an initial warning before they called in investigators.
  • 7. Question #1 Have you experienced fraud in your organization or personal life?
  • 8. What is Fraud? Fraud is a deception deliberately practiced in order to secure unfair or unlawful gain (adjectival form fraudulent; to defraud is the verb). The two main types of fraud • Misappropriation of assets – theft of company's assets • Fraudulent financial reporting – misrepresentations in financial reports
  • 9. How Prevalent is Fraud? • 10% of fraud occur in not-for-profit organizations • It typically lasts 18 months • Approximately 55% were committed by single individuals • Median loss of $100,000 ∙ Statistics ∙ Primary Areas of Weaknesses* • Lack of Controls • Override of Existing Controls • Lack of Management review • Poor Tone at the top *One of these factors was present in over 80% of the cases studied * According to the Association of Certified Fraud Examiners
  • 10. What are the Clues?
  • 11. Behavioral Red Flags • Living beyond means • Refusal to take vacation • Unwillingness to share duties
  • 12. Unique Challenges to Non-Profits More trusting culture Lack of financial expertise in management positions Lack of resources Red Flags! • Living beyond means • Refusal to take vacation • Unwillingness to share duties
  • 13. What Can You Do – Internal Controls!!  Two types of internal controls • Deterrence • Detection
  • 14. Question #2 What are your best practices for fraud detection and deterrence?
  • 15. Protecting Your Online Environment
  • 17. Social Engineering: Phishing Phishing, relates to acquiring that confidential information by masquerading as a trustworthy entity in an electronic communication. Watch to watch for: • Links to email • Spelling and grammar • Popular Company • Urgency
  • 18.
  • 19. Spoofing, is when a spammer sends out emails using your email address in the From: field. The idea is to make it seem like the message is from you. What to watch for: You see mailer daemon error messages (returned emails) in your inbox that do not match any messages you sent You get messages from people who received email from you that you did not send. Social Engineering: Spoofing
  • 20. What is a Keylogger? Whether it is called a keylogger, spyware or monitoring software, it can be the equivalent of digital surveillance, revealing every click and touch, every download and conversation. Malicious intent: • Account information • Credit card numbers • User names • Passwords Keystroke Logging
  • 21. Question #3 Have you ever experienced a social engineering scheme?
  • 22. Protect your online environment ∙ Be sure your bank uses a Two-factor authentication process. The best way to utilize a two factor authentication communication is: • Email • Cell Phone • Phone
  • 23. Further Controls ∙ Educate your employees ∙ A strong security program should be paired with employee education about the warning signs and safe practices that you can implement. ∙ The best secure password is: • Password • 1234 • May2009marie • S97@fde
  • 25. Check Fraud Another way is for the fraudsters to get access to your money is to create counterfeit checks through stealing your check stock or obtaining a legitimate check and copying it. Solution: Check Positive Pay - This is an antifraud service offered by banks to help protect businesses against fraud from altered and counterfeit checks. Positive pay assists in the creation, transmission, and research of check records sent to the bank for payment.
  • 27. Problem: Through remote deposit capture or mobile phone deposit technology, check fraud involves individuals double debiting. For example, an organization issues a check to an individual and the individual deposits the check through a scanner or smartphone. The individual then quickly takes it to another bank to cash it. Both transactions flow through the check clearing process, which could result in the account being debited twice. This could go undiscovered until the account is reconciled. Check Deposit Fraud
  • 28. ACH Fraud Problem: The fraudster targets nonprofit organization accounts in search of bigger payouts. Fraudsters will steal online banking credentials by hacking computer networks and installing key logging software or malware. Once the thief has the right credentials, they can access the organization's accounts and send out wires or ACH’s to another country and into their own bank accounts. Solution: ACH Positive Pay - This allows clients to assign filtering or blocking services to various accounts based on company IDs, standard entry class codes, and dollar amounts.
  • 29. Credit Card Fraud ∙ DVM Chip • Change in laws ∙ Fraudulent transactions ∙ Inventory and review of cards • Count • Physical location • Limited use
  • 30. Question #4 Has anyone has a corporate or personal credit card compromise? What about a bank account?
  • 31. Question #5 What controls do you have in place to prevent bank fraud?
  • 32. Pay attention and react quickly ∙ Look out for unexplained account or network activity, pop ups, and suspicious emails. If detected, immediately contact your financial institution, stop all online activity and remove any systems that may have been compromised. ∙ Also consider ACH and Positive Pay ∙ Do you perform bank reconciliation on your operating account? • Monthly • Weekly • Daily • Quarterly
  • 33. Understand your responsibilities and liabilities The Electronic Funds Transfer Act (EFT), also known as Regulation E, was implemented in the U.S. in 1978 to establish the rights and liabilities of consumers as well as the responsibilities of the financial institution in EFT activities. Regulation E covers a consumer under certain conditions, limiting loss to $50 if the institution is notified within two business days. There currently are no similar loss protections for commercial customers The account agreement with your bank will detail what commercially reasonable security measures are required by your organization.
  • 34. What can you do tomorrow? Talk to your IT department • How are you protected from phishing, keystroke logging, etc.? • What training can you regularly give your employees? • What is your password policy? Talk to your bank • Is Positive Pay available? • Do they offer credit card protection?
  • 35. What can you do tomorrow? Review your internal controls (now and at least annually) • Bank reconciliations • Vacation policy • Segregation of duties • Credit card use What is your culture for sharing fraud concerns? What is the tone at the top?
  • 37. Resources You can also visit the following websites to learn more about how to protect your nonprofit organization: • Johnson Lambert LLP website: www.johnsonlambert.com • Access National Bank website: www.accessnationalbank.com • ACFE Fraud Prevention: http://www.acfe.com/uploadedFiles/ACFE_Website/Content/documents/Fraud_Pre v_Checkup_DL.pdf • Greater Washington Society of CPAs: Nonprofit Accounting Basics: http://www.nonprofitaccountingbasics.org/topic/internal-controls • Federal Communications Commission: 10 Cybersecurity Strategies for Small Business https://www.uschamber.com/sites/default/files/legacy/issues/defense/files/10_ CYBER_Strategies_for_Small_Biz.pdf
  • 38. Thank you for your participation! Sarah McConnell Principal Johnson Lambert LLP smcconnell@johnsonlambert.com James Foster CFO Northern Virginia Association of Realtors jfoster@nvar.com Tom Ciolkosz Vice President Commercial Banker Access National Bank tomciolkosz@accessnationalbank.com