Fraud Prevention – Application Security is a Great Place to Start

Fraud Prevention – Application Security is a Great Place to Start

Fraud prevention policies and procedures can seem overwhelming to organizations that have grown and developed without those areas in there forethought. So, where do they start? Unfortunately, there is no exact answer on where an organization should start a risk assessment to determine their potential fraud risks. A great place to start is in the accounting application, because it is the heart of most organizations and often holds more data than just accounting. By analyzing an accounting application, an organization will quickly realize which accounting areas need more investigations and controls. 

Let’s first talk about a few of the potential liabilities of an unsecure accounting package to an organization.

-         No matter what segregation of duties policy you have in place an insecure accounting package nullifies that control.

-         An unsecure accounting package allows for potential identity theft of employees, customers and vendors.

-         Depending on what makes the accounting package insecure, users sharing passwords possibly, logging may not be able to be relied on making fraud investigations tougher.

-         Potential ghost employees added to payroll.

-         Fraudulent checks written.

-         Inventory disposed of and stolen by employees.

-         Confidential financial data given to competitors.

The liabilities caused by an insecure accounting program can be solved with properly written policies and procedures and applying them to the accounting application. I have seen organization after organization with well-written application security policies that do not match the actual security policies in their accounting program. Most of the time it is what I call security creep. Generally, some type of unplanned hurried event causes this:

-         Vendor is at the back door, check needs to be written so security is adjusted since the employees with authorization are out to lunch.

-         Employee is on vacation and the boss needs something done, report, journal entry, etc., so security adjustments are made.

-         Data migration from the old system means more users are needed for input. Security never adjusted after the project.

It can also be caused by an employee changing positions and the employee’s security not being correctly set for their new position. For example, if a user has check writing privileges and then moves to the Accounts Receivable department there rights to write checks in the accounting applications need to be removed. Security creep will happen and that is why you need to look at this area annually. 

Most accounting applications today provide adequate user security, but are rarely used to their potential because of efficiency. What level of efficiency is your organization willing to gamble? A check writing fraud scheme could cost your organization six figures or more. Is the ability to quickly write a check worth that much?

If your organization would like to continue a discussion on this topic, or other fraud related topics, please email me at [email protected].


要查看或添加评论,请登录

Dave Hammarberg的更多文章

  • Vendor Theft

    Vendor Theft

    Most organizations rely on vendors to succeed in their mission. Those vendors could be providing a product or a service.

  • It Takes a Village to Prevent Fraud

    It Takes a Village to Prevent Fraud

    The title may be a take-off from another common phrase, but I think that in this context it is true. Having one…

  • Small Organization Fraud is a Big Problem

    Small Organization Fraud is a Big Problem

    “Small organizations had a significantly lower implementation rate of anti-fraud controls than large organizations…

  • Integrity in the Workplace

    Integrity in the Workplace

    There is a common thread in all frauds, lack of integrity. The Merriam-Webster dictionary defines integrity as a firm…

    1 条评论
  • Victims of Tax Fraud

    Victims of Tax Fraud

    I recently read an article by Accounting Today, https://www.accountingtoday.

  • Why are Older Adults More Vulnerable to Fraud?

    Why are Older Adults More Vulnerable to Fraud?

    It seems like older generations are more trusting and are more susceptible to financial trickery. These are the same…

  • When Fraud Detection Procedures Become Stagnate

    When Fraud Detection Procedures Become Stagnate

    The best laid plan can and will go awry without continual monitoring and updates. The best procedures to detect fraud…

  • 'Tis the Season to Lower Employees Perceived Opportunity

    'Tis the Season to Lower Employees Perceived Opportunity

    The Christmas season is a great time of year to get together with family and friends and celebrate the birth of a King.…

  • Fraud Detection Success

    Fraud Detection Success

    You don’t often hear success stories in detecting fraud, but occasionally you do. Walmart gets a bad rap for a lot of…

  • Spear-Phishing Scams

    Spear-Phishing Scams

    Spear phishing, according to Norton by Symantec, is an email that appears to be from an individual or business that you…

社区洞察