Audimation Services has been acquired by Caseware International Learn More.
As the world fights against the spread of COVID-19, many businesses are in the front lines of the economic impact. With employees working remotely, the risk of fraud increases considerably. CaseWare IDEA® has integrated features dedicated to help your team work more efficiently, prevent fraud and data theft, and safeguard your profits.
With a proactive examination of fraud risk factors, such as pressures, incentives, opportunities, and rationalizations, increased areas of vulnerability can be identified. The Discovery feature uses Analytic Intelligence to identify trends and outliers displayed in dashboards to track high-risk areas that can be further refined. If you’re uncertain where to start, Discovery is a recommended preliminary resource to combine with the other critical areas outlined below.
Remote work makes monitoring payroll a more complicated endeavor and increases vulnerabilities to fraud. In addition, separation of duties becomes challenging to enforce, with basic tasks such as writing and signing checks. As a result, payroll fraud is much harder to detect. For example, an employee with administrative rights can set up a false employee ID and arrange for payroll checks to be mailed to a P.O. Box address.
Payroll errors may be found by cross-matching a list of existing employees with payroll records. This task is simplified by using a data analysis tool to join fields from separate databases to test for matching or non-matching data across files.
Extractions, or exception testing, can be used to help isolate information for review. By applying the extraction function, user-defined criteria can isolate paychecks that did not have taxes withheld or analyze addresses to help uncover ghost employee schemes.
Critical Data Fields: Payroll Master File
During times of uncertainty and financial instability, employees holding corporate credit cards or purchasing cards may be tempted to use them for personal interests.
Travel and entertainment expenditures are usually a significant business expense and may often be the difference between generating a profit or loss for a given the period. It is also an area where controls are not as stringent as they should be. Frequently, violators are managers or executives who consider themselves above scrutiny due to their level or seniority in the organization.
For example, a CFO was prosecuted for stealing more than $1 million by falsifying expense reports for employees who had left the company. By using data analysis, the investigating auditor simply joined files to compare employee release dates with reimbursement dates – excluding reimbursements to employees who had left within 14 days. By joining these two data sets, the auditor was able to see that the CFO was approving expense reports for employees who had left the company several months prior.
Critical Data Fields: Cardholder master, expense reports, etc.
Work-from-home policies often require staff to log their work hours. While most employees are honest, some may take advantage of the reduced oversight. When budgets are tight, many companies reduce overtime hours for non-essential staff.
IDEA can be used to analyze costs for special pay, overtime, premium, etc. Here are a few areas of application:
With work-from-home orders in place, unsupervised access to systems and files greatly increases risk levels. Data breaches and unprotected IP can leave your organization vulnerable to proprietary loss, legal issues, and even reputational damage. Employees working remotely from unsecured networks make your business data more suspectable to cybercrime.
During a recession, departing employees are more likely to take intellectual property with them to either sell or increase their chances of being hired by a competitor. Technology advancements make it easy for employees to steal data by loading it onto external drives or uploading data to a file hosting service, such as Dropbox. Both methods are inexpensive, require little effort, and have extensive memory capacity.
Organizations should not wait for an infraction before building a risk management program and using data mining and analysis to help minimize risk of breach and data loss. Preparation and planning can also be used in a proactive capacity to establish “what if” scenarios and work to reduce business risks. Risk assessment plans should be conducted frequently – annually at a minimum in conjunction with a comprehensive audit plan to consider risk and address control concerns identified by management. Detailed information should be documented on all systems used in the organization, including their ownership of the systems and the purpose and reliance within the company.
The key to establishing an appropriate risk-based methodology is based on the probability of occurrence and impact. First, create an inventory of all current and future business information systems. Interviews should be conducted with the business units that own and maintain each system to identify potential issues or security gaps.
Second, document the data life cycle for each system, including the data source, collection method, storage and back-up process, usage patterns, and distribution process, including retention and destruction. When assessing the data life cycles, be alert to the issues that may arise with separation of duties.
Third, document permission levels granted to specific employees or groups of employees in each system. Be sure to include the process of how permissions are granted and changed over time. Data analysis scripts can be developed to continuously review data and provide a summary of users by permission level, time of day/week, etc across all systems. Cross-matching may be applied to check for validation of user access to password-protected systems as well.
Here are a few immediate measures you can take to protect your data:
Firewall logs will increase under remote working conditions, generating thousands of network transmissions each day. IDEA’s ability to import PDFs and text files from firewall logs to test for approved host connection requests.
It can be used to analyze these logs to identify trends and exceptions, such as:
The best way to reduce fraud risk when employees are working remotely is to keep them informed and hold them accountable. Implementing a strong fraud policy, coupled with data analytics can mean the difference between keeping operations running smoothly or suffering significant losses.
Audimation is here to help you put data analytics to work! Whether you’re interested in expanding your use of IDEA or need additional support during this time of uncertainty, our team of experts are ready to assist.
Contact [email protected] to get started with your risk-reduction & cost-containment journey today.
This website has been designed for modern browsers. Please update. Update my browser now