{"id":9146,"date":"2026-01-30T12:46:22","date_gmt":"2026-01-30T09:46:22","guid":{"rendered":"https:\/\/teolupus.com\/?p=9146"},"modified":"2026-01-30T12:46:22","modified_gmt":"2026-01-30T09:46:22","slug":"bulten-jan2026","status":"publish","type":"post","link":"https:\/\/teolupus.com\/en\/bulten-jan2026\/","title":{"rendered":"For a Safe Tomorrow \u2013 January 2026"},"content":{"rendered":"<p>This bulletin is available for <a href=\"https:\/\/teolupus.com\/wp-content\/13-for-a-safe-tomorrow-january-2026.pdf\">download as a PDF<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>FRAUD AND MISUSE<\/h2>\n<p><span style=\"font-weight: 400;\">According to the 2024 ACFE Global Study on Business Fraud and Exploitation International Report, Companies lose approximately 5% of their annual revenue due to fraud and misuse. Approximately 32% of fraud and misuse are due to a lack of internal controls, and 19% are due to breaches of existing internal controls.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fraud and misuse in the real sector during the 2020\u20132024 period increased in both variety and frequency due to factors such as the global pandemic, digitalization, inflationary pressures, and supply chain disruptions.<\/span><\/p>\n<h2><b><a href=\"https:\/\/teolupus.com\/wp-content\/uploads\/Fraud-misuse-teolupus-consultancy.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9145\" src=\"https:\/\/teolupus.com\/wp-content\/uploads\/Fraud-misuse-teolupus-consultancy.jpg\" alt=\"\" width=\"1200\" height=\"800\" title=\"\" srcset=\"https:\/\/teolupus.com\/wp-content\/uploads\/Fraud-misuse-teolupus-consultancy.jpg 1200w, https:\/\/teolupus.com\/wp-content\/uploads\/Fraud-misuse-teolupus-consultancy-300x200.jpg 300w, https:\/\/teolupus.com\/wp-content\/uploads\/Fraud-misuse-teolupus-consultancy-1024x683.jpg 1024w, https:\/\/teolupus.com\/wp-content\/uploads\/Fraud-misuse-teolupus-consultancy-768x512.jpg 768w, https:\/\/teolupus.com\/wp-content\/uploads\/Fraud-misuse-teolupus-consultancy-900x600.jpg 900w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/b><\/h2>\n<h2><b>MAIN CAUSES OF FRAUD AND ABUSE<\/b><\/h2>\n<p><strong>1- Economic Pressure and Financial Difficulties<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inflation, cash flow problems, and increasing financing costs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pressure on performance and profitability<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Narrowing profit margins in businesses<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Result: Employees and managers seeking &#8220;shortcuts to success.&#8221;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>2- Weak Internal Control and Audit Structures<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of separation of duties<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Weak or passive internal audit<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unclear authority limits<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Result: Fraud is easier to conceal and is detected late<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>3- Gaps Arising from Digitalization<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Weak authorization structure in ERP and accounting systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cyberattacks, phishing<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Payment instructions via a fake email<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Result: High-value financial losses and data breaches<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>4- Lack of Ethical Culture and Weak Management Understanding<\/strong><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> Top management ignores unethical behavior<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Lack of written ethical rules<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Lack of a whistleblowing mechanism<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Result: Normalization of fraudulent behavior<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong>5- Covid-19 Pandemic and Remote Working<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Physical<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of control<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Weaknesses in documentation and approval processes<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Result: Abuses, especially in purchasing and payment processes<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>MOST COMMON TYPES OF FRAUD IN THE REAL SECTOR<\/b><\/h2>\n<p><strong>1- Employee-Related Fraud<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Type Description<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Embezzlement: Taking money\/products from cash and inventory<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fake expense, Unreal expense receipt<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fictitious employee Payroll fraud<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Abuse of authority, Irregular approval<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>2- Supplier and External Fraud<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fake invoice<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Collusion with the supplier<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incomplete delivery of goods<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inflated prices<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>3- Managerial Fraud<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Financial statement manipulation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inflation of income<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deferral of expenses<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Making the balance sheet appear better than it is<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>SOME CONSEQUENCES OF FRAUD AND ABUSE<\/b><\/h2>\n<p><strong>1- Financial Losses<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Direct loss of money<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compensation<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Legal process costs<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>2- Loss of Reputation<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Decreased customer trust<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Bank and investor relations Damage<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Brand value decreases<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>3- Legal and Criminal Sanctions<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tax audits<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Criminal cases<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Bidding bans<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>4- Operational Disruptions<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Process halts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Supply chain disruption<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Decreased staff motivation<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>5- Deterioration of Corporate Culture<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Perception of &#8220;They won&#8217;t get caught anyway.&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Contagious ethical erosion affecting other employees<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Fraud and abuse in the real sector are risk factor that needs to be managed. Examples include authorization and approval management, inadequate or insufficient access controls, verbal approvals, fraudulent sales, fake suppliers, fake returns, exploited discounts, fictitious employees, urgent payments, intra-company collusive transactions, technology scams, etc. Lessons can be learned when the causes are thoroughly examined. A strong risk management and internal control system, a robust and adequate assurance environment, will detect vulnerabilities promptly, reduce opportunities for fraud and abuse, and guide organizations in taking timely precautions.<\/span><\/p>\n<p><b>Alp BULU\u00c7<\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">TeoLupus Partner<\/span><\/i><\/p>\n<p><a href=\"mailto:alp.buluc@teolupus.com\"><i><span style=\"font-weight: 400;\">alp.buluc@teolupus.com<\/span><\/i><\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>What is Fraud vs. Abuse?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Fraud and abuse are related concepts often used in the context of unethical or illegal activities, but they have distinct meanings.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>Fraud:<\/b><span style=\"font-weight: 400;\"> Fraud involves intentional deception or misrepresentation to gain an unfair or dishonest advantage. It often involves deceit, manipulation, or false information to obtain financial or personal benefits. Examples include credit card fraud, identity theft, insurance fraud, and Ponzi schemes.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">&#x200d;<\/span><b>Abuse:<\/b><span style=\"font-weight: 400;\"> Abuse refers to the misuse or excessive use of something in a way that is harmful or goes beyond its intended purpose. In the digital realm, abuse often refers to misusing systems, services, or platforms. Examples include email spamming, click fraud, and the use of bots to manipulate social media engagement.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Common Fraud Schemes vs Common Abuse Tactics<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Some of the most common types of fraud include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Account Takeover:<\/b><span style=\"font-weight: 400;\"> Unauthorized individuals gain access to user accounts, often through phishing or hacking, and exploit them for financial gain or to impersonate the account holder.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Application Fraud<\/b><span style=\"font-weight: 400;\">: Fraudsters provide false information or documents when applying for services, credit, or accounts, with the intent of securing benefits dishonestly.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Business<\/b> <b>Email<\/b> <b>Compromise<\/b><span style=\"font-weight: 400;\"> (BEC): Cybercriminals compromise business email accounts to conduct scams, including invoice fraud, which trick organizations into making payments to fraudulent accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Collusion<\/b><span style=\"font-weight: 400;\">: Multiple individuals work together, often within an organization, to manipulate systems, transactions, or data for illegal gain.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Insider<\/b> <b>Threats<\/b><span style=\"font-weight: 400;\">: Individuals with authorized access to systems and data misuse their privileges for personal gain, often involving theft of sensitive information or fraud against their own organization.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">On the other hand, some of the most common types of abuse include:<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Email<\/b> <b>Spam<\/b><span style=\"font-weight: 400;\">: Sending unsolicited and often irrelevant emails to many recipients.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Click<\/b> <b>Fraud<\/b><span style=\"font-weight: 400;\">: Intentionally clicking on online ads to generate revenue or exhaust an advertiser&#8217;s budget.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Social<\/b> <b>Media<\/b> <b>Manipulation<\/b><span style=\"font-weight: 400;\">: Using bots or fake accounts to inflate likes, shares, and comments on social media posts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Content<\/b> <b>Scraping<\/b><span style=\"font-weight: 400;\">: Unauthorized copying of online content for commercial gain.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>API<\/b> <b>Abuse<\/b><span style=\"font-weight: 400;\">: Misusing application programming interfaces (APIs) to overwhelm servers or access unauthorized data.<\/span><\/li>\n<\/ul>\n<h2><\/h2>\n<h2><strong>Differences between Fraud vs. Abuse<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Fraud is centered around intentional deception for personal gain, often involving financial harm. On the other hand, abuse can be intentional or unintentional and may involve misuse or overuse of resources or systems without necessarily gaining direct economic benefits. Both can have negative impacts on individuals and businesses.<\/span><\/p>\n<h2><\/h2>\n<h2><strong>Solutions for Fraud vs. Abuse<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Effective solutions for preventing and mitigating fraud and abuse often involve a combination of technological tools, process improvements, and user education. Here are some general strategies:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the realm of cybersecurity, a multifaceted approach is essential to safeguard sensitive systems and information. Employing advanced data analytics forms a formidable shield against potential threats. By meticulously scrutinizing data, one can uncover subtle anomalies and behaviors that often signal the presence of fraud or abuse, enabling swift and effective countermeasures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">User protection extends further with the strategic implementation of multi-factor authentication and identity verification. This preventive measure is a robust barrier, deterring unauthorized access and fortifying security layers. Leveraging the power of machine learning and AI bolsters defenses even further. Through continuously analyzing evolving tactics, these algorithms adeptly discern and adapt to novel fraudulent or abusive activities, maintaining an unwavering vigilance against threats.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">To ensure a resilient security ecosystem, consistent monitoring and auditing are paramount. Regular assessments allow companies to proactively detect and address suspicious activities, nipping potential breaches. Moreover, empowering users with knowledge is the backbone of a good defense strategy. Educating individuals about prevalent fraudulent and abusive tactics empowers them to recognize and thwart potential threats, creating a united front against cyber adversaries.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>Fraud, Corruption, and Money Laundering: The Hidden Dangers in Business<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It rarely starts with fireworks. It\u2019s usually a quiet beginning. More often, it begins with small, almost invisible acts: a trusted employee alters a few invoices, a procurement officer accepts a \u201cgift\u201d from a supplier, or a large deposit slips quietly into a company\u2019s account.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On their own, these events might seem minor quirks of business life. Yet behind them lies the shadowy, interconnected world of fraud, corruption, and money laundering. These risks do more than drain money, they destroy trust, distort decision-making, and damage reputations. These are not just compliance buzzwords; they are forces that can drain a business of profit, cripple competitiveness, and erode the very trust that makes markets function.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In today\u2019s business environment, where financial transactions are global, digital, and fast-moving, these risks are not confined to large corporations or banks. They affect SMEs, family businesses, and public institutions alike. And while they can feel overwhelming, understanding them is the first step to defending against them.<\/span><\/p>\n<p><b>Fraud: When trust becomes a weapon<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Fraud is the unlawful, intentional act of deception designed to secure unlawful gain or cause harm to another party. Unlike errors or negligence, fraud is deliberate, concealed, and self-serving. It takes many forms, from financial scams, inflated expense claims, payroll manipulation, creating fictitious vendors, or misreporting revenue to corporate deceit to personal deception. Fraudsters exploit gaps in systems and often rely on the trust placed in them to cover their tracks.<\/span><\/p>\n<p><b>The key elements of fraud<\/b><\/p>\n<p><b>False representation<\/b><span style=\"font-weight: 400;\">: Fraud begins with a false representation, whether a lie, a misleading statement, or even the deliberate omission of critical information. The purpose of this misrepresentation must be to deceive the victim.<\/span><\/p>\n<p><b>Knowledge of falsity<\/b><span style=\"font-weight: 400;\">: The perpetrator must know that what they are presenting is untrue. Fraud cannot be excused as ignorance or error; deliberate awareness of the falsity is essential.<\/span><\/p>\n<p><b>Intention to defraud<\/b><span style=\"font-weight: 400;\">: Fraud requires intent. The perpetrator must intend to cause harm or secure an unfair advantage, influencing the victim to act or not act based on the false information provided.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Resulting loss or damage<\/b><span style=\"font-weight: 400;\">: For fraud to be proven, the victim must suffer measurable harm as a direct result of the deception. This may be financial, reputational, or another form of tangible loss. Without demonstrable damage, a fraud claim cannot succeed.<\/span><\/p>\n<p><b>Red flags:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u201cToo good to be true\u201d financial results.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Employees living beyond their apparent means.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Resistance to oversight or sharing responsibilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Repeated overrides of internal controls.<\/span><\/li>\n<\/ul>\n<p><b>Example:<\/b><span style=\"font-weight: 400;\"> A mid-sized firm uncovered that a finance clerk had created ghost suppliers and diverted funds into personal accounts. It went undetected for months because the same individual managed both authorizations and reconciliations due to no segregation of duties.<\/span><\/p>\n<p><b>Mitigation:<\/b><span style=\"font-weight: 400;\"> Preventing fraud requires a blend of strong systems and culture. Internal controls, segregation of duties, regular audits, and data analytics can uncover anomalies early. Just as important is fostering an environment where employees feel safe reporting suspicious activity. Fraud thrives in silence; transparency is its antidote.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Corruption: When power is abused<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">While fraud is often hidden in the books, corruption is woven into relationships and influence. It occurs when power entrusted to an individual is abused for personal gain. This misuse of power breaks down the trust between parties and weakens the very foundation of democracy. Beyond politics, corruption stifles economic growth, deepens poverty, and widens inequality<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Corporate corruption takes root when businesses abandon ethics in pursuit of profit or competitive advantage. It manifests through practices such as bribery, fraud, insider trading, money laundering, and tax evasion. Sometimes it\u2019s blatant; other times, it hides in \u201cgrey areas\u201d like excessive hospitality or conflicts of interest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The damage runs deep, weakening economies, undermining fair competition, stifling innovation, and eroding consumer rights. Its ripple effects extend beyond boardrooms, driving economic inequality and even contributing to environmental harm.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Key elements of corruption:<\/b><\/h2>\n<p><b>Abuse of Entrusted Power: <\/b><span style=\"font-weight: 400;\">Corruption occurs when individuals in positions of authority misuse the power given to them for personal advantage. This could be a government official influencing legislation for private benefit, or a corporate manager manipulating procurement processes. The abuse lies not only in the illegal act but in betraying the confidence placed in that role.<\/span><\/p>\n<p><b>Breach of Trust or Duty: <\/b><span style=\"font-weight: 400;\">At the heart of corruption is broken trust. Leaders, officials, or employees are expected to act in the best interests of the people, organization, or institution they serve. When they act against this duty for bribes, favours, or personal motives they compromise both ethical and legal obligations.<\/span><\/p>\n<p><b>Personal or Organizational Gain: <\/b><span style=\"font-weight: 400;\">Corruption is always about benefit, whether it\u2019s personal enrichment (money, gifts, favours) or organizational advantage (contracts, licenses, market dominance). This gain comes at the expense of fairness and transparency, often disadvantaging those who follow the rules.<\/span><\/p>\n<p><b>Often Involves Collusion: <\/b><span style=\"font-weight: 400;\">Corruption rarely happens in isolation. It often requires cooperation between the bribe giver and taker, between businesses and regulators, or between internal staff and external vendors. This collusion creates networks of corruption that are harder to detect and dismantle, making prevention even more critical.<\/span><\/p>\n<p><b>Red Flags:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unexplained gifts or \u201cconsulting fees.\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Overly cozy relationships with suppliers or customers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Repeated awards to the same vendor without competition.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lack of transparency in decision-making.<\/span><\/li>\n<\/ul>\n<p><b>Example:<\/b><span style=\"font-weight: 400;\"> A procurement officer consistently awarded contracts to a single supplier, despite inflated pricing and poor performance. Investigations revealed the officer had been enjoying overseas \u201cbusiness trips\u201d paid for by the vendor. The company not only paid more but also suffered reputational damage when the scheme came to light.<\/span><\/p>\n<p><b>Mitigation:<\/b><span style=\"font-weight: 400;\"> Strong anti-bribery policies, transparent procurement processes, and third-party due diligence are essential. Just as critical is leadership when executives refuse questionable perks and set a tone of integrity, employees follow.<\/span><\/p>\n<h2><\/h2>\n<h2><b>Types of fraud<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Fraud detection begins with an understanding of the <\/span><a href=\"https:\/\/www.findlaw.com\/criminal\/criminal-charges\/fraud.html#:~:text=For%20information%20regarding%20a%20specific,something%20of%20value%2C%20usually%20money\" target=\"_blank\" rel=\"noopener\"><b>types of fraud risk<\/b><\/a><span style=\"font-weight: 400;\"> organizations face. Generally speaking, they can be distinguished as internal and external.<\/span><\/p>\n<h3><b>Internal fraud<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As the term suggests, this is fraud committed by people within an organization. Some examples that any organization should beware of:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Accounting fraud<\/b><span style=\"font-weight: 400;\"> involves deliberately falsifying financial statements and misappropriation of assets. This can be done in any number of ways, including overstating or understating revenue, assets, or expenses.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mail fraud<\/b><span style=\"font-weight: 400;\"> involves using the U.S. Postal Service to commit fraud. For instance, if someone mails a contract regarding a fraudulent deal,\u202fthe government could pursue a fraud conviction against the person who sent it. <\/span><b>Wire fraud<\/b><span style=\"font-weight: 400;\"> is similar to mail fraud, except that non-postal transactions are used.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Check fraud<\/b><span style=\"font-weight: 400;\"> involves creating counterfeit checks to defraud another. Someone may attempt to\u202fgive a\u202f<\/span><a href=\"https:\/\/corporate.findlaw.com\/litigation-disputes\/civil-damages-for-passing-bad-checks.html\" target=\"_blank\" rel=\"noopener\"><b>bad check<\/b><\/a><span style=\"font-weight: 400;\">\u202fto a bank to\u202fwithdraw money that isn\u2019t theirs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Payroll fraud<\/b><span style=\"font-weight: 400;\">, which in some cases could be considered a form of accounting malfeasance, can take many forms: requests for fraudulent reimbursement, sales contracts that turn out not to be real, or paychecks for nonexistent employees.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Executives in a business may make <\/span><b>false claims on financial statements<\/b><span style=\"font-weight: 400;\"> to drive up its stock price or attract investors. Enron is an obvious example.<\/span><\/li>\n<\/ul>\n<h3><b>External fraud<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/synthetic-identity-fraud-what-is-it-and-how-to-combat-it\/\" target=\"_blank\" rel=\"noopener\"><b>Identity theft<\/b><\/a><span style=\"font-weight: 400;\"> occurs when someone uses another person\u2019s name, Social Security number, credit card number, or other personal information. This is done to open new accounts, make purchases, or take out loans. It is a common technique used by external bad actors pursuing one of the following types of fraud.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.thomsonreuters.com\/en-us\/posts\/investigation-fraud-and-risk\/fraud-driven-de-risking\/\" target=\"_blank\" rel=\"noopener\"><b>Bank fraud<\/b><\/a><span style=\"font-weight: 400;\">. Outsiders can illegally obtain money from a financial institution by any number of methods, most notably through false documents, forging signatures, or using stolen account information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In cases of <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/taking-a-proactive-approach-to-combatting-unemployment-insurance-fraud-with-technology\/\" target=\"_blank\" rel=\"noopener\"><b>insurance fraud<\/b><\/a><span style=\"font-weight: 400;\">, the person lies or withholds information to obtain insurance benefits or coverage to which they\u2019re not entitled. Techniques include <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/en\/insights\/articles\/identity-frauds-impact-on-the-insurance-sector\" target=\"_blank\" rel=\"noopener\"><b>using false identities<\/b><\/a><span style=\"font-weight: 400;\">, exaggerating the cost of damages, and faking injuries (which can include falsified medical documents).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/successful-fraud-prevention-starts-with-rigorous-identity-verification\/\" target=\"_blank\" rel=\"noopener\"><b>Benefits fraud<\/b><\/a><span style=\"font-weight: 400;\"> could be considered a kind of insurance fraud. Fraudsters will attempt to steal government benefits using false documents or false identities. They may also claim that they have a disability that makes it impossible for them to work.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/legal.thomsonreuters.com\/en\/insights\/articles\/clear-investigation-software-healthcare-fraud-101\" target=\"_blank\" rel=\"noopener\"><b>Healthcare fraud<\/b><\/a><span style=\"font-weight: 400;\"> could involve schemes related to pain management, insurance scams involving false documents or unnecessary treatments, and kickbacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Investment fraud<\/b><span style=\"font-weight: 400;\">. Investment fraudsters use false or misleading information to <\/span><a href=\"https:\/\/www.thomsonreuters.com\/en-us\/posts\/investigation-fraud-and-risk\/email-phishing-campaigns\/\" target=\"_blank\" rel=\"noopener\"><b>convince people to invest in a company<\/b><\/a><span style=\"font-weight: 400;\"> or an investment strategy. The perpetrator may claim to have some secret knowledge or expertise, something that the \u201cvery wealthy\u201d know that ordinary folks do not.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Many of these forms of fraud can also be instances of <\/span><b>cyberfraud<\/b><span style=\"font-weight: 400;\">. The best-known examples are phishing and <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/en\/insights\/articles\/ransomware-attacks-what-at-risk-companies-need-to-know\" target=\"_blank\" rel=\"noopener\"><b>ransomware attacks<\/b><\/a><span style=\"font-weight: 400;\">. Cybercriminals are typically looking to lock up an organization\u2019s IT system for ransom payments or to make off with its valuable data.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Some of these external forms of fraud can also be committed internally. Bank fraud is an obvious example, though an organization insider might also participate with an outsider in investment fraud or insurance fraud.<\/span><\/p>\n<h2><\/h2>\n<h2><b>Future fraud risk trends<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">History suggests that fraud risk will never disappear. With digital technology increasingly used as a fraud tool, technology will also play a key part in risk strategy as organizations face new fraud risks.<\/span><\/p>\n<h3><b>Synthetic identities<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Digital technology is enabling individuals and fraud gangs to create <\/span><b>synthetic identities<\/b><span style=\"font-weight: 400;\">\u2013fake identities built upon real Social Security numbers or other purloined individual data. According to the McKinsey Institute, the use of synthetic identities is involved in about 85% of all fraud worldwide. This kind of identity fraud is expected to proliferate precipitously.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That doesn\u2019t mean that phishing attacks using \u201crealistic\u201d emails supposedly from vendors and colleagues will let up. But cyberfraud is starting to take on new and disturbing forms. Fraudsters can disguise themselves as company executives and request accounting to immediately pay a fraudulent invoice or transfer money to a phony bank account.<\/span><\/p>\n<h3><b>Artificial intelligence<\/b><\/h3>\n<p><a href=\"https:\/\/www.thomsonreuters.com\/en-us\/posts\/investigation-fraud-and-risk\/ai-aml-challenges-acams\/\" target=\"_blank\" rel=\"noopener\"><b>Fraudsters can use artificial intelligence<\/b><\/a><span style=\"font-weight: 400;\"> (AI) to more effectively create synthetic identities or more convincingly disguise themselves. But AI also can help organizations combat AI and <\/span><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/how-ai-can-safeguard-your-business\/\" target=\"_blank\" rel=\"noopener\"><b>safeguard their business<\/b><\/a><span style=\"font-weight: 400;\">. AI can analyze large data sets to identify patterns of behavior that may indicate fraudulent activities.\u202fMachine learning algorithms are developing predictive models that can identify which individuals or groups are more likely to commit fraud. AI also could be used in verifying customer or applicant identities.<\/span><\/p>\n<h3><b>Multi-channel approaches<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With fraud becoming increasingly complex, organizations will need to break down departmental silos to develop a risk management strategy that looks across numerous data points and risk signals. Such an approach can reduce risk and prevention expenses while making risk prevention, risk audits, and risk mitigation efforts more effective and timely.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.fraud.net\/glossary\/fraud-vs-abuse#what-is-fraud-vs-abuse\" target=\"_blank\" rel=\"noopener\">Fraud.net<\/a><\/p>\n<p><a href=\"https:\/\/laross.co.za\/fraud-corruption-and-money-laundering-the-hidden-dangers-in-business\/#:~:text=Financial%20losses%3A%20Companies%20may%20suffer,customers%2C%20suppliers%2C%20and%20investors.\" target=\"_blank\" rel=\"noopener\">Laross.co.za<\/a><\/p>\n<p><a href=\"https:\/\/legal.thomsonreuters.com\/blog\/the-fundamentals-of-fraud-risk\/#head-2\" target=\"_blank\" rel=\"noopener\">Thomsonreuters.com<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This bulletin is available for download as a PDF. &nbsp; FRAUD AND MISUSE According to the 2024 ACFE Global Study on Business Fraud and Exploitation International Report, Companies lose approximately&#8230;<\/p>\n","protected":false},"author":2,"featured_media":9145,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[930],"tags":[],"class_list":{"0":"post-9146","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-bulletin"},"_links":{"self":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/9146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/comments?post=9146"}],"version-history":[{"count":1,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/9146\/revisions"}],"predecessor-version":[{"id":9147,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/9146\/revisions\/9147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media\/9145"}],"wp:attachment":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media?parent=9146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/categories?post=9146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/tags?post=9146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}