Detecting High-Risk Transactions








RISK AND FRAUD MANAGEMENT


Detecting High-Risk Transactions

Know Who You Can Trust

As fraudsters develop more sophisticated schemes, collaborating in elaborate fraud rings, the threat of cybercrime increases. Online businesses are getting hit hard by fraud and abuse, and it's critical that fraud protection solutions save them from significant losses and a damaged reputation. During this 45-minute webinar; you will learn how to proactively assess risk to know which transactions to trust and which to reject. We'll discuss techniques that cyber criminals use to hide their identities and how you can detect this and act immediately to protect your business.

Top 5 Methods of Detecting Transaction Risk

1. Transaction Anomaly - Check mismatches, proxies and disabled components

2. Velocity Rules - Know when activity counts have been met or exceeded

3. Profile Risk - Check against aggregate profiles of risky accounts or devices.

4. Factual Evidence - Identify when a known bad device touches your site.

5. Account Associations - Identify and shut down entire fraud rings

You deserve the opportunity to review suspicious behavior before approving a new account, accepting a transaction or shipping product. Let us show you how a comprehensive, multi-layered approach–combining fact-based evidence with inference of risk–helps you sort the good from the bad at transaction time, so that you can take more business with confidence.

Device Reputation: Bad for Criminals, Good for Business.

Your company website has two kinds of visitors: good customers, and those ready to hurt your business. And while members of the second group won’t identify themselves, in many cases their computers will. That’s why your fraud management process must consider the device.

And for that, innovation Reputation Manager™ is the authority. Fighting the good fight, our clients have helped us amass a database on the behaviors and hidden relationships of over 350 million unique devices. That’s 350 million computers you can have knowledge of the first time they visit your site. Add to that the insights of our real-time investigative tools, and you have more than a fingerprint. You have a device reputation that can unearth a history of fraud, connection to a fraud ring, or even something as personal as too many accounts with your business.

Reputation Manager 360 offers the power to avoid losses by stopping known fraudsters before they get into your site. Take advantage of the experience of other online brands to immediately identify suspicious activity, understand the size and scope of a problem, and prevent future damage.

Sharing

Reputation Manager 360 is the only solution that puts the shared experience of global brands to work for your fraud team. Over 2,000 fraud professionals and 300 online brands contribute 50,000 details of fraud each day. With nearly 30% device crossover between industries, use Reputation Manager 360 to stop online criminals who have hit other brands before they impact your business.

Real-time business rules

Regardless how simple or complex the review of the transaction, results are returned in fractions of a second. Results include an overall risk score, a recommendation (Allow, Review, Deny) based on your thresholds, and the details all delivered in real time. Now your workflow takes over, stopping suspicious or fraudulent transactions, and routing them to a customer service rep.

Configurability

Use the right tool for the job; apply the appropriate level of security at each end-user touch point. With so much at stake, you want a thorough, penetrating look at direct and indirect factors surrounding a transaction. When the risk is lower, a quick check may suffice. Different types of business rules apply at end-user interaction points; login, account creation, account change, ecommerce. While some check only a few elements, others check every possible setting. Start with recommended rule sets for specific interaction points and configure them to your unique needs

Profiles

Devices hitting your site can appear to be new because the settings or components have been changed to appear as a legitimate customer. Profiles built from aggregated trends allow innovation to stop transactions that fall in high-risk categories even if there is no prior evidence of fraud. Our

Solutions Overview

One size never fits all, not for brands, not for banks, not for fighting fraud. You must apply the right level of protection based on what's at risk — the reputation of your business, losing money to a fraudster, blocking an account takeover attempt or protecting your community.

You need to know who you can trust without exposing personally identifiable information (PII) or slowing down the user experience. And it takes more than looking at 'moment in time' transaction credentials and settings; it requires leveraging the shared experience of online brands that face the same user authentication and verification challenges as you do.

 

Reputation Manager 360

For businesses with the most demanding fraud management challenges, this comprehensive service combines shared evidence of fraud and abuse from the world’s leading brands, configurable advanced real-time business rules, account relationships, device profiles and transaction anomaly checks.

Reputation Manager Basic

For online businesses with more basic fraud management challenges, this service combines configurable real-time business rules, account relationships, transaction anomaly checks and management of the brand’s own evidence of fraud and abuse. What is Corporate Investigation?

Corporate Investigation is the process of collecting facts that can serve as evidence before a court of law or any other body entrusted with the powers to solve an incident, through which the associative part of an accused in the commission of the crime or incident can be proved. It is all about detecting the truth, and the truth means nothing if it is not supported by evidence. It is a process during which the witnesses, exhibits and suspected offenders are identified.

Why Should I Study Corporate Investigation?

To know and understand the primary driving forces affecting crime in Africa than can be classified under the main categories of the external factors, namely political, social and economic, and the internal factor; the human / personal factor. For far too long, the courts and judicial system have not classified economic crimes in the same categories as crimes of a violent nature. Corporate or White Collar Crime – bluntly put – borders on economic sabotage.

Corporate Investigation: Course Structure

In order to complete The Short Course Certificate: Corporate Investigation, students will have to complete the following Modules:

  • Tactics for Winning
  • Report Writing (2 Modules)
  • Types of Corporate Crimes (2 Modules)
  • Definition and Elements of Fraud (2 Modules)
  • Document Fraud Investigation (2 Modules)

Corporate Investigation: Program Outcomes

  • Tactics for Winning
  • This is the first Module that all students have to complete once they have registered with College SA.  This Module is designed to introduce Students to the College. In this Module, you will learn more about how Distance Learning Works and what the best ways are to study to prepare for assessments.
  • Report Writing

There are two Modules to this component. You will learn about the different types of writing skills for the different investigative purposes. You will also learn how to access, process, re-organize and synthesize information.

  • Types of Corporate Crimes

There are two Modules to this component. You will learn about the important aspects when dealing with economic crimes and more specifically, occupational crimes and / or misconduct.

  • Definition and Elements of Fraud

There are two Modules to this component. You will learn the definition and elements of the crime named ‘Fraud’.

  • Document Fraud Investigation

There are two Modules to this component. You will be guided through the approaches, requirements and processes used while investigating fraudulent documents.

Course Duration
The Short Course Certificate: Corporate Investigation will take you approximately 12 months to complete.

Entrance Requirements

The ability to read and write in English

Assessment and Award

All Students are required to complete Tactics for Winning, and also, to pass all the Multiple Choice Assignments. A pass is any mark of 50% or higher.

On completion of the Short Course Certificate: Corporate Investigation, you will receive a Certificate of Completion from College SA and Strategic Investigations and Seminars.

Strategic Investigations and Seminars – More about Them

Strategic Investigations and Seminars (SIS) is a specialist training provider that offers a wide range of training solutions in the fields of Forensic Investigation and Forensic Science. SIS has a vision to reach out into Africa, equipping individuals with quality and practical skills in the field of Forensic Investigative Science.Strategic Investigations and Seminars (SIS) is registered and accredited as a service provider with the Safety and Security Sector Education and Training Authoring (SASSETA) – ID 081 985 269 9877.

 

 

 

 

 





Ce site web a été créé gratuitement avec Ma-page.fr. Tu veux aussi ton propre site web ?
S'inscrire gratuitement