You cannot bribe a computer

Issue 1 2023 Access Control & Identity Management, Security Services & Risk Management

Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue, and corruption has become that much easier through technology. Fraud, one of corruption's most prominent faces, thrives thanks to the speed and complexity of our connected world.

However, technology can also help stem fraud and corruption. Identities can help companies radically reduce fraud risks, using automation to swiftly catch and block suspicious identity-related attempts. The growing availability of identity orchestration platforms is good news for the good guys, and devastating news for fraudsters and other criminals.

"The combination of newer technologies have had a big impact on identity verification," says Daniel Robus, Chief Revenue Officer for Contactable "Analytics, automation and artificial intelligence work together on these platforms to give every organisation fraud-fighting abilities."

Technology vs fraud

The connected world has been beneficial to most aspects of business life, even criminal activities. Hacking attacks are rampant, cybercriminals try to infiltrate business systems and steal their data with alarming frequency, and mismanagement of digital assets such as cryptocurrencies have enabled billions of stolen money to disappear.

Worst of all, stolen identities are often a key part of these activities. As our identities are the most common means to access systems, networks or private areas, the incentive to steal them is huge. These stolen identities are then used to contribute to social engineering (techniques to mimic others and abuse that trust), and fuel identity theft activities. Businesses are highly susceptible to this risk, says Robus.

"Every time you verify a customer's details, you are checking if they are a trusted party you can work with. Unfortunately, criminals steal identities so they can abuse that trust. For example, they use someone's details to buy something on credit then disappear with the goods. This trick is not new, but today's digital criminals are becoming more and more creative and are doing this at scale."

There is good news. Technology can also work against them. The European country of Estonia is a living example of this approach. This former Soviet country has been at the forefront of digitisation, recognising technology as a powerful ally to avoid the corruption-heavy problems that dogged former Soviet countries. It placed its state services and databases online, and used automation to help create a transparent environment.

Today, Estonia ranks 14th in Transparency International's Corruption Perceptions Index. None of its East European peers are even in the top thirty. Technology can fight fraud and corruption, and that capability is now available to every type of organisation regardless of size or sector.

Identity platforms fight fraud

Estonia could put the focus and resources of an entire nation behind its anti-corruption efforts. In recent years, digital platform services have made such technologies available to the broader market, powered by new-generation technologies.

"We all use platforms every day to access our emails and to watch our shows," says Robus. "It's very accessible and cost effective, and the platform model creates a level of central control that was previously very hard to run. Platforms also help users take advantage of new technologies as they become relevant. An orchestration platform with identity management at its heart provides a centralised management environment. By consolidating all systems and data sources, the platform can streamline and automate fraud detection and response, making it easier to detect and prevent attacks in real-time."

Platforms are owned and maintained by their creators, but clients access platform services as if they are native to their businesses. The leading platforms integrate with other business systems, such as enterprise security operations centres. A best-of-breed identity platform can integrate with other security systems and tools, such as firewalls, intrusion detection systems, and anti-virus software, to provide a comprehensive view of the security posture and improve overall security. Such platforms also enhance other business functions, including finance processes such as Know Your Customer (KYC) and Anti Money Laundering (AML).

Digital Identity Orchestration platforms use advanced analytics, including machine learning and artificial intelligence, to analyse large data sets, identify patterns and anomalies, and trigger alerts when potential fraud is detected. All this can happen in real time and supports ad-hoc reporting and detailed forensics trails for investigations. Such platforms are becoming essential to all types of organisations.

"I credit two important changes driving more adoption," says Robus "The platform model makes this capability much easier and more affordable to adopt and integrate into a business – not just for business systems, but also the number of people who can use the platform and benefit from its features. The second change is the evolution of technologies such as analytics, connectivity, and data management. Humans no longer have to spend days or weeks trying to uncover fraud. They can find out very quickly and stop the fraud before it causes real damage, or the perpetrators get away."

An Estonian President once quipped, "You cannot bribe a computer. It doesn't know how to accept an envelope." With the correct identity orchestration platform, you cannot easily lie to a computer about your identity or conveniently cover your tracks. Technology can fight fraud thanks to modern digital platforms and advances in analytics, integration, and automation. The only question is how will you use it to reduce your fraud risks?




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
Fire protection for a solvent extraction plant in Africa
FS Systems Fire & Safety Security Services & Risk Management Mining (Industry)
A prominent mining site operates a state-of-the-art solvent extraction (SX) plant, integral to separating and purifying metals from ores, which pose significant fire risks, as SX processes involve highly flammable organic solvents and elevated operating temperatures.

Read more...
Taking fire safety seriously
G2 Fire Editor's Choice Fire & Safety Security Services & Risk Management
To gain insights into how fire systems must be designed, installed and maintained, SMART Security Solutions asked Nichola Allan, MD of G2 Fire, for some insights into the local fire market.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Innovation and security go hand in hand
Technews Publishing Facilities & Building Management Security Services & Risk Management
In a world where the demand for tech innovation is matched only by the acceleration of cybersecurity threats, businesses face the challenge of balancing new product development and robust security measures.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...