No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Featured

Growth in E-Commerce Requires Dynamic Solution for Fraud

by Monica Eaton-Cardone
August 1, 2017
in Featured, Fraud
amazon app on smartphone

Both Tech and Human Defenses Are Needed

The risk of a cyberattack – nearly anywhere – grows with every passing day. We’ve heard it from the highest levels of government, and we’ve seen an inkling of what a far-reaching breach can do through viruses such as Petya and Wanna Cry. It’s likely that your most critical or sensitive assets and data systems are vulnerable to some degree. So, really, how prepared is your business for the eventuality of a cyber breach or malicious hacking?

Shopping networks QVC and HSN have teamed up. Amazon wants to provide your bread and butter. Walmart rewards you for shopping online. The pieces on the e-commerce chess board are shifting as the nation’s biggest corporations follow the migration of American consumers to the internet.

Meanwhile, cyberthreats, both foreign and domestic, lurk in the shadows. With increasing frequency and severity, cyber-aggression, ransomware, digital disruption and fraud (or worse) are causing concern for U.S. companies and institutions.

There is a connection to be made, and a price to be paid for inaction.

QVC’s $2.1 billion absorption of Home Shopping Network (HSN) is the latest indicator that the migration to online shopping and competition from internet giants like Amazon continue to define the retail landscape.  Meanwhile, Amazon is standing in the check-out aisle with its bid to buy Whole Foods Market and its plans to revolutionize the grocery shopping experience.

Walmart, the country’s largest retailer, with more than $340 billion in annual revenues – more than three times that of Amazon – is also feeling the pressure of shifting consumer behavior. The “Amazon effect” and the migration to e-commerce has Walmart moving aggressively into the internet marketplace. In May, the company reported that its online sales in the U.S. had jumped 63 percent in the first quarter of 2017. Not surprising, considering Walmart offered deep discounts in April exclusively to online shoppers.

Cord-cutters now prefer tablets, computers and smartphones to cable TV. Millennials are gravitating toward online purchasing with increased frequency, foreshadowing the inevitability that older, more affluent consumers will follow. However, as retail moves online, merchants and marketers are faced with a new set of challenges and vulnerabilities as they navigate the e-commerce ecosystem.

Foreign hackers recently penetrated the computer networks of U.S. nuclear power stations. As well-protected as these systems certainly are, hackers are successfully breaching their defenses. It’s a sobering thought that other networks we rely upon for critical, everyday services – fuel, electricity, medical services, communication – are equally or even more vulnerable.

The recent Petya ransomware attack, which spread across Europe, disrupting the operations of energy companies, banks and other global businesses, including some in the U.S., is indicative of a new type of cyber-aggression. Last fall, President Obama even expressed concern over the possibility of weaponized artificial intelligence stealing U.S. nuclear weapons codes.  How prepared are you for cyber-intrusion?

One of the biggest risks any business faces when it comes to data and systems security is not taking the threat seriously enough.  Months prior to the Petya attack, Microsoft issued a patch that protected computers from the malware. The computers whose hard drives were shut down had not been updated.  Whether it’s a catastrophic data breach, consumer fraud, hacking or disruption in the form of malware and ransomware, online crime is growing around the world, and there is a disturbing lack of urgency to address the threat.

Accounting departments are often targeted, since they can be portals for accessing financial information. I’ve seen phishing attempts where hackers posed as company executives requesting a wire transfer. They just need to convince one person to respond to an inquiry such as asking for a password. In large operations, not everyone is aware of who is working on what, so the risk is greater.

Industry compliance doesn’t equal security. It’s often just a base minimum. Patches should always be utilized when they are issued, but you should be constantly vigilant by updating your technology as often as possible and backing up data daily. Procedures and proactive human oversight are critically important to containing and preventing threats posed by ransomware and phishing schemes.

Data is king. Don’t undervalue the importance and the value of your customer intelligence. Every company needs a data recovery plan so as not to get caught in a vulnerable situation caused by digital disruption. Guard your bottom line by guarding your data, and only do business with operators you can trust. If you back up your data, online attacks are a nuisance and might cost money and time, but you can quickly bounce back.

As e-commerce explodes, businesses in the U.S. and around the world are facing the reality that the protections they have in place — if any — to safeguard their online transactions, assets and data systems are increasingly vulnerable to hackers and fraudsters who are relentlessly developing new ways to exploit those defenses. While most CIOs may think their systems secure, unless their tools, technology and human processes are up-to-date, the odds are not in their favor.


Tags: Artificial Intelligence (AI)Cyber RiskRansomware
Previous Post

Regtech Comes to the Fore in Compliance Solutions

Next Post

Resilient: Paul Morell on Getting Ahead of Tomorrow’s Risks

Monica Eaton-Cardone

Monica Eaton-Cardone

Monica Eaton-Cardone is a global leader in the field of online retail cybersecurity. She is founder and CIO of Global Risk Technologies and the founder and COO of Chargebacks911, a subsidiary of GRT. Based in Tampa Bay, Florida, GRT and Chargebacks911 employ more than 400 specialists in offices around the world, combining human investigation with sophisticated data analytics to protect more than 2.4 billion online transactions annually.

Related Posts

compliance cyber risk titanic

5 Reasons Why Compliance Alone Is Not Efficient at Reducing Cyber Risks

by Stu Sjouwerman
June 8, 2022

Understandably, most businesses prioritize compliance when it comes to security risks. But as KnowBe4 CEO Stu Sjouwerman explains, a compliance...

ai in hiring

Algorithms Behaving Badly: New NYC Law Tackles Bias in Hiring Technology

by Lofred Madzou
June 2, 2022

From recruitment to retention, technology has long been crucial to effective workforce management. And while companies may be flocking to...

QA logo_bailey leslie

Q&A: For Effective Financial Crime Prevention, Build a Better Mix of Machines and Humans

by Bill Millar
May 3, 2022

To police financial crime, more businesses are incorporating artificial intelligence — machine learning, in particular — into monitoring, prevention and...

logicgate black kite integration

LogicGate Risk Cloud Adds Black Kite Integration for Third-Party Risk Management

by Corporate Compliance Insights
March 30, 2022

LogicGate’s Risk Cloud compliance platform has added integration with Black Kite, which offers cyber ratings, Open FAIR financial risk quantification,...

Next Post
Resilient: Paul Morell on Getting Ahead of Tomorrow’s Risks

Resilient: Paul Morell on Getting Ahead of Tomorrow’s Risks

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance Decision-Making DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring Ransomware RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT