The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate the extent of the issue. Fraud can be defined as any wrongful or criminal deception intended to result in personal or financial gain. The different faces of fraud make it hard to measure, often leading organizations to firmly believe they are not victims of deception or vastly underestimating the extent of the issue. What they do acknowledge is a problem with credit losses or high collection activity without realizing some borrowers have no intention of honouring the account or loan. Whether a fraudster takes out one large line of credit under a false name or maintains several small, legitimate accounts to build enough trust to apply for a high-limit credit card, the common denominator is intent. Where Does It Begin? The Fraud Players The story of fraud starts with an identity. A distinction can then be made between fraudsters who: Fraud is a difficult behaviour to define and even more difficult to predict. The perpetrators are constantly changing their methods, making patterns hard to establish. Although methods may vary, three common fraud personas are: Use their own identity (first party fraud). Create a fictitious identity (first party fraud). Use another person’s identity (third party fraud). In the case of first party fraud, the perpetrators open accounts using false information or they misrepresent their real identity by lying on credit application forms. A common example of first party fraud is a bust-out, where multiple accounts are opened and charges are put against them with the intention of abandoning the account, or “busting out”. Third party fraud may also be referred to as true name fraud, where a real identity is being leveraged by the perpetrator. Third party fraud often starts with identity theft where someone impersonates another individual by using information such as their name, social insurance number (SIN) or credit card number, without their permission. While individual consumers have become increasingly aware of the threat of identity theft, businesses also need to be vigilant in their identity verification measures to protect themselves and their customers against fraud, whether first party or third party. Points of Attack Once an identity has been chosen, fraudsters have an array of methods they can use to manipulate your business. Fraudsters will be looking for the easiest and most profitable point of attack within your institution. The points of attack and the fraud methods used against a financial institution will vary based on the products and services the institution offers. For example, credit card fraud will represent very different challenges than cheque fraud. This is further complicated by electronic versus non-electronic transaction services. Different considerations need to be taken into account when protecting an eTransfer versus a line of credit, for example. The Quick Striker: The most inclined to “hit and run” whereby they are looking to quickly maximize their financial gain, then disappear and move onto the next institution or scheme. The Opportunist: Actively probing to look for an easy entry point, or in the case of third party fraud, looking to capitalize on a lack of awareness or defense on individual consumers. The Sleeper: Patiently build loyalty with institutions by maintaining several legitimate accounts before opening the “moneymaker”. Outside of isolated crimes of opportunity, organizations should be equally (if not more) wary of organized fraud rings that incorporate different fraud players into a long term strategy that makes a steady, substantial income out of fraud. When these rings are nation-wide, they are incredibly destructive and difficult to pinpoint. Once they begin to branch out internationally to fund foreign crime, not only is the reputation of the victim organization at stake, but finding and prosecuting the criminals becomes a longer, more daunting process. Understanding how the identities, methods and types interact is a key in catching fraud before it impacts your business. Learning these correlations will help your organization narrow down your search for fraud offenders and minimize, if not prevent, your losses. While being able to detect fraud as it is occurring is helpful in reducing losses, the ultimate goal should be to prevent it from affecting you. Layered Approach to Fraud Management The best strategy involves multiple layers of defense. Equifax Layered Approach Fraud Risk Assessment In the fight against fraud, there is no “cookie cutter”, one-size-fits all approach. Just as you might use several tools to repair a leaking faucet, several solutions may need to work together for specific fraud detection and mitigation situations. Implementing the right program starts with performing a fraud risk assessment of your organization. Identify possible fraud risk: gather information to assess the possible fraud risks that could apply to the organization. Equifax recommends a layered approach to implementing a fraud prevention program in your organization which addresses the following areas: A ssess significant, inherent fraud risk and its likelihood: fraud risk based on historical information, known fraud schemes, and interviews with staff, including business process owners. Respond to likely/significant inherent and residual risks: the response should address the identified risks and perform a cost-benefit analysis of fraud risks over which the organization wants to implement controls or specific detection procedures. Prevention Detection Investigation Containment & Recovery Analysis & Recommendations With the right mix of processes, policies, analytics, and technology, you not only minimize losses, but you also improve compliance and staff productivity. PREVENTION ANALYSIS & RECOMMENDATIONS Identity verification & authentication Know your customer (KYC) policy Staff training programs Fraud risk exposure should be assessed regularly by the organization to identify specific potential schemes and events that the business needs to mitigate. Assessments should be performed on a systematic and recurring basis, involve appropriate personnel, consider relevant fraud schemes and scenarios, and mapping those fraud schemes and scenarios to mitigating controls. DETECTION Client data validation Root cause analysis Trend analysis / peer comparison Action plan for identified points of compromise CONTAINMENT & RECOVERY Action to stop losses & contact customers Recovery activities Data breach response services Device verification Analytics for profiling & behavioural modelling INVESTIGATION Comprehensive case management Validation of suspicious transactions Identify points of compromise Identity and Fraud Solutions Equifax empowers businesses and consumers with information they can trust. A global leader in information solutions, we leverage one of the largest sources of consumer and commercial data, along with advanced analytics and proprietary technology, to create customized insights that enrich both the performance of businesses and the lives of consumers. The Equifax identity and fraud solution portfolio provides your organization with an integrated suite of real-time, industry-leading defenses against fraud. The portfolio consists of identity screening, verification and authentication tools, and enterprise fraud management solutions that work in real time to minimize losses from various types of fraud. Equifax augments our solutions with unique data assets, predictive analytics and fraud consulting services. Identity Management Solutions eIDcompare eIDcompare is a real time, identity proofing solution. eIDcompare helps to determine whether an identity is valid and if the individual claiming the identity is who they say they are. eIDcompare cross checks applicant data against Equifax data sources to validate the identity and to determine whether that identity has been reported as misused or associated with potential fraudulent activity. eIDverifier This knowledge-based authentication process uses ‘shared secret’ information that should only be known by the customer and Equifax, to present a variety of multiple choice questions. Only the identity owner should be able to correctly answer a sufficient number of the security questions to be deemed legitimate. Business Confirm Business Confirm is a business identification service used to validate the existence of a corporation and its status, the entity type, registration/incorporation date and to identify the company directors. Deceased ID Equifax’s Deceased ID solution is a database of deceased Canadians that can be used as a diagnostic tool to expedite the validation or cleansing of your client database to verify continued existence. Fraud Prevention Solutions QuickMatch QuickMatch is a unique tool that verifies key identification data against the data contained in Equifax’s consumer credit database to determine if a credit card is being presented by its rightful owner. Safescan Safescan is an interactive warning system that detects potential fraud by spotting irregularities, as well as confirmed misuse in names, addresses, SINs, and telephone numbers. If irregular or misused information is detected, Safescan generates a warning advising you to take a closer look at the information on the application. Citadel Citadel™ is a web-based, Equifax-hosted enterprise fraud management solution that helps to identify high-risk or potentially fraudulent activities before they negatively impact your business. The solution matches input data to Equifax’s consortium fraud and historical client data to help detect fraud patterns based on user-controlled business rules. A suite of linkage analysis tools help to uncover indirect connections between seemingly unrelated data, which may constitute an organized fraud ring. Professional Services & Analytics Data Breach Response Services Our professional services are employed once an organization experiences a data breach; the service provides notification to affected customers, call centre services, credit monitoring and / or credit file alerts. Custom Analytics Due to our deep expertise in predictive modeling and comprehensive fraud data sources, Equifax is able to offer custom analytical services to address your specific business challenges. Fraud Consulting Services Our in-house fraud consultants have a unique customer centric approach to understanding strategies, pain points and business objectives. They have deep industry knowledge with the support of dedicated customer relationship teams and subject matter experts that come together with our customers to consult, develop and deploy successful fraud solutions. Combine the power D S I ON I NG P MAN EMNET SERVICES M AG E RA U EF services and state-of-the art enabling technologies to deliver an integrated fraud solution. RP RIS LY ANA TOM S U •C SCORE VALIDATIONS LATFORMS • WORKFLOW DM ANAG TEL • analytics, consulting TE SE MOD ELING • GE CON SULT ING CO • 3 RD PARTY BROA D- VAL U E- NO TECH BA EC I N S ES •D A CIAL • FRAUD • MORTG resources with superior IG H T IT RUL • RES SCO NS • ES OM ME R DA T NS RED UT I O •C SC OR ECA RD GIN CLIENT NEEDS LI of Equifax’s vast data &I & UNIQUE DA TA SED BA ER C CONSUM RIC GENE CUSTOM & A S P SO L EN DE D A N A LY TICA ATE TS GH SI ETS ASS AD THAT INTEGR T IC S• LU LO SO NS TIO A GY Equifax Capabilities EN T• EN Talk to Equifax today and see how our data can positively impact every phase of your account lifecycles. www.equifax.ca Contact Us Today Call 1-855-233-9226 to speak to an Equifax Advisor or visit us at www.equifax.ca/reducefraud Certain conditions apply to all offers. Equifax and EFX are registered trademarks of Equifax Canada Co. Inform Enrich Empower is a trademark of Equifax Inc., used here under license. ©2014 Equifax Canada Co. All rights reserved
© Copyright 2026 Paperzz