{"id":1854,"date":"2006-03-16T00:00:00","date_gmt":"2006-03-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/16\/poor-security-blamed-for-increase-in-internal-fraud\/"},"modified":"2021-12-30T11:40:09","modified_gmt":"2021-12-30T11:40:09","slug":"poor-security-blamed-for-increase-in-internal-fraud","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/03\/16\/poor-security-blamed-for-increase-in-internal-fraud\/","title":{"rendered":"Poor security blamed for increase in internal fraud"},"content":{"rendered":"<p>Poor internal security procedures and insufficient employee authentication systems are leaving UK businesses prone to internal fraud and intellectual property theft, according to a computer crime survey.  Employees at one in five large UK organisations can gain unauthorised access to sensitive information because of insufficient identity and access management processes, says the Department of Trade and Industry&#8217;s (DTI&#8217;s) biennial security report.  Separate research published this week by BDO Stoy Hayward says employee fraud rose 80 per cent last year, costing firms \u00a367m.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andrew Durant, BDO&#8217;s head of fraud investigation, says to combat such crimes firms need better employee access management and fraud detection systems.  But detective chief inspector Stuart Dark from the Metropolitan Police&#8217;s Economic and Specialist Crime Unit, says employee screening and internal processes are equally important.<\/p>\n<p>http:\/\/www.computing.co.uk\/computing\/news\/2152055\/poor-security-blamed-increase<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1854","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1854"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1854\/revisions"}],"predecessor-version":[{"id":4341,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1854\/revisions\/4341"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}