Cyber crime: protect, detect, respond

Instances of Internet fraud and other data related crimes have been increasing dramatically and becoming progressively sophisticated. Cyber-attacks on organisations via security loopholes and un-patched servers have increased over 80 percent in the last two years as intruders look for industry or identity data theft.

The good news is that you can be proactive and protect yourselves from these types of illegal activities. Your best defense is first to understand the methods being used by cyber criminals. Understanding not only how they access your critical data but also how the data is used can help you identify your most vulnerable assets. Next is to understand the technologies and methodologies you can implement to protect yourself and your data. Real-time intrusion monitoring is one critical element. Having access to certified security experts who can review threatening situations and assess your threat level is paramount.

We encourage you to review a recent US government advisory document which outlines how cyber criminals operate and the basic recommendations you can take to reduce the likelihood of fraud in your organization. Here is an excerpt from the article that outlines tips to protect your organisation, detect fraud and respond to suspicious activity:


  1. Educate everyone on types and sources of fraud
  2. Enhance security within the network systems to protect against fraud
  3. Enhance the security around banking processes and controls
  4. Understand responsibilities and liabilities


  1. Monitor and reconcile accounts daily
  2. Discuss options offered by your financial institution
  3. Note any changes in performance
  4. Pay attention to warnings
  5. Be on alert of rogue e-mails
  6. Run regular system scans for viruses and malware


  1. Develop a response system
  2. Ensure employees know who key contacts are
  3. Possess key contact information for your financial institution
  4. Maintain written chronology of events
  5. File police report
  6. Have a contingency plan for compromised systems
  7. Consider other data/systems that may be at risk
  8. Report exposure to PCI/DSS


If you do not have the appropriate internal resources to assist with fraud protection, detection and responses, be sure to find a provider that understands the risks associated with cyber crime. It’s also important to work with someone who understands your industry and business processes.


This article was written by Aaron Donaldson, RSM US, and first published here.



How can we help?

As hackers become more advanced and expand their reach and methods, the middle market must increase its focus on cyber security. Just one incident can have significant financial reputational and regulatory consequences.

Contact RSM to see how you can reduce the likelihood of a breach, improve detection, respond to incidents, and begin recovery as soon as possible.

[email protected]