Job Detail

Fraud Examination Conduct and Procedures Week 6 Video Discussion Review Leodan 1 page

Date Posted: October 09th, 2019
Deadline: October 11th, 2019 at at 11:11:AM
Job Budget: 2

Job Description

The video analysis of this week is about the role that social media plays in our lives and how this impact everything around us. In the video John Gill talks about something very important, how the social engineer becomes the easiest way to penetrate a company's data, he claims that it doesn't matter how much you invest in firewall and other similar tools, if the employee provides involuntarily or by lack of training their password to a stranger on the other side of the phone (Gill 2015). Another important issue that is touched in the video is the use of the Cloud and the amount of sensitive and confidential information that is available in these storage systems, and, how without adequate protection this technology instead of helping the company can go in against the entity (Gill 2015).

    On the other hand, to becoming more common against corporations, social engineering attacks are also becoming increasingly sophisticated. Despite hackers finding increasingly clever ways to trick workers and individuals into providing valuable company information, companies need to use due diligence to keep two steps ahead of cyber criminals. Attacks on social engineering usually involve some form of psychological manipulation, causing confidential or sensitive information to be handed over to otherwise unsuspecting users or employees (Kelly 2017). Social engineering usually involves email or other contact triggering the victim's panic, anxiety, or similar emotions, causing the victim to disclose sensitive information immediately, click a malicious link, or open a malicious file. Since social engineering requires a human element, it can be difficult for companies to avoid such attacks. Therefore, to prevent or minimize these attacks it very important to avoid the following (Kelly 2017):

  • Connecting to an Unsecure Network. Operating remotely is becoming much more normal with the introduction of mobile devices such as laptops and cell phones. While this provides plenty of ease and flexibility, if workers are not vigilant, it can cause security issues.
  • Failing to Recognize Email Phishing. The size and complexity of phishing attacks is increasing, and email phishing is one of the most common types. Criminals may use email phishing to obtain confidential information and data, or to trick employees into downloading malware. Some even threaten to impersonate managers or other staff (ACFE 2016).
  • Inappropriate Sharing of Information. Many workers are comfortable when it comes to sharing sensitive information with others, either sharing information with those who should not have access, or improperly sharing files via email.
  • Password Behavior. While we are dealing with improper sharing of information, I thought it would be nice to note that passwords are also in the wrong sharing group.
  • Dangerous Storage Habits. To promote data transfer, some workers may store sensitive data on a private hard drive or upload company files to personal storage. While this may be more convenient for the worker, these personal storage solutions generally lack a company network's security features (ACFE 2016).


ACFE (2016) Fraud Prevention and Deterrence. Retrieved from:

Gill John (2015) Protecting Data and Intellectual Property. Retrieved from:

Todd Kelly (2017) 5 Ways to Mitigate Fraud Risk. Retrieved from:

Related Jobs

Email to friend