TUNING!

The word “Tuning” may bring to mind the idea of tuning an instrument. As we all know, if your instrument is not tuned properly, no one will appreciate all the time and effort the musician puts into playing it.  If all the instruments in an orchestra are not tuned to the chosen frequency, for example, […]

To access this post, you must purchase Academic Premium Individual Membership.

Hacking Group Took Sim Swapping To The Next Level

This article was originally published on frankonfraud.com. Beginning in late 2021 and continuing late into 2022, a globally active, extortion-focused cyber threat actor group called Lapsus$ attacked dozens of well-known companies and government agencies around the world. It penetrated corporate networks, stole source code, and then demanded ransoms. In a newly released report by the US […]

To access this post, you must purchase Academic Premium Individual Membership.

Evolving Transaction Monitoring Efforts to Combat Sex Trafficking in the Era of Cryptocurrencies and the Darknet

Is your financial institution doing what it can and should to identify and mitigate sex trafficking money laundering risks? Are your risk assessment and transaction monitoring models up to date with emerging trafficking risks and trends? The rise of cryptocurrencies and the darknet (or dark web) have created new challenges for financial institutions in detecting […]

To access this post, you must purchase Academic Premium Individual Membership.

Fact vs. Myth: ACH Credits

Webinar: July 25 – Spotlight: Handling Suspect Credits in ACH Presenters:  Sandy Ortins, AAP, APRP, NCP  Rayleen M. Pirnie, BCJ, AAP, CERP  Compliance Officers and Fraud Investigators are often challenged with identifying appropriate actions when money laundering activity or fraud is suspected with ACH credit entries. The ACH Network Rules must be balanced with applicable […]

To access this post, you must purchase Academic Premium Individual Membership.

[Wake-Up Call] It’s Time to Focus More on Preventing Spear Phishing

Fighting spear phishing attacks is the single best thing you can do to prevent breaches. Social engineering is involved in 70% to 90% of successful compromises. It is the number one way that all hackers and malware compromise devices and networks. No other initial root cause comes close (unpatched software and firmware is a distant second being involved […]

To access this post, you must purchase Academic Premium Individual Membership.

The Foundations of the BSA/AML/CFT/OFAC Risk Assessment

In 2004 the FFIEC quietly and subtly shifted the BSA examination paradigm with the publication of the Bank Secrecy Act / Anti-Money Laundering Examination Manual (“the Manual”). The Manual introduced to examiners the concept of determining an institution’s money laundering, terrorist financing, and OFAC risks through a matrix of pertinent topics rated as Low, Medium, […]

To access this post, you must purchase Academic Premium Individual Membership.

TUNING!

The word “Tuning” may bring to mind the idea of tuning an instrument. As we all know, if your instrument is not tuned properly, no one will appreciate all the time and effort the musician puts into playing it.  If all the instruments in an orchestra are not tuned to the chosen frequency, for example, […]

To access this post, you must purchase Academic Premium Individual Membership.