Motivation to commit fraud
Pressure
•Misusing member’s payment card details
•Accepting a bribe
•Intentional incorrect processing of Refunds, Gift Cards, Concessions,
Appeasements and application for one’s own or a colleague’s account
•Metric Manipulation
FINANCIAL FRAUD
The most common type of phishing, where attackers send fraudulent emails that look like they come from legitimate sources (e.g., banks, social media sites, online retailers). The emails often contain fake links or attachments that lead to phishing websites or malware.
Email Phishing
Scope: All Incidents
Line Manager, Second Line Manager, Site PS Partner, Site Leader, Discipline Management System (DMS)
Site Escalation Matrix
3 words to describe Fraud?
Intent, Deceive and Damage
Believe that he or she has a good chance of succeeding without getting caught
Opportunity
•Call avoidance
•Call disconnection
•Excessive hold
•Call riding
•Survey manipulation
•Invalid Transfers.
•Cheating in Assessment
PROCESS VIOLATION
A more targeted form of phishing. the attacker customizes the attack for a specific individual or organization, often using information gathered from social media or previous interactions. It is usually much harder to spot than regular phishing.
Spear Phishing
Email address for Confidentially Speaking
CS.PHILIPPINES@CONCENTRIX.COM
Number 1 top Fraud Case with RH?
Attendance/Timekeeping
Justification of dishonest actions
Rationalization
•Accessing prohibited sites
•Access/Password sharing
•Using company/client provided system for personal benefit
•Tampering an account without authorization
IT SECURITY VIOLATION
Involves sending fraudulent text messages that attempt to trick individuals into disclosing personal information or clicking on a malicious link.
Smishing (SMS Phishing)
Scope: Information Security and Data Privacy Breaches
Recipient: Global Security
- Provide what Fraud Reporting Channel and the email address
Data Privacy and Info. Sec.
ALERTUS@CONCENTRIX.COM
Up to how much reward can you receive for submitting a valid tip to Cash for Tip or FMEAmazing?
USD 250
Is an extension of the element of opportunity, which includes an individual’s ability to override internal controls and to socially control the situation for their personal benefit
Competence
•Sharing intellectual property and confidential info
•Soliciting irrelevant info from a customer
•Posting confidential/high classified company/client information in Social media.
•Bringing mobile phones inside the production floor
DATA PRIVACY VIOLATIONS
A type of phishing that specifically targets high-profile individuals like executives, government officials, or other "big fish." These attacks often involve highly personalized and convincing messages that impersonate trusted sources.
Whaling
Scope: Fraud, unethical practices, or any other incidents
Recipient: Global Security - PH
What is the email address for C4T?
CASHFORTIPS@CONCENTRIX.COM
Centralized database of Customer Experience Solutions Staff who have committed Fraud.
OTL - One Trust Link
Is a behavior of superiority and the right or greed of perpetrators of crimes who believe that the company policy and the procedure was not applied to them.
Arrogance
•Falsification of Document/Medical Certificate
•Attendance Input Manipulation
•Cheating in assessment
CNX PROCESS VIOLATION
Involves redirecting legitimate website traffic to a fraudulent website without the user's knowledge, often by exploiting vulnerabilities in the website or in the user's DNS settings.
Pharming
What is the new channel where you can report fraud vulnerabilities in our workplace? Please provide the email address
FMEAmazing
fmeamazing@concentrix.com
This program aims to safeguard employees who report unethical practices, ensuring their safety and anonymity.
Hero Security and Assistance Program