Admin

Countering Cyber Attacks

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they pose is the same as ever: sound risk management with systematic processes to assess and respond to risks. Here are considerations for cyber risk management. Risk management is the ongoing …

Countering Cyber Attacks Read More »

Beyond patient safety and medical liability.

Risk management in healthcare comprises the clinical and administrative systems, processes, and reports employed to detect, monitor, assess, mitigate, and prevent risks. By employing risk management, healthcare organizations proactively and systematically ensure patient safety as well as the organization’s assets, market share, accreditation, reimbursement levels, brand value, and community standing. Hospitals and other healthcare systems …

Beyond patient safety and medical liability. Read More »

The role of Risk Champions in effective Risk Management

At the heart of any effective risk process are two common qualities of strong team work and open communication. This, supported by strong action and solution orientation enable the Risk Management function to carry out its mandate effectively. Risk Champions are central to this, and used well, they become the glue that can hold risk …

The role of Risk Champions in effective Risk Management Read More »

How to conduct Effective Internal Investigations

Internal investigations allow a company to monitor itself to ensure that its managers, supervisors, and employees comply with the law as well as internal policies and guidelines.  The purpose of an investigation is to gather facts so that the investigator can make a credible determination about what happened and whether a violation occurred. In any …

How to conduct Effective Internal Investigations Read More »

ifis_cybercrime

Combating Cyber Security Threats

New cybersecurity threats and breaches emerge each year. Even with unprecedented vulnerabilities such as Spectre and Meltdown, the approach to dealing with the risks they pose is the same as ever: sound risk management with systematic processes to assess and respond to risks. Here are considerations for cyber risk management. Risk management is the ongoing …

Combating Cyber Security Threats Read More »

The role of HR Function in Fraud Prevention and Detection

Although there is no one definition for fraud, the Collins English dictionary defines it as “deliberate deception, trickery or cheating intended to gain an advantage”.  It is considered an illegal act and it is characterized by deceit, concealment and violation of trust.  The most common examples of fraud include embezzlement, misappropriation, or misapplication of funds …

The role of HR Function in Fraud Prevention and Detection Read More »

HOW HACKERS CAN HIJACK YOUR CELLPHONE ACCOUNTS

Fraudsters have figured out how to break in to online accounts protected by two-factor authentication where the authenticating device is your mobile phone. They don’t steal the phone; they simply hijack the phone number. This enables them to intercept those one-time verification codes sent to that mobile number by text, email, or phone call. Armed …

HOW HACKERS CAN HIJACK YOUR CELLPHONE ACCOUNTS Read More »

Fraud Risk Management: Awareness, prevention, detection and investigation

Awareness Bearing in mind that awareness of fraud risks can provide a business with protection, a useful model to know when considering the likelihood of fraud occurring is the fraud triangle. The fraud triangle is a model for explaining the factors that cause someone to commit occupational fraud. It consists of three components which, together, …

Fraud Risk Management: Awareness, prevention, detection and investigation Read More »

Scroll to Top
LET'S GO
IFIS UPDATES
SUBSCRIBE TO OUR NEWSLETTER
You will be able to get all our weekly updates through the email you submit.