In the IoT age a unified approach to fraud management and security matters more than ever

Carlos Marques, head of Product Marketing and Alliances
WeDo Technologies

In today’s increasingly connected society, it is easier than ever before for fraudsters to wreak havoc. According to Juniper Research, by 2020 there will be close to 40 billion connected devices on the planet, and with this increasing number of connected devices we are also seeing a rise in fraud risks, such as through IoT botnets.

IoT botnets are typically comprised of a large group of computers, routers or servers, and the computing power of these devices is typically jointed together without the owners’ knowledge, with the device being remotely controlled by a single ‘botmaster’.

The botmaster is often part of a criminal organisation that uses the botnets for various types of fraud, including denial of service attacks, which can cripple financial institutions or e-commerce sites, costing businesses millions in losses. These bots are also able to divert traffic to fake webpages and advertising sites, defrauding consumers by stealing their financial and personal information, says Carlos Marques, head of Product Marketing and Alliances, WeDo Technologies.

As we’ve seen earlier this week, such attacks can inflict huge damage on a business; on Sunday, Tesco Bank had been subjected to a “systematic sophisticated attack,” resulting in cash being taken from 20,000 accounts. While Tesco is still racing to determine exactly what happened, the breach, one of the most significant cyber-thefts ever to hit a UK bank, highlights the ever- growing risk that businesses face from hackers and fraudsters.

Following the attack, questions have been raised about how such a failure could take place, with the National Crime Agency, as well as others, examining what has occurred. As part of this process, the security measures Tesco has in place are liable to face severe scrutiny. However, while finding ways to improve security to prevent these attacks is important, it will never be enough.

Creating tighter security is just the first layer of protection and it is vital that businesses are prepared for what happens when security is breached. Ultimately, the end game for hackers and fraudsters doesn’t just stop once they gain entry – as we’ve seen with Tesco Bank, the damage is done once access is gained. This is why the second layer of protection, fraud management, is even more important. For mobile operators, who are expected to face global losses of $294 billion due to fraud and uncollected revenue in 2016 alone, the importance of Fraud Management cannot be overlooked.

To successfully mitigate risk, Fraud Management systems should work seamlessly with security protection to constantly monitor information across an organisation, watch for unusual trends and identify frauds before they happen.

That way, when security is breached, the Fraud Management systems will follow its path and identify patterns that reveal hidden relationships and suspicious movements that might be revealed as threats and minimise any potential damage. Taking a unified approach to fraud, compliance and security provides the extra layer of protection, enabling companies to protect their customers, their business and their reputation.

The author of this blog is Carlos Marques, head of Product Marketing and Alliances, WeDo Technologies

Comment on this article below or via Twitter: @IoTNow_ OR @jcIoTnow

FEATURED IoT STORIES

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, iot home automation is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more
RECENT ARTICLES

IoT solution providers now can integrate LoRaWAN connectivity with thingPark embedded OEM program

Posted on: December 3, 2021

Actility launches ThingPark Embedded, an OEM-type Partner Program which enables IoT Solution Providers and device manufacturers to integrate a full-featured industrial-grade LoRaWAN infrastructure to their offering.

Read more

Schneider Electric launches grids of the future lifecycle management at Enlit Europe event

Posted on: December 3, 2021

Rueil-Malmaison, France. 2 December 2021 – Schneider Electric, the provider of digital transformation of energy management and automation and The World’s 2021 Most Sustainable Corporation, believes that electricity is the only energy that offers the fastest vector for decarbonisation through a combination of renewables and digital software-led solutions.

Read more