In the IoT age a unified approach to fraud management and security matters more than ever

Carlos Marques, head of Product Marketing and Alliances
WeDo Technologies

In today’s increasingly connected society, it is easier than ever before for fraudsters to wreak havoc. According to Juniper Research, by 2020 there will be close to 40 billion connected devices on the planet, and with this increasing number of connected devices we are also seeing a rise in fraud risks, such as through IoT botnets.

IoT botnets are typically comprised of a large group of computers, routers or servers, and the computing power of these devices is typically jointed together without the owners’ knowledge, with the device being remotely controlled by a single ‘botmaster’.

The botmaster is often part of a criminal organisation that uses the botnets for various types of fraud, including denial of service attacks, which can cripple financial institutions or e-commerce sites, costing businesses millions in losses. These bots are also able to divert traffic to fake webpages and advertising sites, defrauding consumers by stealing their financial and personal information, says Carlos Marques, head of Product Marketing and Alliances, WeDo Technologies.

As we’ve seen earlier this week, such attacks can inflict huge damage on a business; on Sunday, Tesco Bank had been subjected to a “systematic sophisticated attack,” resulting in cash being taken from 20,000 accounts. While Tesco is still racing to determine exactly what happened, the breach, one of the most significant cyber-thefts ever to hit a UK bank, highlights the ever- growing risk that businesses face from hackers and fraudsters.

Following the attack, questions have been raised about how such a failure could take place, with the National Crime Agency, as well as others, examining what has occurred. As part of this process, the security measures Tesco has in place are liable to face severe scrutiny. However, while finding ways to improve security to prevent these attacks is important, it will never be enough.

Creating tighter security is just the first layer of protection and it is vital that businesses are prepared for what happens when security is breached. Ultimately, the end game for hackers and fraudsters doesn’t just stop once they gain entry – as we’ve seen with Tesco Bank, the damage is done once access is gained. This is why the second layer of protection, fraud management, is even more important. For mobile operators, who are expected to face global losses of $294 billion due to fraud and uncollected revenue in 2016 alone, the importance of Fraud Management cannot be overlooked.

To successfully mitigate risk, Fraud Management systems should work seamlessly with security protection to constantly monitor information across an organisation, watch for unusual trends and identify frauds before they happen.

That way, when security is breached, the Fraud Management systems will follow its path and identify patterns that reveal hidden relationships and suspicious movements that might be revealed as threats and minimise any potential damage. Taking a unified approach to fraud, compliance and security provides the extra layer of protection, enabling companies to protect their customers, their business and their reputation.

The author of this blog is Carlos Marques, head of Product Marketing and Alliances, WeDo Technologies

Comment on this article below or via Twitter: @IoTNow_ OR @jcIoTnow

RECENT ARTICLES

Airtel to power more than 20 million Adani smart meters

Posted on: April 29, 2024

Airtel Business, the B2B arm of Bharti Airtel, has announced that it will power over 20 million smart meters for Adani Energy Solutions Limited (AESL). Airtel, through its nationwide communications

Read more

CDG and Innovation Incubator launch AI-powered telecom solutions

Posted on: April 29, 2024

Communications Data Group has announced an alliance with Innovation Incubator to operate an extension of CDG’s innovation lab and develop Generative AI powered solutions aimed at transforming the subscriber and

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into

Read more