<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Archives - Riskhouse International Limited</title>
	<atom:link href="https://riskhouse.co.ke/tag/cyber/feed/" rel="self" type="application/rss+xml" />
	<link>https://riskhouse.co.ke/tag/cyber/</link>
	<description>Forensic Investigation, Risk Management &#38; Compliance Services </description>
	<lastBuildDate>Thu, 28 Apr 2022 10:21:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://riskhouse.co.ke/wp-content/uploads/2022/02/favicon-68x70.png</url>
	<title>Cyber Archives - Riskhouse International Limited</title>
	<link>https://riskhouse.co.ke/tag/cyber/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Responding to Insurance Fraud Red Flags</title>
		<link>https://riskhouse.co.ke/responding-to-insurance-fraud-red-flags/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Thu, 28 Apr 2022 09:46:38 +0000</pubDate>
				<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=7766</guid>

					<description><![CDATA[<p>Suspicious insurance claims have familiar characteristics. The insurers have collated these characteristics into lists to be used in claim assessments to determine whether further professional and scientific investigatio</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/responding-to-insurance-fraud-red-flags/">Responding to Insurance Fraud Red Flags</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Suspicious insurance claims have familiar characteristics. The insurers have collated these characteristics into lists to be used in claim assessments to determine whether further professional and scientific investigations are necessary. These lists are commonly referred to as &#8220;red flags&#8221; or &#8220;indicators&#8221; of fraud.</p>
<p>Red flags are linked to the nature of claims or the type of the insurance fraud, for example, false or inflated theft repair claims, staged accident, billing fraud, fake death claims, falsified beneficiary claims, fake disability claims, forgeries, and workers’ compensation.</p>
<p>When three or more of these red flags are found in the process of assessing a claim, a threshold is met for recommending further professional forensic investigation. The existence of red flags is not proof of fraud. However, it is a signal to the adjuster to request for further investigation to either prove or disapprove the fraud.</p>
<p>The role of fraud investigators is therefore critical to the insurance sector. The investigators are responsible for collecting, processing and analyzing evidence of insurance fraud allegations. They help ensure that the proved suspicious fraud claims are rejected, and suspects of such fraud are prosecuted successfully.</p>
<p>The Insurance Act, Cap 487, Laws of Kenya prescribes that Insurance Investigators must be licensed. Therefore, insurers, and other stakeholders in the industry such as advocates, auctioneers, adjusters, and the general public should consider engaging licensed investigators to aid in proving or disapproving fraud.</p>
<p>At <strong>Riskhouse International</strong>, we are licensed by the Insurance Regulatory Authority (IRA). We have a team of professional investigators who utilize forensic tools, techniques and scientific analysis to investigate fraud. We also conduct awareness and readiness training on the red flags to stakeholders in the insurance industry.</p>

		</div>
	</div>
</div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/responding-to-insurance-fraud-red-flags/">Responding to Insurance Fraud Red Flags</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Resilience</title>
		<link>https://riskhouse.co.ke/cybersecurity-resilience/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Wed, 30 Mar 2022 12:38:53 +0000</pubDate>
				<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=7701</guid>

					<description><![CDATA[<p>Technology as a business enabler, currently plays a very critical role in small, medium, and multi-national businesses. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/cybersecurity-resilience/">Cybersecurity Resilience</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Technology as a business enabler, currently plays a very critical role in small, medium, and multi-national businesses. Business stakeholders across industries must advance controls and take cyber resilience into consideration starting from the technical users to the board of directors.</p>
<p>Financial organizations and different industries are losing millions of monies in the hands of cyber hackers which causes damages and losses to businesses. Research indicates that businesses lose up to 400 USD every minute. It is therefore incumbent to include Cyber Security and Digital Forensic department in decision making meetings to enhance the tone at the top on strategies relating to enhancement of system security while conducting business.</p>
<p>Cases of system hackers are both internal and external. Case in point, mobile loan applications and wallets which are commonly used in business transactions are largely targeted by cyber hackers. The hackers identify loan apps on float, send traffic and compromise the mobile API (Application Programming Interface) for fraudulent transactions. No one thinks about cyber security until the incident occurs.</p>
<p>Despite the foregoing, the enactment of Data Privacy laws has triggered a lot of discussion on the implementation of data privacy in the Fintech industry. Globally, Denmark is ranked as the most cyber-safe country with a score of 8.9 on the cyber security index. The ranking is based on the combined data from different cybersecurity indices for countries in terms of their exposure to the crime. In Africa, Mauritius is ranked top and 17<sup>th</sup> globally, Egypt is second followed by Ghana in the cybersecurity index and resilience.</p>
<p>Kenya is ranked 5<sup>th</sup> in Africa. This is encouraging and an indication that there is room to ascend to the top. This will be attained by understanding cyber resilience, risk impact, detection and prevention starting from the Board, the Management and Staff.</p>
<p>Data security awareness should be the language in small, medium, and multi-national firms. Training on digital forensic, cyber security resilience and data privacy protection will enable us as a country to handle cyber-attacks. This is the only gateway to sustained business growth.</p>
<p>At <strong>Riskhouse</strong>, our team of experienced professionals will provide you with a framework that covers information security management, risk awareness, users and processes training on cybersecurity resilience, vulnerability assessment and penetration testing, system audit, business continuity plan, disaster recovery plan and digital forensic investigation on system frauds. We will be able to understand your system design architecture, risk universe, vulnerability exposure and implement corrective action.</p>
<p><strong><em>By Michael O. Omuga, Digital Forensic and Cyber Security Manager</em></strong>.</p>

		</div>
	</div>
</div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/cybersecurity-resilience/">Cybersecurity Resilience</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
