<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Due Diligence Archives - Riskhouse International Limited</title>
	<atom:link href="https://riskhouse.co.ke/tag/due-diligence/feed/" rel="self" type="application/rss+xml" />
	<link>https://riskhouse.co.ke/tag/due-diligence/</link>
	<description>Forensic Investigation, Risk Management &#38; Compliance Services </description>
	<lastBuildDate>Tue, 14 Jun 2022 07:14:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://riskhouse.co.ke/wp-content/uploads/2022/02/favicon-68x70.png</url>
	<title>Due Diligence Archives - Riskhouse International Limited</title>
	<link>https://riskhouse.co.ke/tag/due-diligence/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Identity Theft</title>
		<link>https://riskhouse.co.ke/identinty-theft/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Tue, 14 Jun 2022 07:14:58 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Due Diligence]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=8119</guid>

					<description><![CDATA[<p>Identity theft in Kenya has been on the rise as technology is constantly evolving around the globe. There are many forms of identity theft used by fraudsters to steal money from citizens. The most common type is SIM swap.</p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/identinty-theft/">Identity Theft</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn" >
		<div class="wpb_wrapper">
			<p>Identity theft in Kenya has been on the rise as technology is constantly evolving around the globe. There are many forms of identity theft used by fraudsters to steal money from citizens. The most common type being <strong>SIM swap</strong>.</p>
<p>SIM swap is a fraud that occurs when fraudsters replace and take control of a victim’s phone number. Since it is a data sensitive process that requires verification by the service provider, fraudsters can obtain the victim’s information from a variety of techniques such as phishing, vishing, spoofing, dumpster diving, social engineering, and any other cyber related attacks.</p>
<p>In Kenya, the most used techniques are vishing. Vishing occurs when fraudsters typically call the victim masquerading as their service provider offering fraudulent upgrades or other information related services. They then instruct the victim to confirm a few personal details for the upgrade or service to take effect. Once this is done, they apply denial of service attack to access the victim’s account and transfer the money to their receiving accounts.</p>
<p>Alternatively, they can instruct victims to switch off their phone after accessing their Personal data such as PIN (personal identification number) and passwords. They then use data to call the service provider and request their number to be swapped to a blank SIM. Upon verification, the victim’s SIM card is deactivated with no signal. During this time, the fraudsters are in control of the phone number and can operate the victim’s bank accounts, mobile money and other credit facilities.</p>
<p>Another emerging trend used for identity theft in Africa and Kenya is spoofing. Fraudsters use the official service providers active number with a slight difference of the prefix. For example (+254 instead of 07). They easily prey unsuspecting victims since the number appears genuine and when instructed to give out mobile money details for upgrades, the victims cooperate and end up being swindled. During this time, the fraudsters give step by step instructions compromising the victims into transferring money to their agent or phone numbers unsuspectingly.</p>
<p>To prevent SIM Swap identity theft, it is important to observe the following:</p>
<ul>
<li>Limit the personal information you share online such as full names, address, or phone number on public sites;</li>
<li>Do not reply to unknown texts, emails, or calls that ask for personal information as this could be phishing attempts;</li>
<li>Strengthening use of strong password or pin management;</li>
<li>Use of multifactor authentication for access control;</li>
<li>Use of updated anti-virus software’s for your devices;</li>
<li>Avoid use of unsecured domains which are controlled by unknown intruders;</li>
<li>Avoid use of unsecured public Wi-Fi which are a toll-free venue for fraudsters to gain access to personal data on mobile devices; and</li>
<li>Avoid using your mobile phone numbers as a recovery option for accounts and passwords, rather use another email ID.</li>
</ul>
<p>SIM Swap is one of the reasons why one should not use their phone number as a verifier for identity since it can easily be breached. It is therefore recommended that you add other layers of protection to keep your accounts and identity safe.</p>
<p>At <strong>Riskhouse International</strong>, our team of <a href="https://riskhouse.co.ke/service/forensic-investigations-data-recovery/" target="_blank" rel="noopener"><strong>Cyber Security &amp; Digital Forensic</strong></a> experts can provide you with a framework that covers information security management, risk awareness, users and processes training on cybersecurity fraud, vulnerability assessment and penetration testing, system audit, business continuity plan, disaster recovery plan and digital forensic investigation on system frauds. We will be able to understand your system design architecture, risk universe, vulnerability exposure and implement corrective action.</p>

		</div>
	</div>
</div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/identinty-theft/">Identity Theft</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vendor Due Diligence Checklist</title>
		<link>https://riskhouse.co.ke/vendor-due-diligence-checklist/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Thu, 26 May 2022 12:11:20 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Riskhouse International]]></category>
		<category><![CDATA[Due Diligence]]></category>
		<guid isPermaLink="false">https://riskhouse.co.ke/?p=7957</guid>

					<description><![CDATA[<p>Businesses are embracing vendor relationships if not for the supply of goods, it is to simplify processes with the end goal to acquire profits and grow. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/vendor-due-diligence-checklist/">Vendor Due Diligence Checklist</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn" >
		<div class="wpb_wrapper">
			<p>Businesses are embracing vendor relationships if not for the supply of goods, it is to simplify processes with the end goal to acquire profits and grow.</p>
<p>While vendors are proving to be a necessity to businesses, they can come with risks that could harm the viability of a business. The process of vendor due diligence is therefore essential; it entails examining the ‘health’ of an entity before on boarding it as part of your supply chain.</p>
<p>At <strong>Riskhouse International</strong>, our Vendor Due Diligence checklist focuses on the core areas below:</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn" >
		<div class="wpb_wrapper">
			<table>
<tbody>
<tr>
<td><strong>General information and Compliance review</strong></p>
<ul>
<li>We confirm the legitimacy of company registration and compliance documents</li>
</ul>
</td>
<td><strong>ICT software review</strong></p>
<ul>
<li>We assess the software’s in place that protects the client from data and privacy breaches and other cyber-related crimes</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Financial standing review</strong></p>
<ul>
<li>We assess the financial status of the company and its credit standing to carry out assignments.</li>
</ul>
</td>
<td><strong>Value Proposition analysis</strong></p>
<ul>
<li>We assess whether the value proposition offered to you by the vendor can be attained</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Assets and equipment verification</strong></p>
<ul>
<li>We verify the existence and usability of vendors’ assets and equipment</li>
</ul>
</td>
<td><strong>Leadership and workforce review</strong></p>
<ul>
<li>We assess the capability of the vendors’ human resources to deliver</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Policies and Procedures review</strong></p>
<ul>
<li>We review policies and procedures in place in relation to service delivery</li>
</ul>
</td>
<td> <strong>Litigation history search</strong></p>
<ul>
<li>We search for any legal matter with the vendor that could pose a reputational risk to our client</li>
</ul>
</td>
</tr>
</tbody>
</table>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn" >
		<div class="wpb_wrapper">
			<p>Different vendors would require different checklists, therefore, the above is not exhaustive. Outsourcing our vendor due diligence services will provide you with extensive expertise, resources, and a more in-depth analysis of your prospective vendor.</p>

		</div>
	</div>
</div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/vendor-due-diligence-checklist/">Vendor Due Diligence Checklist</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
