{"id":4564,"date":"2013-12-10T21:57:00","date_gmt":"2013-12-10T21:57:00","guid":{"rendered":"https:\/\/evssolutions.com\/the-importance-of-securing-it-systems\/"},"modified":"2013-12-10T21:57:00","modified_gmt":"2013-12-10T21:57:00","slug":"the-importance-of-securing-it-systems","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/the-importance-of-securing-it-systems\/","title":{"rendered":"The Importance of Securing IT Systems"},"content":{"rendered":"

When it comes to creating a system that is going to process
\nmass quantities of requests and transactions its essential to make fraud
\nprevention a top priority. After all, whats the point of putting hours of work
\ninto a system only to have it compromised or used for fraud when its finished?
\nA solid fraud
\nprevention strategy<\/a> can prevent a big mess from the beginning. <\/span><\/p>\n

Since were on the topic, lets talk about the recent
\naudit<\/a> that was done on the Affordable Care Act system that will process refundable
\ntax credits. The audit exposed that the system wasnt built to properly detect
\nfraud. Without an adequate solution in place the
IRS<\/a>
\nmight not be able to identify tax fraud or schemes prior to the issuance of the
\nrefunds. The entire system is the perfect landscape for fraudsters to
\nmanipulate.<\/p>\n

With the ACA<\/a>
\nsystem, the tax credits will be paid to the user first and then verify their
\nincome later. Inevitably, this process will lead to potentially billions of
\ndollars of improper payments and put millions of Americans personal information
\nat risk. It is important for the IRS to thoroughly consider fraud threats and
\nrisks that could impact the new ACA systems. Robust solutions within the new
\nsystem should be required to help reduce improper payments and risk. Its
\ninteresting that such a large system would be deployed without proper detection
\nand security for its users.<\/p>\n

In order to make sure the credits get to the correct people,
\na
fraud
\nprevention plan<\/a> must be in place immediately. There needs to be a
\ncomprehensive prevention strategy to guide systems through the development,
\ntesting and implementation process. These IT systems also need to be managed
\nand monitored constantly for fraud risks. Verification and authentication
\nprocesses should not be taken lightly, especially when users personal
\ninformation is on the line. <\/p>\n

<\/p>\n

[Contributed by EVS Marketing]<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

When it comes to creating a system that is going to process mass quantities of requests and transactions its essential to make fraud prevention a top priority. After all, whats the point of putting hours of work into a system<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4564"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4564"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4564\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}