Yes, You Are Getting Scammed. How to Combat Fraud and Increase EfficiencyFraud always has been and always will be. When it comes to the public sector, the customer is an entire nation of people — and everyone deserves a better identity-proofing experience.

ByScott Straub

Opinions expressed by Entrepreneur contributors are their own.

"There is no kind of dishonesty into which otherwise good people more easily and frequently fall than that of defrauding the government."

These words of wisdom fromBenjamin Franklinhave, unfortunately, proven timeless. People have been defrauding the government for centuries, but last month, the US hit anestimated $45 billionin COVID-19-related unemployment fraud. Now the government starts the long, costly and inefficient process of recouping the money, conducting investigations and punishing those responsible. This process is often called the "pay and chase" model.

With all thatfraud, it can be challenging for government agencies and private companies to separate the wheat from the chaff (or, in this case, the fraud from the noise). For example, is a person calling your call center with a device you haven't seen before actually an existing customer with a new phone or someone attempting to take over an account?

These issues createroom for inefficienciesand cost companies huge operational sums when they cannot tell the difference. But, going too heavy with stricter verification that may dampen the customer experience is also something you have to avoid. The good news is it's possible to identify fraudulent activity with modern technology better and thus increase efficiency.

Related:政府不能幸免Account-Takeover Fraud, and That Could Be Trouble for You and Me

Modern fraud and its noisy neighbor

At its core, the focus of fraudsters has remained ontricking people into giving accessto as much money or data as possible. It's nothing new; the term "con man" was likelycoined in the 1800s. Whether it's Bill Starbuck's "The Rain Song" from the musical110 in the Shade,有魅力的骗子说服townspeople to give him money to make it rain and end a drought, or someone calling your grandmother and pretending to be a government agency, fraud has always been, and always will be.

Our ability to close fraud loopholes is improving. Still, fraudsters are constantly creating new schemes, and technology continues to enable them to get better at fooling us and covering their tracks. This requires businesses and the government to react to new trends quickly; thebest defense against fraudis to be aware of the techniques, remain on guard and educate consumers to do the same. All the while, businesses and governments must walk a tightrope between restricting freedoms too much and being purely reactive to crime.

The public and private sectors utilize call centers for customer account issues and require telephonic calls for some account actions. Unfortunately, these call centers are very susceptible to fraud. The time customer service reps spend trying to distinguish between fraud and noise (i.e., the legitimate calls that get flagged as fraud) distracts from more critical business and carries high costs.

For example, in the financial services industry, thecost of fraud to businessesis $4 for every $1 of actual fraud. That means, on average, if a person defrauds $1,000 from a company, that business's related costs will be $4,000. And this figure doesn't include additional costs incurred if a fraudster secures enough information on their first attempt to follow up with more attempts on the same business or its clients, nor the cost of reputational damage post-attack.

One of the big problems, though, is that fraud and noise can often seem similar. For instance, imagine you broke your cell phone and got a new one. When you try to access your bank account from your new phone, your account gets flagged because it doesn't recognize the device. Now, you have to call to unlock your account, and your bank needs to spend resources confirming your identity. This protects the consumer and the bank but introduces inefficiency for both parties.

Related:How to Identity Proof in an Increasingly Virtualized World

So, what's an agency to do?

Is there a solution? Modern identity proofing continues to progress in leaps and bounds. Thetechnology exists now实现更好的身份验证的device-agnostic and uses powerful, behind-the-scenes algorithms to prove a customer's identity — often without them even realizing what's going on.Artificial intelligence (AI) helps us use data pointsacross the web to calculate the risk associated with a person or caller and create a dynamic risk profile. Then, based on their risk level, they may be required to complete additional automated steps to log in to their account or conduct business.

There are more straightforward steps, as well. For example, impersonating the dead has long been a lucrative tactic for fraudsters. Years ago, criminals even got hold of the Social Security Administration's (SSA)Death Master File, a restricted record with millions of people to impersonate. One of the first steps a company can take during the account creation process is tocheckthe Death Master File. Every time a person initiates a request for money with an agency, a quick screening can be done to ensure the person requesting a payment from the government is not a dead person. That would be a sure sign something's amiss.

Of course, there's no end to the trickery. Recently, I watched in real-time as a phone-based scam targeted my stepmother. She received a text that appeared to be from a friend saying her email had been the target of a scam, and my stepmom should call a particular number to make sure hers hadn't also been compromised. I had to explain that it wasn't her friend texting but someone using her friend's number.

Older people areespecially susceptible to fraudlike this, but scammers have discovered impersonating a government agency or some entity with authority is a winner. If we get a callsaying we're in trouble with agovernment entity, will we ignore it? Probably not — many of us will do exactly what they say.

Related:How Technology Can Improve CX for Government Services

A continuous process

We aren't going to be able to screen out fraud completely. But we can get better at thwarting it, saving operational dollars and resources and providing good customer experiences. The greatest vulnerability in any system is usually the humans using it, so implementing more automated identity-proofing and anti-scam tools can help bridge the gap. We can build efficiency into our systems by keeping up with the latest scam trends and implementing adequate technical controls to stop them.

Scott Straub

Entrepreneur Leadership Network® Contributor

Senior Director, Public Sector Market Planning at TransUnion

Scott Straub is a Public Sector expert with a unique blend of private and public sector experience focusing on the optimization of processes and fraud prevention. Scott has built operating divisions in the federal government and launched multiple divisions within the private sector as well.

Editor's Pick

Related Topics

Money & Finance

Want to Become a Millionaire? Follow Warren Buffett's 4 Rules.

Too many entrepreneurs are counting too heavily on a company exit for their eventual 'win.' Do this instead.

Growing a Business

5 Overlooked Strategies to Maximize Your LinkedIn Presence and Impact

Implementing these five strategies can help improve networking efforts, increase visibility in the industry, and open up new career opportunities on LinkedIn.

Business Ideas

The Top 10 Home Business Ideas for 2023

Can't figure out which enterprise you should launch in 2023? Check out 10 stellar home business ideas to get inspiration.

Growing a Business

7 Ways to Earn Passive Income From Work You Have Already Completed

Make more money by implementing these techniques to profit more without having to reinvent the wheel and break through your income ceiling.

Living

Keep Your Cats Happy With This $25 Automatic Toy

It moves and balances on its own so your cats can play with it for hours.