The impetus to review the effectiveness of an existing authentication system can sometimes arise from actual or potential fraudulent transactions. For example, one fund group consulted for this study, after experiencing and investigating a small number of fraudulent transactions that appeared to have been initiated by identity thieves, undertook a comprehensive review of its approach to shareholder authentication, and closely analyzed and reconsidered how to approach different types of transactions.
Of course, fund groups may wish to re-assess their approaches even in the absence of actual or potential incidents. One fund group consulted for this study has a team of personnel dedicated to the identification and evaluation of emerging risks with regard to shareholder transactions. The team reviews and analyzes new technologies and other risk management techniques, and makes recommendations to a fraud prevention committee.