Stronger identity management to curb fraud?

February 2015 Access Control & Identity Management

Fraud in the workplace can be ascribed to a number of factors: economic hardship, criminally minded staff, syndicate intimidation and bribery, opportunistic chance takers and more. The fact is, expecting people to behave honourably when they have no intention of doing so will result in failure.

Yet, while blindly trusting people is counterproductive, there are those who are honest and will not commit fraud even if the opportunity is there. So what is the answer to preventing fraud in the workplace? One does not want to punish the honest just because some people have no ethics.

Could stronger identity management cut down on fraud? But how does one do this without adding to the complexity of the workplace, which will simply lead to users looking for ways to break or work around the processes? Hi-Tech Security Solutions asked two industry leaders for their take on this touchy subject.

Hi-Tech Security Solutions: Can stronger identity management processes make a difference to fraud in the workplace? How would this work and what in what areas would it be appropriate?

Hendrik Combrinck, ZKTeco South Africa: Yes. By implementing digital identity management, an audit trial of all transactions on an entire system can be logged. This will force users to take responsibility for their actions.

Nicolas Garcia, Morpho South Africa: Experience has shown over the past 10 years that adequate identity management contributes highly in reducing fraud in the workplace and although very difficult to eliminate completely, fraud can be reduced dramatically by implementing proper systems. Most areas can be covered, but from a risk management point of view it makes sense to address the most sensitive areas first.

Hi-Tech Security Solutions: Please define what you mean by identity management and identity authentication, specifically related to our topic of fraud prevention in the workplace?

Hendrik Combrinck: Identity management is the management of a person’s identity credential inside the workplace. Whether it be a PIN on a keypad to access a door or a card or a fingerprint to access your computer. With strict credential management, users can be monitored 24/7. This will cut down on fraud and minimise losses for the company.

Nicolas Garcia: Identity management in general is the operation of ensuring who a person is and of gaining access to relevant information pertaining to this specific person. Identity authentication is the operation to verify that a person is who he/she claims to be. Identity authentication is particularly important at the time of authorising a transaction.

Hi-Tech Security Solutions: Would biometric identity authentication work in a busy workplace – specifically with respect to preventing fraud? Are biometrics accurate and reliable enough to use in a commercial setting with untrained users? What forms of biometrics would you say are reliable enough for real world use?

Hendrik Combrinck: Biometrics already plays a big role in the day-to-day workings of many companies. It has proven itself to be reliable and accurate enough for people to get paid by it, why not use it in cutting down on fraud.

No system can work 100% efficiently without the users being trained to use it, this is a normal process in any digital environment. Fingerprints, at the moment, are the most reliable form of digital credential because they are highly accurate and also cost effective for companies to implement in an array of applications. Facial recognition is evolving fast and is proving to be a contender in identity management in the commercial environment.

Nicolas Garcia: Biometric systems have long been used in the workplace and proven to be fast, accurate and reliable. The most adopted technology is fingerprint technology because its use is seamless for the user and fast enough not to congest the workplace. Biometric is also faster, easier and more secure to use than typing a password to authorise a transaction, for instance.

Hi-Tech Security Solutions: Are there simpler, non-biometric ways to manage identities to the level required?

Hendrik Combrinck: There are simpler, non-biometric ways to manage identities, but not to the level required to prevent fraud in the modern workspace.

Nicolas Garcia: There are existing systems which make use of cards. I don’t think they are simpler to use than biometrics, but they are bearing so many disadvantages that they are intrinsically losing out to biometric systems.

Hi-Tech Security Solutions: Are there additional methods of preventing fraud before the person is actually ‘on the job’, such as employee screening, online identity verification with Home Affairs etc.? Can/should these be integrated with biometric identity authentication?

Hendrik Combrinck: Yes, employee screening is very important because that is where the interaction starts for an employer and a potential employee’s identity. This is a crucial step and can definitely be fast tracked with biometrics and online verification. One must also remember that the Home Affairs systems are also run by people and also need to be protected because if the wrong information is captured there it will filter through to potential employers.

Nicolas Garcia: Although fraud attempts cannot be eliminated, it is certainly a good idea to ensure any new staff you bring onboard don’t have a history of committing fraud, especially if they are to work in sensitive functions like finance, etc. Screening solutions are available through credit bureau services or similar organisations and are linked to various government databases to ensure that the applicant is the right person and is clear from any criminal offence.

The screening solution allows you to capture a fingerprint and to submit it to the government systems which in return acknowledges the match or not. Government databases are not otherwise shared with private companies and therefore prevent fully integrated real-time authentication.

Hi-Tech Security Solutions: How does a business person justify the cost of implementing biometrics when the older password method is free and simple? Even tokens or cards/smartcards are cheaper?

Hendrik Combrinck: This has been one of the biggest myths in the digital market in the last two years. Yes, passwords might be free, but does it prevent fraud at a level required by the market. Biometric systems have been proven over and over again to be more accurate and more cost effective than the token or other card based systems. It is all up to the supply chain of these biometric systems in South Africa to stop using biometrics as a cash cow and start implementing cost effective biometric identity management systems in the market.

Nicolas Garcia: Older methods such as password, cards, tokens, etc. might seem cheaper to implement, but have proved to be insecure. The cost of managing cards and passwords are often overlooked but can represent a significant budget every year. A password or a card/token can be communicated, lost/forgotten or stolen hence creating a security breach. One must decide if he is prepared to take the risk to save money.

Hi-Tech Security Solutions: Could using biometrics to prevent fraud be made more cost effective if integrated into other areas of the business such as access control? Can you provide an example of how this may work?

Hendrik Combrinck: Yes it can. A simple example of this is by connecting the access control system to the Active Directory of the company. In essence, a person will not be able to log on to any system in the company if he/she did not clock in at any of the access control points in the building. So, if someone is not on site then his digital credential can’t be active.

Nicolas Garcia: This is called convergence and consists of integrating physical and logical access control in the same system. The idea behind that is to simplify administration and reducing cost by only using one backend, increase security while adding more convenience for all users (only one enrolment).

Security is improved because you can now imagine more secure scenarios e.g. preventing someone from logging onto a PC without first physically entering the building or the other way around, automatically log out of a workstation if the person exits the building after a certain time, etc.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Intelligent access at the gate
Access Control & Identity Management Residential Estate (Industry)
LD Access provides a smart, streamlined approach to boom gate security, enhancing the verification of people and vehicles before entry. Through its Self-Service Scanning Kiosk and Mobile Scanning Unit, LD Access delivers secure, automated access control.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.