When Fraud and Becky with the Good Hair Collide
At Kount, we’re always keeping an eye out for fraud in all shapes and sizes. We know it knows no bounds, and anyone can fall victim. Today we take a look at when fraud happens when you unexpectedly find yourself in the spotlight.
No one can get enough of Lemonade – the surprise visual album dropped by Queen Bey. Whether you’re caught up on Hold Up or getting in Formation, the world has Beyoncé fever. One of the catchiest and most buzzed about lines in her album is “Better call Becky with the good hair.” Speculation and mistaken accusations have run rampant on the identity of said-Becky. When one woman alluded to the possibility of being Becky, little did she know she would soon be thrust into the spotlight and days later, become a victim of fraud.
Over the weekend of Lemonade’s release, fashion designer Rachel Roy had intended to post a light-hearted image on Instagram referencing “good hair” and “no drama queens.”
Unexpectedly, the loyal Bey-hive took this as her claim to Becky-fame and unleashed an onslaught of attacks. Not only did angry fans respond with verbal attacks on her since-deleted Instagram post, infiltrate her social media pages, and unexpectedly drag innocent celebrity chef Rachael Ray into the mix, they hacked Roy’s personal files and even her email. Despite attempts to distance herself, the damage was done.
It’s unlikely you or your business will be mistaken for “wronging” Beyoncé, but it’s a reminder that you can find yourself suddenly exposed at any point in time…even without crossing the Bey-hive. That’s why it’s incredibly important to have a line of defense and to be(y) very careful:
- Examine Your Vulnerabilities: The process is similar for both consumers and businesses -- know all your accounts/systems and take a close look at each of their potential vulnerabilities. Taking extra precautions can help protect yourself against vulnerabilities that you may not have even been aware of.
- Watch for Changes: Have your fraud risk tools on “set it and forget it?” If so, make sure it’s a system the evolves and changes as fraud does too. Watch for patterns that may occur and any activity out of the ordinary.
- Stay Alert: Static data of the past, like AVS, CVV, IP and device ID lookups are no longer sufficient to detect and prevent fraud. Make sure you stay alert by employing multiple techniques to prevent fraud.
With a few extra steps, you’ll be able to turn lemons into lemonade.