Fraud and Forensics

Categories
In general, the amount lost to not for profit fraud isn't nearly as much as it is at for-profit businesses. Few nonprofit budgets can afford a $75,000 shortfall or the bad publicity associated with fraud. Here’s how nonprofits open the door to fraud — and how your organization can shut it.
According to the KnowBe4 Security Team (www.knowbe4.com), the bad guys are developing malicious apps with the hopes of making their way into your mobile device’s app store–and sometimes they’re successful. Recently, over 100,000 people across the globe downloaded applications containing spyware from a reputable app store.
It is important for everyone to be aware that thieves often pose as the IRS to get taxpayers to turn over personal information in a scam called phishing.  The type of information thieves are looking for includes requests for PIN numbers, passwords or similar information for credit cards, banks and
Gift cards have become increasingly popular as holiday gifts and sales are expected to reach $30 billion in 2018.  Like individuals, businesses also find that gift cards are a convenient way to thank their employees and customers during the holiday season.
A shell company is an entity created without active business operations or assets.  While they are not illegal, sometimes shell companies could mean fraud.
Synthetic identity theft involves the creation of a fictitious identity based on a combination of real and fake information.  While criminals use only a portion of your stolen personal data to create the fictitious identity, that doesn’t necessarily lessen the negative impact to your credit. According to forensic experts, synthetic
There are many benefits of working with a family you love and trust. However, sometimes the trust family members have for each other is one of the things that create some major problems that compromise the business’s finances and longevity because it only takes one person to damage or destroy
A quality fraud investigation report can provide many documents, including witness interviews, paper trails and detailed facts uncovered in the process.
Despite the real threat and high cost of fraud, too many businesses fail to build fraud risk management programs that work.  If you have put off taking this important step toward protecting your company, now is the time to act.
Uncovering fraud doesn’t always require in-depth data analysis or forensic accounting techniques. Qualified experts also find basic managerial accounting practices are handy tools when identifying potential fraud,
A ghost employee is someone who appears on your payroll system, but who does not work for your company. The ghost employee can be a real person who is knowingly added to the payroll records, or a fictitious person invented by a dishonest employee.
The reasons why employees steal can be hard to predict.  In many cases, employees who commit fraud are the most likable people in the office — personable, helpful and good at their jobs. It’s not easy for companies to spot dishonest employees. So in addition to shoring up your internal
When employees steal, their colleagues are more likely to be aware of it than the managers in the executive suite, but they may be reluctant to “rat out” fellow workers.
Financial statement fraud is committed by intentionally misrepresenting an organization’s financial condition. A perpetrator might do this by omitting or misstating amounts or information to deceive auditors, shareholders and the public. However this fraud is committed, it tends to be one of the most costly schemes for the victimized companies.
When employees commit fraud, it can take months, even years, for their employers to discover the theft. But proactive fraud detection makes it possible for businesses to detect fraud schemes earlier - long before they generate significant losses.
We Value Your Privacy

This site may use cookies to store information on your computer. Some are essential to make our site work and others to improve the user experience. By using this site, you consent to the placement of these cookies and accept our privacy policy.