Procurement fraud and how to deal with it
The most cost-effective way to deal with fraud is to prevent it. A dishonest employee will exploit any loophole in an organization. So, to prevent…
The most cost-effective way to deal with fraud is to prevent it. A dishonest employee will exploit any loophole in an organization. So, to prevent…
The act of giving money, goods or other forms of recompense to a recipient in exchange for an alteration of their behavior (to the benefit/interest…
Employee fraud is a significant problem faced by organizations of all types, sizes, locations and industries. While we would all like to believe our employees…
Your corporate success relies on the people you bring on board. It is important to take steps to hire the best employees. Contacting former supervisors…
Cyber crime is a term that covers a broad scope of criminal activity using a computer. Some common examples of cyber crime; include identity theft,…
A crime scene is really an accumulation of things that is, when taken together and analyzed, tell the story of the crime. But in order…
Identity theft Identity theft is when your personal details are stolen, this happens when fraudsters access enough information about someone’s identity such as their name, date…
Authentication is the process of determining whether a person is who he or she claims to be. This process can occur in one of two…
Forensics investigations is a step by step tracing for dots in a digital equipment to establish where the missing link is. Unlike traditional forensics, digital…
This is a case that involved a high level fraudster. The fraudster was an IT person who came in as a cleaner in the company.…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.