Hot Topics

  • Ransom in the Digital World

    The concept of ransom is as old as crime; ransomware is the extension of ransom to the digital world. The first instance of a ransomware attack is thought to have taken place in 1989. This occurred when Joseph L. Popp, a biologist, sent 20,000 infected floppy disks to the guests at an International AIDS conference. […]

  • Business Email Compromise Scams

    Did you know… In 2016, an Austrian Aerospace firm was defrauded of $42 million dollars. In 2017, Save the Children USA was the victim of a $1 million scam In 2019, a Toyota subsidiary suffered a loss of $37 million What caused these significant losses… it’s the rise of Business Email Compromise scams. What are […]

  • Social Media: A Powerful Tool

    “Twitter is not a technology, it’s a conversation—and it’s happening with or without you.” Charlene Li, author Social media refers to any website or application that is designed to allow people to share content quickly, efficiently, and in real-time. The major social media platforms (at the moment) are Facebook, Instagram, Twitter, LinkedIn, Pinterest, YouTube, and […]

  • Expanding the Definition of “Employee”

    By Agnes Gawecki The definition of “employee” under Employee Theft Coverage is crucial in determining whether benefits will be paid in the event of property theft. Employee Theft addresses various types of employees, though its noteworthy to point out owners and partners are excluded from the coverage. Employee Theft insurance relies on a specific definition […]

  • Workplace Bias

    Sometimes it’s hard to be a woman . . . Tammy Wynette Women in the workplace walk a tightrope between being perceived as too bossy or too weak. The same behaviors are labeled differently for male leaders and female leaders. A male leader who shouts, speaks over others, and ignores opposing viewpoints may command respect. […]

  • Choose Wisely

    Handle them carefully, for words have more power than atom bombs. Pearl Strachan Hurd -British Politician (1930s) Appearances, behavior, tone of voice, and even words make an impression. Words can convey both confidence and insecurity. A recent New York Times op-ed by Molly Worthen, a history professor, discusses the tendency, especially among women, to use […]

  • Tax Identity Theft Awareness Week

    January 27, 2020 is a big day. It’s National Chocolate Cake Day, Bubble Wrap Appreciation Day, and the ever popular Tax Identity Theft Awareness Day. The IRS has observed Tax Identity Theft Awareness Day since 2014 in an effort to bring awareness to an ever-increasing problem. So, while you’re celebrating with a slice of cake […]

  • Advanced Inventory Concepts

    A company files a claim contending a warehouse manager stole $450,000.00 in inventory. The manager, a long-time employee, was trusted with keys and alarm codes. He was able to enter the warehouse after hours and remove pallets of product. The company contends the theft occurred over a 12-year period. When confronted with an inventory loss […]

  • Is it Fraud? 4 Reasons for Inventory Loss Claims

    When a business files an inventory loss claim, we often jump to the conclusion fraud is the cause of the loss. But fraud it isn’t always the reason behind the missing items. Several variables make it difficult to measure inventory accurately: complex production processes, varied accounting methods, and the sheer volume of items. As a […]

  • SDCCPA Article: A New Title, Not a Typo

    Mx. A New Title, Not a Typo

    “There is a void in the English language which we undertake to fill,” wrote a journalist from a Massachusetts newspaper in 1901. “Everyone has been put in an embarrassing position by ignorance of the status of some woman. To call a maiden Mrs. is only a shade worse than to insult a matron with the […]

  • SDC CPA Article

    The Computer Fraud and Abuse Act

    In 1986, U.S. Congress enacted the Computer Fraud and Abuse Act (CFAA), The CFAA was enacted to combat various types of “computer crime.” The Act criminalized, among other things, the act of intentionally accessing a computer without authorization.  In 1986, this meant “hacking or trespassing into computer systems or data.” The CFAA has been expanded […]

  • Unusual News Article by SDC CPAs

    Unusual News

    Employee theft and employee dishonesty cases can follow similar patterns. Employees often steal merchandise, cash, or make personal purchases using company credit cards. But some cases stand out either because of the amount of loss or the method of misappropriation. Here are five over-the-top examples of in-house theft and employee fraud: The Jury Duty that […]