Category: Business
Mx. A New Title, Not a Typo
July 2, 2019“There is a void in the English language which we undertake to fill,” wrote a journalist from a Massachusetts newspaper in 1901. “Everyone has been put in an embarrassing position by ignorance of the status of some woman. To call a maiden Mrs. is only a shade worse than to insult a matron with the inferior title Miss. Yet it is not always easy to know the facts.” The writer was explaining the newspaper’s use of the word Ms. –…Local Versus Global Brand for Auditing Firms
December 5, 2018On March 8, 2017, the Wall Street Journal published an article about KPMG being under fire for scandals in the U.S., South Africa, and the U.K. Although KPMG does face trouble on three fronts, the scandals involve three legally separate firms: KPMG, LLP, a New York-based U.S. partnership, is dealing with the indictment of former partners on charges they helped steal secret regulatory information. KPMG’s local affiliate in South Africa faces a criminal complaint and scrutiny overs its ties to…Recent Ruling: Medidata Solutions, Inc. v. Federal Ins. Co.
November 7, 2018The case Medidata Solutions, Inc. v. Federal Ins. Co. involved a fraudulent impersonation scheme and an alleged entry into the insured’s computer system. The case involved a series of events seen all too often. The court’s ruling presents a peek into the intricacies of analyzing coverage in traditional computer fraud claims. It is important to understand the difference between loss resulting from social engineering schemes and computer hacking. Losses involving social engineering do not require a hacker gaining unauthorized access.…Computer Fraud Trends
October 18, 2018Since May 2000, the FBI’s Internet Crime Complaint Center (IC3) has received more than 4 million complaints. Incidences of internet crime are steadily increasing. In 2013, IC3 received 262,813 complaints, with a reported loss amount of $781.8 million. In 2017, IC3 received 301,580 complaints, with a reported losses of $1.4 billion. Tracking the Trends IC3 tracks the latest trending scams each year. In 2017, Business Email Compromise (BEC), Ransomware, Tech Support Fraud, and Extortion topped the list. BEC, Confidence/Romance Fraud,…Scientia Potentia Est (Knowledge is Power)
July 18, 2018The 2018 Global Study on Occupational Fraud and Abuse is hot off the press – and it’s an important resource for anyone interested in occupational fraud. The report includes valuable information on how fraud is committed, how it’s detected, who commits it, and how organizations can protect themselves. Compiled by the Association of Certified Fraud Examiners, this year’s annual report examined 2,690 cases in 125 countries across 23 industries. The results are in and here are a few key takeaways:…Non-Profits – Easy Targets for Fraudsters
May 1, 2018Caring Hands was a non-profit organization providing mental health care and substance abuse rehabilitation services in Pennsylvania. Ms. Graham, one of Caring Hands’ social workers, visited clients’ homes to provide social services for families and children. Ms. Graham would compile case notes and information for families and children and submit timesheets to Caring Hands; Caring Hands, in turn, would bill the Pennsylvania Medicaid program. Caring Hands’ IT department was testing employee data and found personnel records for Ms. Graham did…Inventory 101
April 26, 2018When a company’s inventory count comes up short, the hunt for the missing inventory begins. Are employees are stealing from the warehouse in the middle of the night? Is a dishonest bookkeeper recording fictitious purchases and pocketing the difference? Possibly. But while employee theft may be the reason, less nefarious causes might be to blame. Defining & Tracking Inventory Inventory can be defined as the raw materials, work-in-process products and finished goods considered to be the portion of a business's…Opportunity, Not Gender, Matters
February 27, 2018Mary, Dr. Martin’s “second wife”, worked as the doctor’s office manager for thirty years. Mary knew Dr. Martin’s habits. She managed the practice, had access to company and personal credit cards, performed banking and even picked up Dr. Martin’s dry cleaning. A trusted employee, Mary was efficient. Mary was nice. But Mary was a thief – stealing more than $500,000 from Dr. Martin over a period of years. Inaccurate Labels There is a new trend of labels describing the individuals who…Establishing a Company Social Media Policy
February 1, 2018Richard Hy, a New York policeman, found out the hard way that joking on social media about stealing cocaine from the evidence room was a bad idea. Hy was suspended without pay. A waitress was recently fired for posting complaints about a customer on Facebook. A woman lost a job offer at Cisco because of comments she made on Twitter. Social media sites, such as Facebook, Vine and Twitter, represent potential pitfalls for both employees and businesses. Employees need to…Whistleblower Hotlines: A Powerful Tool in the Fraud Prevention Toolbox
January 16, 2018Tips are one of the most common fraud detection methods. In 2016, the Association of Certified Fraud Examiners analyzed more than 2,000 cases of occupational fraud in 114 countries. In approximately 39% of cases, the fraud was discovered by receiving a tip. Organizations with reporting hotlines are more likely to detect fraud than organizations without hotlines: 47% vs. 28%. Warren Buffett, chairman and CEO of Berkshire Hathaway, stated in 2005: Berkshire would be more valuable today if I had put…