Finances
Investigating Investments
Have you ever heard the question “if you could have dinner with any person, who would it be?” Often the popular answer is a successful person in order to gain tips on increasing wealth. Financial investors are used for the same reason and much more widely available, offering insight into investments and wealth management....
Three Strikes…You’re Out
At a Little League game, you usually think about bases being stolen, not cash. Unfortunately, the same volunteers selling hotdogs and cotton candy at the concession stand may also be taking advantage of their volunteer position and stealing. One woman recently pocketed more than $2,000.00 from the team’s concession stand.
Volunteer theft from concession stands...
Recent Ruling: Medidata Solutions, Inc. v. Federal Ins. Co.
The case Medidata Solutions, Inc. v. Federal Ins. Co. involved a fraudulent impersonation scheme and an alleged entry into the insured’s computer system. The case involved a series of events seen all too often. The court’s ruling presents a peek into the intricacies of analyzing coverage in traditional computer fraud claims. It is important to...
Computer Fraud Trends
Since May 2000, the FBI’s Internet Crime Complaint Center (IC3) has received more than 4 million complaints. Incidences of internet crime are steadily increasing. In 2013, IC3 received 262,813 complaints, with a reported loss amount of $781.8 million. In 2017, IC3 received 301,580 complaints, with a reported losses of $1.4 billion.
Tracking the Trends
IC3...
Non-Profits – Easy Targets for Fraudsters
Caring Hands was a non-profit organization providing mental health care and substance abuse rehabilitation services in Pennsylvania. Ms. Graham, one of Caring Hands’ social workers, visited clients’ homes to provide social services for families and children. Ms. Graham would compile case notes and information for families and children and submit timesheets to Caring...
Inventory 101
When a company’s inventory count comes up short, the hunt for the missing inventory begins. Are employees are stealing from the warehouse in the middle of the night? Is a dishonest bookkeeper recording fictitious purchases and pocketing the difference? Possibly. But while employee theft may be the reason, less nefarious causes might be...
Whistleblower Hotlines: A Powerful Tool in the Fraud Prevention Toolbox
Tips are one of the most common fraud detection methods. In 2016, the Association of Certified Fraud Examiners analyzed more than 2,000 cases of occupational fraud in 114 countries. In approximately 39% of cases, the fraud was discovered by receiving a tip. Organizations with reporting hotlines are more likely to detect fraud than organizations without...
The Face of Fraud
Crime tends to require three elements: motive, desire and opportunity. Employee theft is no different. Being aware of the reasons leading up to employee theft and learning to identify likely perpetrators can give employers a leg up on protecting their companies from theft.
Motive & Desire
Employees who steal usually have their motives. For example,...
Home Sweet Home
Sunset Villas is a condominium complex with fifty units on the shores of Lake Michigan. Owners pay $550.00 a month in dues towards neighborhood and maintenance, including the upkeep of the pool and common areas. When the owners hired a property management company, they didn’t realize Sunset Villas was a tempting, lucrative target. Homeowners associations...
Strengths and Weaknesses of P-Cards vs. Credit Cards
P-Cards offer certain conveniences organizations find appealing. However, the ease of use goes hand in hand with the ease of abuse. End-user organizations should weigh the balance of the potential benefits and pitfalls of P-Card use in order to detect, mitigate and prevent their abuse.
The Good
1. Cost Savings
The traditional procure-to-pay process is costly, often...


