Category: Prevention
Non-Profits – Easy Targets for Fraudsters
May 1, 2018Caring Hands was a non-profit organization providing mental health care and substance abuse rehabilitation services in Pennsylvania. Ms. Graham, one of Caring Hands’ social workers, visited clients’ homes to provide social services for families and children. Ms. Graham would compile case notes and information for families and children and submit timesheets to Caring Hands; Caring Hands, in turn, would bill the Pennsylvania Medicaid program. Caring Hands’ IT department was testing employee data and found personnel records for Ms. Graham did…Inventory 101
April 26, 2018When a company’s inventory count comes up short, the hunt for the missing inventory begins. Are employees are stealing from the warehouse in the middle of the night? Is a dishonest bookkeeper recording fictitious purchases and pocketing the difference? Possibly. But while employee theft may be the reason, less nefarious causes might be to blame. Defining & Tracking Inventory Inventory can be defined as the raw materials, work-in-process products and finished goods considered to be the portion of a business's…Establishing a Company Social Media Policy
February 1, 2018Richard Hy, a New York policeman, found out the hard way that joking on social media about stealing cocaine from the evidence room was a bad idea. Hy was suspended without pay. A waitress was recently fired for posting complaints about a customer on Facebook. A woman lost a job offer at Cisco because of comments she made on Twitter. Social media sites, such as Facebook, Vine and Twitter, represent potential pitfalls for both employees and businesses. Employees need to…The Person in the Middle Scheme
August 3, 2016In Asia, there is a popular fidelity claim involving the person-in- the-middle scheme. These schemes have increased as more foreign companies enter the market in Asia due to the rapid economic growth and significant consumer market. Language differentials, lack of access to sales channels, requirements of joint ventures, ownership and control by citizens of the country make these schemes popular. The Types Generally, there are two types of person-in-the-middle schemes. The first type of scheme involves the foreign company selling…Keeping Hackers Out
September 12, 2013Cyber Liability & Prevention In April 2011, Sony’s online gaming network was hacked, compromising the personal and credit card information of 77 million users. The network outage lasted 23 days and cost Sony $171 million. A class action suit has charged Sony with negligent data security, unauthorized storage and retention of data, and failure to properly encrypt data. News stories of company data breaches are common these days, although perhaps inflated. The Economist[1indicated the survey and statistical extrapolations for determining the…Preventing Fraud
September 12, 2013Business owners are becoming increasingly aware of numerous schemes they and their employees need to avoid. Cyber fraud lurks in many different forms, including, but not limited to: Auction Fraud Investment Fraud Counterfeit Cashier's Check Lotteries Credit Card Fraud Nigerian Letter or "419" Debt Elimination Phishing/Spoofing Parcel Courier Email Scheme Ponzi/Pyramid Employment/Business Opportunities Reshipping Escrow Services Fraud Spam Identity Theft Third Party Receiver of Funds Internet Extortion Compounding matters is the fact that businesses and employees often receive hundreds of…