Scam perpetrators can mine crucial information from executives’ public profiles on social media.
The principles outlined in a popular internal control framework can help organizations manage their cybersecurity.
Nathan J. Mueller’s fleecing of his employer, a financial services giant, is noteworthy because of the amount of money stolen, the many years the embezzlement lasted, and the internal control weaknesses that made the scheme possible. This article examines how the crime was committed and what organizations can do to protect themselves from similar losses.
Do you know how to spot the red flags of a fraudulent transaction? Can you evaluate the warning signs? Find out in our Fraud IQ quiz.
The SEC is urging investors to proceed with caution when evaluating potential investments related to bitcoin. Bitcoin-related investment opportunities may come with a heightened risk of fraud, the SEC warned in an investor alert issued Wednesday. In the alert, the SEC said the rise of bitcoin and other virtual and
As hardware and software have proliferated—and come down in price—more businesses have tools and settings at their disposal to implement continuous monitoring techniques. This article provides a few simple ways small and medium entities can improve monitoring processes to detect fraud and other risks.
CPAs can use several techniques to protect themselves against risk exposures related to failure to detect theft and fraud.
Trying to uncover evidence of fraud in a data set of millions of records is somewhat akin to searching for a needle in a haystack. Fortunately, the successful employment of data analysis techniques can clear away most of the “hay” and leave the fraud examiner or auditor with a much