An Employee’s Revenge: The Perfect Reason for Implementing Strong Internal Computer Controls

Alex Helfand, ENCE, Computer Forensic Specialist

Most companies have adequate fair use policies and rules that govern how user accounts, and their related access rights, are handled upon termination of employment.  However, a recent news story should make companies more aware of the potential pitfalls of weak internal controls and encourage them to strengthen their security efforts.  According to The Baltimore Sun, it appears that a recently fired employee went to great lengths to exact revenge on his former employer […]

Internet Access: Is Your Data Secure? (Part 2 of 3)

John Merchant, CPA, CFE

In Part I we discussed access to the Internet through wireless connections provided by hotels, libraries and stores.  While such access could subject your data to intrusion, leading to you becoming the victim of fraud, there are precautions that can be taken.

Make sure your Operating System software is up to date.  For instance, if you use Microsoft products, Microsoft is continually updating its Operating System software for your protection.  When breaches of security become known, […]

Internet Access: Is Your Data Secure? (Part 1 of 3)

John Merchant, CPA, CFE

There seem to be almost endless opportunities to log on to the Internet when you are travelling or just going about your everyday life.  Most hotels offer internet connections and often you can log on from the local coffee shop or library.  Today, these connections tend to be wireless and that raises the basic question – when you access the Internet from one of these wireless sites, is your data secure?  This question needs to be […]

Major Cases Helped by Digital Forensics: The Casey Anthony Trial

Alex Helfand, ENCE, Computer Forensic Specialist

One of the most publicized cases in a long time, the Casey Anthony trial has involved a variety of expert witnesses.  Last week the prosecution called for the testimony of a computer forensic expert who had examined a hard drive related to the case.

Up to this point, the case had not had any significant breakthroughs and most of the evidence was circumstantial.  The examiner was facing a tough problem and the defense was ready […]

Top Ten Fraud Prevention Tips for Small Businesses, Tip #9: Simple Internal Controls Small Businesses Often Miss

Alex Helfand, ENCE, Computer Forensic Specialist

As a small business owner or senior executive, it is your responsibility to promote integrity and ethical values to your employees and implement the proper controls and procedures to prevent fraud.  In this series, we are highlighting ten basic fraud prevention steps you can take to keep your organization safe.
Small businesses are especially vulnerable to fraud simply because they often lack the necessary internal controls to help prevent fraudulent activities and safeguard assets.  A […]

Embezzlement in a Weak Economy

John Merchant, CPA, CFE

It has long been accepted that there are three factors that must exist for an embezzlement to occur – motivation, opportunity and rationalization.  Employees have motivation to steal when they have a financial need that cannot be met by their current income plus savings.  Once employees are motivated to steal, they must, of course, have the opportunity to accomplish the task.  Finally, most employees have some sense of right and wrong and must rationalize within themselves […]

Can You Hear Me Now? Searching Cell Phones for Forensic Evidence

Alex Helfand, ENCE, Computer Forensic Specialist

Digital forensics investigations are not limited to computers and removable media.  Mobile phone forensics is an important part of the digital forensics landscape; mobile phone usage is quickly growing and these devices are increasingly being used in a variety of crimes.

What evidence can be found on a mobile device?

Not only can mobile phones create logs of all calls and texts, but now smartphones are increasingly storing both personal and work emails for users.   Furthermore, […]

Help Wanted: Applying for the Job of Identity Theft Assistant

John Merchant, CPA, CFE

Do you participate in social networking through one of the social networking Internet sites, such as Facebook?  If you do, you should exercise caution.  These sites often provide the opportunity for you to share personal information about yourself.  Such information might include your name, address and telephone number as well as more private information such as your date of birth, the schools you have attended, your place of employment and the names of your parents.  In […]

Digital Forensics and eDiscovery Trends: Keeping Up with the eTimes

Alex Helfand, ENCE, Computer Forensic Specialist

The digital forensics field is evolving rapidly to keep pace with the technology used to commit fraud.  While eDiscovery often unmasks key evidence, criminals are still thwarting digital forensic specialists.  The following technological trends are shaping digital forensics and forcing specialists to create new investigative technologies in order to effectively investigate fraud.

Unmasking Anonymity
One of the biggest trends in digital forensics is developing technology to unmask anonymity.  In countless fraud, espionage, and civil cases there […]

Top Ten Fraud Prevention Tips for Small Businesses, Tip #7: Breaking the Fraud Triangle

Michael D. Rockefeller, CPA

As a small business owner or senior executive, it is your responsibility to promote integrity and ethical values to your employees and implement the proper controls and procedures to prevent fraud.  In this series, we are highlighting ten basic fraud prevention steps you can take to keep your organization safe.

Two weeks ago we profiled the typical fraudster – a middle-aged white male who has likely not been previously convicted of fraud.  What motivates these individuals to […]