Are you a victim of asset misappropriation fraud?

Asset misappropriation fraud occurs when people who are entrusted to manage the assets of an organization steal from it. Employees in an organization may choose to use their position to steal from it through fraudulent activity. This is also known as insider fraud. This type of fraud can be committed by company directors, employees, or …

Are you a victim of asset misappropriation fraud? Read More »

Tasks and Responsibilities of a Fraud Investigator

Document all investigations Prepare written reports of investigation results Prepare evidence for presentation in court Testify in court about investigation findings Interview suspects and witnesses and record their statements Coordinate investigative efforts with attorneys and law enforcement officers Provide suggestions to agencies and businesses about ways to improve fraud detection Collect financial documents related to …

Tasks and Responsibilities of a Fraud Investigator Read More »

How to combat procurement fraud

Procurement fraud can wipe out much of a company’s profits and damage a nation’s ability to invest. The quality of procurement can make the difference between success and failure whether of private sector companies or of national economies. There is insufficient understanding of the benefits that a high performance procurement organization can bring, a lack …

How to combat procurement fraud Read More »

How to use background checks to protect company assets

Your corporate success relies on the people you bring on board.  It is important to take steps to hire the best employees. Contacting former supervisors is a common way of learning about an applicant’s skills and demeanor. But sometimes you need to be extra careful about whom you trust, and you should go beyond a …

How to use background checks to protect company assets Read More »

Confidentiality at workplace

With today’s increasingly litigious and highly competitive workplace, confidentiality is important for a host of reasons. Failure to properly secure and protect confidential business information can lead to the loss of business or clients. In the wrong hands, confidential information can be misused to commit illegal activity e.g fraud or discrimination, which can in turn …

Confidentiality at workplace Read More »

Guarding against Phishing

The practice of sending out mass emails that are fraudulent in nature is referred to as Phishing.  These emails masquerade as legitimate emails from credible institutions stating they are having some type of issue, and request that you reply with your confidential information to comply.  It is called phishing because they are “fishing” for information …

Guarding against Phishing Read More »

Common types of financial fraud

Financial fraud is known as a deceptive white collar crime that can be devastating yet manageable for individuals with the correct knowledge and accurate preventative methods. Many people are not fully educated on the topic, which leaves them feeling vulnerable and helpless. Recent studies show that 15 percent of the population are victims of financial …

Common types of financial fraud Read More »


Why Simbox Fraud is difficult to deal with.

One of the most predominant frauds today is Interconnect Bypass Fraud or Simbox fraud as it costs the industry billions and billions of money. Calls made via the internet are sent to Simboxes (machines that house SIM cards) which redirect this illegal VoIP traffic onto mobile networks. Fraudsters effectively bypass the interconnect toll charging points …

Why Simbox Fraud is difficult to deal with. Read More »

Scroll to Top
You will be able to get all our weekly updates through the email you submit.