Resources

Using Adverse Media to Head Off Fraud

Many financial companies search for negative news, also known as “adverse media,” as part of their due diligence process for potential customers. But this type of screening isn’t only effective for banks. Any company can use adverse media to scrutinize customers, vendors, and business partners. Screening these subjects can help uncover issues — such as […]

Read the full article

Do Your ESG Initiatives Open the Door to Fraud?

Corporate environmental, social and governance (ESG) initiatives have evolved from a disjointed and confusing set of goals to a more unified business necessity. This is largely because investors, employees, customers and other stakeholders have demanded it. But as companies ramp up ESG spending and require executives to meet ESG objectives, the likelihood of fraud also […]

Read the full article

5 Ways to Stop Employees From Colluding in Fraud

What happens if two or more individuals in your organization collude to commit fraud? According to the Association of Certified Fraud Examiners’ (ACFE’s) 2022 Report to the Nations, fraud losses rise precipitously. The median loss for a scheme involving just one perpetrator is $57,000, but when two or more perpetrators are involved, the median loss […]

Read the full article

IRS Dirty Dozen Part 6 – Abusive Easements & Insurance Arrangements

These last two schemes wrap up the IRS’ Dirty Dozen – its annual list of top tax scams. Don’t be fooled by abusive easements and insurance arrangements. 11: Abusive Syndicated Conservation Easements In syndicated conservation easements, promoters take a provision of the tax law allowing for conservation easements and twist it by using inflated appraisals […]

Read the full article

Partially Empty Offices Can Be Fertile Ground for Theft

If most of your employees have worked from home since the start of the pandemic or are only gradually transitioning back to onsite work, your office may be emptier than in pre-COVID days. This can make theft easier. “Creepers” can gain access to offices or other physical facilities via unlocked doors and social engineering techniques […]

Read the full article