Fraud Investigation And The Computer
Computers – A Gateway For The Fraudster? As soon as the word “computer” is added, a fraud seems to take on an even more sinister and secretive veneer. It is… Read More »Fraud Investigation And The Computer
IF YOU SUSPECT COMPUTER FRAUD – STOP AND THINK!
By questioning a suspect or turning on a computer to have a look you may be compromising the evidence needed to recover your losses – call us for advice.
Computers and other intelligent devices are now completely ingrained into business and general life such that any fraud or financial crime that does not involve the use of computer fraud would be a noticeable exception. Emails, Internet banking and computer generated documents are an integral part of every case that Mark Jenner & Co Limited faces and some will require dedicated information technology input such as expertise with data mining techniques, forensic IT examinations and evidence preservation.
Fraud involves the manipulation of data, and the move by businesses away from paper recording to electronic means is simply a shift in media being used. Failing to adjust financial controls during this process can leave businesses vulnerable to the fraudster, and at Mark Jenner & Co Limited we recognise the need for continually monitoring and countering these weak areas as they emerge.
Computers – A Gateway For The Fraudster? As soon as the word “computer” is added, a fraud seems to take on an even more sinister and secretive veneer. It is… Read More »Fraud Investigation And The Computer
Phishing is a form of identity theft. It involves the fraudsters sending large numbers of spam emails out to unsuspecting Internet surfers. The email appears to be from a reputable… Read More »Is The Phishing Threat Getting Worse?
When investigating fraud, remember where there is a paper document, there is probably an electronic version of it. There may be more than one copy, often held by third parties. … Read More »Investigating Computer Evidence