Blogs: Forensic Technology

Featured Blog

Time and time again, we trumpet the incredible value of advanced data analytics in forensic investigations – often, it is the key to finding the needle in the haystack. Fortunately, our firm remains at the forefront of utilizing data to identify unexpected patterns when investigating financial fraud – that red flag that tells us something isn’t as it should be – whether for a qui tam case involving kickback schemes or a case of underreported revenue.

Time and time again, we trumpet the incredible value of advanced data analytics in forensic investigations – often, it is the key to finding the needle in the haystack. Fortunately, our firm remains at the forefront of utilizing data to identify unexpected patterns when investigating financial fraud – that red flag that tells us something isn’t as it should be – whether for a qui tam case involving kickback schemes or a case of underreported revenue.

READ FULL BLOG

The QuickBooks Audit Trail (or Audit Log, depending on the version) provides a log of each accounting transaction and denotes any additions, deletions or modifications affecting the integrity of the transaction. The tool captures every transaction from the time it is initially entered into QuickBooks, and tracks changes to the original entry, including transaction type, date, account, vendor/customer name, transaction amount, quantity, and price. The Audit Trail also reveals the User ID under which the entry, deletion or modification was made. The Audit Trail is a report built in the QuickBooks ReportCenter– all you have to do is click a button to generate the report.

READ FULL BLOG

As a digital technology expert, it is fascinating to observe how today’s technology-centric world obsesses over anything and everything digital – especially social media. From sharing locations on Instagram and Facebook to live tweeting events, people constantly update their friends – and strangers, if their account is public – on their every movement. Social media […]

READ FULL BLOG

The world of technology offers the opportunity for fraud experts to trace the “untraceable.” With technology becoming more popular and present in our lives by the day, people are conducting their lives more digitally, whether through email, texting, social media or Internet browsing. Collecting, analyzing and interpreting the electronic evidence of fraudulent activity is becoming more widespread in the fraud examination world, and will most likely soon become the standard.

READ FULL BLOG

We all recognize budget is a constant concern for auditors and investigators. Oftentimes our technology budgets are just too tight. We find ourselves looking for powerful tools to add to our toolbox that do not break the bank. One of these tools is Active Data for Excel.

READ FULL BLOG

Rooting through and indexing large amounts of documents can be a complex and time-consuming task, placing undue burdens on investigators and clogging a case’s workload. This sort of complication can have negative effects on the timeline and outcome of a case. Enter Summation, an excellent multi-faceted software program used to keep documents organized so that […]

READ FULL BLOG

I was recently surprised to learn at a team meeting that my peers were not as familiar with the many Excel shortcuts that I apparently take for granted. Urged by our team to share more, I decided I should share a few of the more frequently used Excel shortcuts with you:

READ FULL BLOG

Like a magician’s sleight of hand, the barrage of headline news related to hackers and cyber criminals may divert attention away from the equally dangerous, but perhaps less obvious, threat to your corporate assets: employees. While trusted employees are moving, sharing, and exposing corporate data just to do their jobs, the malicious employee may be deliberately taking confidential information for personal gain or other nefarious reasons.

READ FULL BLOG

A man by the name of Frank Benford. In the 1930s, physicist Benford developed a theory of leading digits, now known as Benford’s Law. Benford’s Law tells us that in a variety of data sets, the probability of occurrence of each digit (0 through 9) as the first digit in a number follows a certain distribution. That is, the digit 1 will occur with about a 30% frequency, followed by the digit 2 at 17.6%, through the digit 9 at 4.6%. See Figure 1.

READ FULL BLOG

“Bring your own device,” or “B.Y.O.D,” is a concept that an increasing number of companies are implementing. B.Y.O.D allows employees to use their personally-owned devices in the work place. These devices can range from laptops and tablets to cell phones and flash drives. While B.Y.O.D may be a good plan in theory – employees can work with devices they are comfortable using – It is important for employers to thoroughly consider the implications and potential pitfalls before implementing a B.Y.O.D policy. Consider, for example, the following key areas regarding the security of corporate information and infrastructure:

READ FULL BLOG

There’s no denying it: social media has changed the way we interact with each other. People are tweeting live from events, “checking in” on Facebook, posting pictures to Instagram and commenting on, liking or sharing just about everything. The amount of personal information that social media users willingly put “out there” is staggering.

READ FULL BLOG

Employers, if you use QuickBooks for your company’s accounting needs, you have a built-in tool for fraud prevention and detection at no additional cost to you: the QuickBooks Audit Trail.

READ FULL BLOG

Increasingly, the answers to the most fundamental litigation questions – the “who, what, where, when, and why” – are contained in electronically stored information (ESI), which can be retrieved through electronic discovery (e-discovery) and/or computer forensics.

READ FULL BLOG

In our case study, gas station owner, Morris, has alleged that Green Fuel, a small gasoline distributor, overcharged him. Both parties had inadequate and unsophisticated documentation, making determining losses very difficult.

READ FULL BLOG

You might not think that a small business would have useful or accessible electronically stored information (ESI). Consider this example of identifying and obtaining relevant forensic evidence to determine lost profit damages with this particular small business.

READ FULL BLOG

Think twice before you assume that an unsophisticated small business cannot possibly have any useful or accessible electronically stored information (ESI).

READ FULL BLOG