Contact Us

Blogs: Forensic Technology

Featured Blog

Time off isn’t just a necessity to help employees recover and regroup, it’s also an opportunity for an organization to measure its efficiency and to uncover vulnerabilities it may face from fraud, waste, and abuse. Here are just a few of the ways an organization can leverage its vacation and time-off policies to help detect […]

Time off isn’t just a necessity to help employees recover and regroup, it’s also an opportunity for an organization to measure its efficiency and to uncover vulnerabilities it may face from fraud, waste, and abuse. Here are just a few of the ways an organization can leverage its vacation and time-off policies to help detect […]

READ FULL BLOG

Fraudsters often believe they have covered their tracks so well that their activity is untraceable, but they are increasingly running into a significant obstacle when attempting to hide their crimes: Their digital footprint. During the last decade, people have integrated digital tools into their personal and business lives at an astonishing rate. Since 2010, for […]

READ FULL BLOG

It’s an all-too frequent concern for people who are no longer managing their own finances: Are they being taken advantage of by a trustee, executor, or attorney-in-fact—and what can they do to spot and prevent such activity? At Forensic Strategic Solutions, we are often approached by beneficiaries or their loved ones to investigate possible trust […]

READ FULL BLOG

According to the Association of Certified Fraud Examiners 2018 Report to the Nations, fraudulent disbursement schemes remain the costliest form of asset misappropriation fraud to threaten small businesses. Although this risk can seem overwhelming, it may be avoidable through taking proactive steps against fraud within your company. Here are eight tips to help you expose […]

READ FULL BLOG

Time and time again, we trumpet the incredible value of advanced data analytics in forensic investigations – often, it is the key to finding the needle in the haystack. Fortunately, our firm remains at the forefront of utilizing data to identify unexpected patterns when investigating financial fraud – that red flag that tells us something isn’t as it should be – whether for a qui tam case involving kickback schemes or a case of underreported revenue.

READ FULL BLOG

The QuickBooks Audit Trail (or Audit Log, depending on the version) provides a log of each accounting transaction and denotes any additions, deletions or modifications affecting the integrity of the transaction. The tool captures every transaction from the time it is initially entered into QuickBooks, and tracks changes to the original entry, including transaction type, date, account, vendor/customer name, transaction amount, quantity, and price. The Audit Trail also reveals the User ID under which the entry, deletion or modification was made. The Audit Trail is a report built in the QuickBooks ReportCenter– all you have to do is click a button to generate the report.

READ FULL BLOG

As a digital technology expert, it is fascinating to observe how today’s technology-centric world obsesses over anything and everything digital – especially social media. From sharing locations on Instagram and Facebook to live tweeting events, people constantly update their friends – and strangers, if their account is public – on their every movement. Social media […]

READ FULL BLOG

The world of technology offers the opportunity for fraud experts to trace the “untraceable.” With technology becoming more popular and present in our lives by the day, people are conducting their lives more digitally, whether through email, texting, social media or Internet browsing. Collecting, analyzing and interpreting the electronic evidence of fraudulent activity is becoming more widespread in the fraud examination world, and will most likely soon become the standard.

READ FULL BLOG

We all recognize budget is a constant concern for auditors and investigators. Oftentimes our technology budgets are just too tight. We find ourselves looking for powerful tools to add to our toolbox that do not break the bank. One of these tools is Active Data for Excel.

READ FULL BLOG

I was recently surprised to learn at a team meeting that my peers were not as familiar with the many Excel shortcuts that I apparently take for granted. Urged by our team to share more, I decided I should share a few of the more frequently used Excel shortcuts with you:

READ FULL BLOG

“Bring your own device,” or “B.Y.O.D,” is a concept that an increasing number of companies are implementing. B.Y.O.D allows employees to use their personally-owned devices in the work place. These devices can range from laptops and tablets to cell phones and flash drives. While B.Y.O.D may be a good plan in theory – employees can work with devices they are comfortable using – It is important for employers to thoroughly consider the implications and potential pitfalls before implementing a B.Y.O.D policy. Consider, for example, the following key areas regarding the security of corporate information and infrastructure:

READ FULL BLOG

There’s no denying it: social media has changed the way we interact with each other. People are tweeting live from events, “checking in” on Facebook, posting pictures to Instagram and commenting on, liking or sharing just about everything. The amount of personal information that social media users willingly put “out there” is staggering.

READ FULL BLOG