BLOG

Home » Insights » Blog

Summation Shortcuts

Summation Shortcuts

Rooting through and indexing large amounts of documents can be a complex and time-consuming task, placing undue burdens on investigators and clogging a case’s workload. This sort of complication can have negative effects on the timeline and ...
Technology Talk: Excel Shortcuts

Technology Talk: Excel Shortcuts

I was recently surprised to learn at a team meeting that my peers were not as familiar with the many Excel shortcuts that I apparently take for granted. Urged by our team to share more, I decided I should share a few of the more frequently used Excel shortcuts with you:
Show Your Work

Show Your Work

With the increase in accounting malpractice claims being filed today, it is of utmost importance that attorneys advise their clients on how to act in anticipation of litigation rather than being forced to react. It is becoming more a question of when than if auditors will be sued by one or more of their clients at some point during their career, and they need to be prepared at all times.
Cyber-security: Minimizing Internal Threats

Cyber-security: Minimizing Internal Threats

Like a magician’s sleight of hand, the barrage of headline news related to hackers and cyber criminals may divert attention away from the equally dangerous, but perhaps less obvious, threat to your corporate assets: employees. While trusted employees are moving, sharing, and exposing corporate data just to do their jobs, the malicious employee may be deliberately taking confidential information for personal gain or other nefarious reasons.
Know Your ABCs – Serving on Nonprofit Boards

Know Your ABCs – Serving on Nonprofit Boards

As professionals, many of us have had or will have the opportunity to serve on the Board of Directors of a nonprofit organization. This can be a rewarding experience and a way to maintain civic involvement and a connection to the community. But what if the nonprofit organization is defrauded by an employee, or worse yet, by the CEO? This event can have serious ramifications, especially if the organization receives government grants, not to mention the effects on those whom the nonprofit benefits.
When Should You Start Looking for Fraud?

When Should You Start Looking for Fraud?

Larger organizations are more likely to experience fraud by an employee’s misuse of influence in a business transaction in order to gain a direct or indirect benefit. Small organizations, however, typically fall victim to the rogue employee who directly steals the organization’s assets or misuses its resources.
Let’s Get Digital: Putting Benford’s Law to Use in Fraud Examinations

Let’s Get Digital: Putting Benford’s Law to Use in Fraud Examinations

A man by the name of Frank Benford. In the 1930s, physicist Benford developed a theory of leading digits, now known as Benford’s Law. Benford’s Law tells us that in a variety of data sets, the probability of occurrence of each digit (0 through 9) as the first digit in a number follows a certain distribution. That is, the digit 1 will occur with about a 30% frequency, followed by the digit 2 at 17.6%, through the digit 9 at 4.6%. See Figure 1.
B.Y.O.D.

B.Y.O.D.

“Bring your own device,” or “B.Y.O.D,” is a concept that an increasing number of companies are implementing. B.Y.O.D allows employees to use their personally-owned devices in the work place. These devices can range from laptops and tablets to cell phones and flash drives. While B.Y.O.D may be a good plan in theory – employees can work with devices they are comfortable using - It is important for employers to thoroughly consider the implications and potential pitfalls before implementing a B.Y.O.D policy. Consider, for example, the following key areas regarding the security of corporate information and infrastructure:
Debits, Credits, and…Edits?

Debits, Credits, and…Edits?

As accountants, we know the significance of numbers.  But in the process of balancing our debits and credits, it is easy to forget the significance of words.  Although it’s important to develop and maintain our skills in spreadsheets, calculations, and analysis, our writing skills are just as important.
Social Media in Fraud Investigations

Social Media in Fraud Investigations

There’s no denying it: social media has changed the way we interact with each other. People are tweeting live from events, “checking in” on Facebook, posting pictures to Instagram and commenting on, liking or sharing just about everything. The amount of personal information that social media users willingly put “out there” is staggering.
Summation Shortcuts

Summation Shortcuts

Rooting through and indexing large amounts of documents can be a complex and time-consuming task, placing undue burdens on investigators and clogging a case’s workload. This sort of complication can have negative effects on the timeline and ...
Technology Talk: Excel Shortcuts

Technology Talk: Excel Shortcuts

I was recently surprised to learn at a team meeting that my peers were not as familiar with the many Excel shortcuts that I apparently take for granted. Urged by our team to share more, I decided I should share a few of the more frequently used Excel shortcuts with you:
Show Your Work

Show Your Work

With the increase in accounting malpractice claims being filed today, it is of utmost importance that attorneys advise their clients on how to act in anticipation of litigation rather than being forced to react. It is becoming more a question of when than if auditors will be sued by one or more of their clients at some point during their career, and they need to be prepared at all times.
Cyber-security: Minimizing Internal Threats

Cyber-security: Minimizing Internal Threats

Like a magician’s sleight of hand, the barrage of headline news related to hackers and cyber criminals may divert attention away from the equally dangerous, but perhaps less obvious, threat to your corporate assets: employees. While trusted employees are moving, sharing, and exposing corporate data just to do their jobs, the malicious employee may be deliberately taking confidential information for personal gain or other nefarious reasons.
Know Your ABCs – Serving on Nonprofit Boards

Know Your ABCs – Serving on Nonprofit Boards

As professionals, many of us have had or will have the opportunity to serve on the Board of Directors of a nonprofit organization. This can be a rewarding experience and a way to maintain civic involvement and a connection to the community. But what if the nonprofit organization is defrauded by an employee, or worse yet, by the CEO? This event can have serious ramifications, especially if the organization receives government grants, not to mention the effects on those whom the nonprofit benefits.
When Should You Start Looking for Fraud?

When Should You Start Looking for Fraud?

Larger organizations are more likely to experience fraud by an employee’s misuse of influence in a business transaction in order to gain a direct or indirect benefit. Small organizations, however, typically fall victim to the rogue employee who directly steals the organization’s assets or misuses its resources.
Let’s Get Digital: Putting Benford’s Law to Use in Fraud Examinations

Let’s Get Digital: Putting Benford’s Law to Use in Fraud Examinations

A man by the name of Frank Benford. In the 1930s, physicist Benford developed a theory of leading digits, now known as Benford’s Law. Benford’s Law tells us that in a variety of data sets, the probability of occurrence of each digit (0 through 9) as the first digit in a number follows a certain distribution. That is, the digit 1 will occur with about a 30% frequency, followed by the digit 2 at 17.6%, through the digit 9 at 4.6%. See Figure 1.
B.Y.O.D.

B.Y.O.D.

“Bring your own device,” or “B.Y.O.D,” is a concept that an increasing number of companies are implementing. B.Y.O.D allows employees to use their personally-owned devices in the work place. These devices can range from laptops and tablets to cell phones and flash drives. While B.Y.O.D may be a good plan in theory – employees can work with devices they are comfortable using - It is important for employers to thoroughly consider the implications and potential pitfalls before implementing a B.Y.O.D policy. Consider, for example, the following key areas regarding the security of corporate information and infrastructure:
Debits, Credits, and…Edits?

Debits, Credits, and…Edits?

As accountants, we know the significance of numbers.  But in the process of balancing our debits and credits, it is easy to forget the significance of words.  Although it’s important to develop and maintain our skills in spreadsheets, calculations, and analysis, our writing skills are just as important.
Social Media in Fraud Investigations

Social Media in Fraud Investigations

There’s no denying it: social media has changed the way we interact with each other. People are tweeting live from events, “checking in” on Facebook, posting pictures to Instagram and commenting on, liking or sharing just about everything. The amount of personal information that social media users willingly put “out there” is staggering.
Accounting Malpractice Is a Growth Industry

Accounting Malpractice Is a Growth Industry

CPA’s have close relationships with their clients (especially in smaller accounting practices) and rightfully so. Who else is better to understand their client’s financial and business affairs than their trusted CPA? And the relationship generally remains close…