HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha D. Dyson Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that will …

Security Magazine article

Why Employees are Your Greatest Cyber Risk

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Fraud, Mobile Forensics, News, Theft, Training

A company will do everything it can to protect its network and data. They hire information security experts and purchase security software and hardware to protect from outside intrusions. Most are missing the largest risk to their data, the employee. A recent study finds that nearly two in five workers admitted to clicking on a link or opening an attachment …

TBJ article

Millions evaporate as trade secrets lawsuits fly across NC, US

Russell W. Gilmore, CISSP, CISM, EnCE Diversion, Fraud, Mobile Forensics, News, Theft

The July 6, 2018, issue of the Triangle Business Journal included an article entitled “Millions evaporate as trade secrets lawsuits fly across NC, US”. This article provided good information about the increase in the theft of company-owned data. You can access the full article here. We have also seen an increase of data theft investigations at Protus3 and work side-by-side …

officer

When Not to Call the Police

Chuck Hurst Background Investigation, Civil Rights, Embezzlement, Ethics, Fraud, Theft, Theft, Embezzlement, and Fraud

I used to be a cop. Served proudly, retired and kicked back, all set to enjoy my pension. Any cop who tells you they have seen it all and done it all would be prone to exaggeration, to put it politely. During my career, I shared a multitude of experiences —- from outright hilarious to downright heartbreaking. While I was …

ASIS International

Protus3 Hosts ASIS Chapter 119 Women in Security

Protus3 Fraud, News, Theft, Embezzlement, and Fraud, Training

The ASIS Chapter 119 Women in Security group held its third quarter meeting on August 8, 2017, at Protus3. Guest speaker for the meeting was Supervisory Special Agent Jessica Nye, the current Supervisor of the FBI Cyber Squad in Raleigh, NC. As the audience consisted of industrial security professionals, Ms. Nye’s presentation of Current Cyber Threats and Trends was both …

Christine Peterson

Chris Peterson Guest Speaker on WCOM 103.5

Protus3 Compliance, Corporate Compliance, Embezzlement, Fraud, News, Security Planning, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud

On Tuesday, April 1, 2014, Chris Peterson was the guest speaker on the program “Focus on Business” hosted by Lea Strickland which aired on radio station WCOM 103.5. “Focus on Business” provides insights, information and perspective on building strong businesses, sustainable businesses that build sustainable communities. Guests include area business leaders, experts and professionals who share their experience. If you …

Christine Peterson

Christine Peterson and Marty Coolidge Present at IMA NC

Protus3 Fraud, News, Training

Christine Peterson and Marty Coolidge presented at the IMA NC Triangle Chapter and the Carolinas Council Annual Winter Conference on February, 28, 2014, at the Prestonwood Country Club in Cary, NC. The presentation titled Enemies at the Gate or Are They Already Inside? focused on fraud and abuse in the workplace which costs businesses on average 5% of revenue per …

Christine Peterson

RMA Presents at CSI Week at Meredith College

Protus3 Embezzlement, Fraud, News, Theft, Embezzlement, and Fraud, Training

Chris Peterson presented Enemies at the Gate – or Are They Already Inside? as part of CSI Week at Meredith College. CSI Week allows students at Meredith to explore career opportunities in law enforcement and related fields. The event is sponsored by the Sociology and Criminology Programs, and the Sociology & Criminology Club (and with the support of Political Science, …

power shift button

Held Hostage by a Dishonest Employee

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Corporate Compliance, Security Policy and Procedure Development, Security Program Development, Theft, Theft, Embezzlement, and Fraud

I recently was involved in a case in which a company employee was discovered using a company credit card for personal reasons. This happens occasionally, and one would think that immediately terminating the dishonest employee would resolve the issue. But what happens when the employee is the one and only IT person for the company? Many companies have only one person …

pink slip

Terminating an Employee and Company Data

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Corporate Compliance, Theft, Theft, Embezzlement, and Fraud

Having to terminate an employee is never easy. To make the process even more difficult, consider the recent survey conducted by Harris Interactive on behalf of Courion which stated that 19% of employees age 18 to 34 would take company data with them if they knew they were about to be fired. Read the full story here. Depending on the …