Here is why you must identify and close revenue leakages

A leaking container cannot hold water for long. In 1992, my grandfather taught me a leadership lesson, that I never grasped well at the time, until I was of age to relate it to life events that I got to understand. I am sure you too have lessons you grasp, as you grow older. It

Read More »

Transform your career with great investigation tools

Are you a victim of fraud? Are you working too hard and cannot see where the money goes? Are you an auditor or fraud investigator who would like to know how to collect water-tight evidence so that you become a darling of the prosecution and or your company team? Find the summit investigation Tool 1.11:

Read More »

“Fraud can’t happen here…!”

If your organization is like many others we encounter, the belief that “Fraud can’t happen here” is commonplace. Despite this belief, the media is awash with notices and pictures of former employees who are wanted by Police for theft of this, that, and the other. Other times, the notices and pictures are about individuals who

Read More »

Monthly fraud risk & integrity assurance as a service

As the reality of the economic impact of coronavirus sinks in, you need to explore cost-cutting alternatives. As part of the #coronavirus recovery strategy, leaders of businesses have been conducting a business assessment to identify possible revenue leakages in terms of process redundancy and inefficiency, time, and resource wastages in unnecessary procedures and control weaknesses

Read More »

How easily can hackers intercept your connection?

A lay person may not have really acknowledged the risk incurred when communicating over insecure channels but hackers particularly have a way of intercepting and modifying traffic through a Man-In-The-Middle (MITM) attack that is achieved when an attacker poisons the Address Resolution Protocol (ARP) cache of two devices with their respective MAC addresses. Provided the

Read More »
Scroll to Top