Sort Alphabetically

Fraud Assessment represents three aspects of a constantly fluid and changing crime, that being Prevention, Identification and Mitigation WHEN the fraud takes place.

PEVENTION is a matter of establishing the methodologies and strategies that are required to use best efforts to protect an individual, company, service entity or government agency from fraudulent attacks which can be internally, externally or a combination of both.

From scams, to identity thefts – from schemes to company identity take-overs, fraud is faster, more efficient, learns better, and ultimately can stay one step ahead of those who attempt to stop it – Fraud is human.

With the best automated systems, they are guaranteed to be breached and in many cases utilized to the benefit of the fraud scheme or attack. Fraud cannot be stopped just by automated protection alone. It is a matter of a balance program of manual operations, protocols and methodologies complemented by automated programs and systems.

As you read the various articles and papers, remember that fraud is constantly evolving and adapting to every strategy we come up with to stop it. It cannot be stopped or eliminated; however it can be contained and WHEN the fraud takes place we can IDENTIFY it as efficiently as possible. Identification is critical when assessing the nature and the degree of the fraud breach, so as to MITIGATE the damage and fallout that it has cause. Finally to learn from the mistakes and weaknesses identified and correct those weaknesses along with updating the anti-fraud-post-fraud strategies and protocols. It is a full-time real-time responsibility.

Fraud with Labor-Related Services (or “How to get Broad-Sided by a Surprise”)

Fraud with Labor-Related Services (or “How to get Broad-Sided by a Surprise”) ©2016 Research Solutions, Inc. (all rights reserved) Over the years, there is not a single home owner who has not had the need to have improvements done to their property. The same applies to owners of commercial buildings More >

Before You Accept That Networking Invitation…

Before You Accept That Networking Invitation… ©2016 Research Solutions, Inc. (all rights reserved) This year has been exceptionally hectic for all of us, especially with world events and one of the larger banking frauds rearing its ugly head effecting many throughout the United States. Unfortunately, Linkedin, along with many other More >

“Basel Accord(s) Failures – Why – The Start of a Change”

“Basel Accord(s) Failures – Why – The Start of a Change” © 2015 Research Solutions, Inc. (all rights reserved) We have been publishing quite a bit about the Basel Accord(s), as well as issues about Basel III and the disintegration of common-sense methodologies and protocols as a result of a More >

“The False Sense of Security – The Illusion of Automated Protection for Business Assets and Threat Environments”

“The False Sense of Security – The Illusion of Automated Protection for Business Assets and Threat Environments” How many more cases of “successful frauds” have to take place before the IT industry, especially those who produce anti-fraud, security systems and auditing controls are going to admit that their product(s) are More >

A Fraudsters’ Holiday Greeting to Suckers

A Fraudsters’ Holiday Greeting to Suckers © 2014 Research Solutions, Inc. (all rights reserved) Greetings, and a good day to you all. With the coming of Black Friday, this is also the “LAUNCH” of Fraudsters Fest”, which lasts well-through January of next year. People STILL ask us about offering they More >