Sort Alphabetically

Fraud Assessment represents three aspects of a constantly fluid and changing crime, that being Prevention, Identification and Mitigation WHEN the fraud takes place.

PEVENTION is a matter of establishing the methodologies and strategies that are required to use best efforts to protect an individual, company, service entity or government agency from fraudulent attacks which can be internally, externally or a combination of both.

From scams, to identity thefts – from schemes to company identity take-overs, fraud is faster, more efficient, learns better, and ultimately can stay one step ahead of those who attempt to stop it – Fraud is human.

With the best automated systems, they are guaranteed to be breached and in many cases utilized to the benefit of the fraud scheme or attack. Fraud cannot be stopped just by automated protection alone. It is a matter of a balance program of manual operations, protocols and methodologies complemented by automated programs and systems.

As you read the various articles and papers, remember that fraud is constantly evolving and adapting to every strategy we come up with to stop it. It cannot be stopped or eliminated; however it can be contained and WHEN the fraud takes place we can IDENTIFY it as efficiently as possible. Identification is critical when assessing the nature and the degree of the fraud breach, so as to MITIGATE the damage and fallout that it has cause. Finally to learn from the mistakes and weaknesses identified and correct those weaknesses along with updating the anti-fraud-post-fraud strategies and protocols. It is a full-time real-time responsibility.

The Business Card with a Name Including 19 Acronyms – A NEW RECORD!

The Business Card with a Name Including 19 Acronyms – A NEW RECORD! ©2014 Research Solutions, Inc. (all rights reserved) Well, it is nearing the end of the year and finally I received a piece of mail with a business card in it that contained, YES, 19 acronyms AFTER the More >

How to Keep a Fraudster Well-Fed…

How to Keep a Fraudster Well-Fed… © 2014 Research Solutions, Inc. (all rights reserved) It is a given that most everyone has some understanding of what a fraud is; has read about the super-frauds in the newspaper or magazines; or caught some discussion about a fraud on the television. For More >

The Phone Solicitation from Hell…

The Phone Solicitation from Hell… ©2014 Research Solutions, Inc. (all rights reserved) Have you had a rough day at the office, where it is about 3:30pm, and you just want to get your work done so you can go home? Between the meetings and deadlines, it has been a miserable More >

On-Line Dating Scams

On-Line Dating Scams On-Line Dating Scams © 2014 Research Solutions, Inc. (all rights reserved)   You most likely took notice to this article just because it is not your typical topic for scams and frauds. We are also “not” giving advice on dating… Over the past number of decades, on-line More >

“On-Line Computer Care Scams (OLCCS) – Part 1 on a Running Series”

“On-Line Computer Care Scams – Part 1 in a Running Series”   Published – ©2014 Research Solutions, Inc. / Dr. Mark D. Lurie (all rights reserved)   In the past three (3) years, there has been a “major” increase in On-Line Computer Care Scams (OLCCS); however in 2013/2014 it has More >