We're continuing with my thought process of looking behind curtains in fraud risk, but with a slight change. This time, we're looking behind a new curtain.
Fraud Auditing, Detection, and Prevention Blog
Leonard W. Vona
Recent Posts
Where are the Fraud Risk Professional Standards?
Nov 15, 2024 2:49:05 PM / by Leonard W. Vona posted in Fraud Risk Statements, Fraud Risk Identification, ...
Looking Behind a New Curtain to Improve Fraud Risk Assessment
Oct 18, 2024 8:15:00 AM / by Leonard W. Vona posted in Fraud Auditing, Fraud Detection, ...
This month I will present at a conference a new approach to fraud risk assessment. It is the cumulation of my 40 years of experience in building the fraud audit model.
A Peek Behind the Curtain to Look at Account Take Over Attacks
Sep 17, 2024 1:20:02 PM / by Leonard W. Vona posted in Fraud Auditing, Cyberattack, ...
Businesses face a growing threat of account take over attacks as fraudsters become more sophisticated and take advantage of advances in technology. This week, we're pulling back the curtain to take a closer look at them and how to add this to your fraud protection strategy.
Fraud Trivia: Phishing
Phishing is a prevalent type of social engineering that aims to steal data from the message receiver. Typically, this data includes personal information, usernames and passwords, and/or financial information. Phishing is consistently named as one of the top 5 types of cybersecurity attacks.
An Analysis of Modern Internal Control Structures and Their Efficacy
Aug 21, 2024 8:25:58 PM / by Leonard W. Vona posted in Fraud Auditing ...
The theme of the last three blogs was “look behind the curtain” in order to tell the fraud story. Upon reflection, maybe I did not tell the entire fraud story. Maybe, I did not look behind the right curtain. So, this month, we are going to look behind a different curtain.
What’s Behind the Internal Control Curtain? Is it a Fraud Story?
Jul 22, 2024 2:49:59 PM / by Leonard W. Vona posted in Fraud Schemes ...
This month, we're pulling back the curtain again to take a look at a look at what could be going on even when everything seems to be fine on the surface. We'll consider what can happen despite the appearance of effective internal controls and how to uncover it.
A Look Behind the Curtain: Sorting out Sole Source Vendor Fraud
Jun 19, 2024 2:31:30 PM / by Leonard W. Vona ...
This month, we're showing how to "look behind the curtain" to uncover fraud using a sole-source contract as an example. This is when a contract is intentionally written to go to a particular vendor with ill intent.
Fraud Audit Insights: Revealing The Fraud Story
May 20, 2024 2:05:54 PM / by Leonard W. Vona posted in Fraud Schemes, Fraud Auditing, ...
My last series of blogs discussed strategies for detecting shell companies. I know they work because I have refined the strategies throughout my career. Now we will discuss what causes those strategies to fail.
What are the inhibitors to the successful use of artificial intelligence in fraud detection? Humans.
Calling for a Fight Against Human Trafficking
Apr 23, 2024 1:44:48 PM / by Leonard W. Vona ...
This month's blog is dedicated to making you aware of the scourge on society. Slavery. We now call it human trafficking. The United Nations explains human trafficking as follows:
Anatomy of a Real-life Shell Company Pass-Through Scheme
Mar 20, 2024 11:39:15 AM / by Leonard W. Vona posted in Fraud Data Analytics, Fraud Risk Identification, ...
This story is about a passthrough scheme. It is my opinion that most large companies have one of more pass-through schemes occurring. What makes it difficult to detect or prevent these schemes is that the scheme will comply with all of your controls. Your company has received the goods or services. Therefore, your ability to detect these schemes is predicated on your understanding of how these schemes occur and what they look like.
Mastering Shell Company Detection: Steps for Fraud Auditors (Part 8)
Feb 13, 2024 4:37:48 PM / by Leonard W. Vona ...
In our next two blogs concerning shell companies, I will highlight real-life shell company schemes detected by our firm using the fraud audit methodology discussed in our blogs. Remember, all these schemes were found in large publicly traded companies using the fraud audit methodology discussed in the last seven blogs. I have changed the names of the companies to respect the confidentiality of our clients. It is important to note that there were no allegations, no whistleblowers, and no leads.