April 2015 


In This Issue

Every time we work a case for you, we donate a portion of the profits from that case to the charity of your choice...  

 

Learn More

 





"It is always right to detect a fraud, and to perceive a folly; but it is very often wrong to expose either. A man of business should always have his eyes open, but must often seem to have them shut."

 

~ Philip Dormer Stanhope Chesterfield, 4th Earl

 


join


When you have unanswered questions, We Find Answers®.

 

We are grateful to have the opportunity to provide you valuable information via our free bimonthly e-newsletter and our unparalleled investigative services.

 

We take special care to ensure the information we provide you in "The Leeeyzawn" is the latest and most current information available. In this edition, we have addressed computers users compromising your business and finding those compromises within your business.

We want to write about topics that you can use in your business and are interested in. Please e-mail us your topics of interest to leeeyzawn@arkansas-investigations.com.

We encourage you to share our e-newsletter with others in your sphere of influence.

Sincerely,
Your Team at Arkansas Investigations

Computers and Cell Phones: Can They Compromise Your Business?

Use of personal cell phones and other mobile devices at work has become so common that many businesses have developed policies and procedures around the use of them during business hours. If you don't already have such policies in place, this article may motivate you to make it a priority.

 

As of October 2014, 90% of American adults had a cell phone. 64% of American adults had a smartphone, and 42% of American adults owned a tablet computer. Why should you care? Because all of these devices can be used by your own employees to ruin your business and your reputation.

 

Case Study

 

When two employees failed to show for work, business owners became concerned. They checked the offices and found that the desks had obviously been cleaned out and personal effects removed. Suspicious, they checked the office computers and found that the accounting and invoicing system had been altered and many documents were missing. When they contacted us to help, we examined the computer systems and established the dates the files were accessed and deleted, which coincided with the last night the employees 'worked late.' Armed with our findings, the business owners confronted the then-employees. When threatened with a civil suit, the now-former employees admitted to stealing invoices, client lists, order history and other proprietary data with the intent of opening their own business and approaching the existing clients. Result: disaster avoided and reputation saved.

 

In this case study computers were the tools of intended destruction, but... Read More 

 

Finding Compromises in Your Business Computers


Most business owners house an incredible amount of vital information on their computers, including sales data, customer information, inventory management, passwords, proprietary data, research projects, business expansion plans, competitor's information, and financial records. Much of it is password-protected to maintain the integrity of the information and to limit who has access to different pieces of your business. You probably can't imagine running your business without computers anymore. If you can't afford to be without the information in your computer system, then you certainly can't afford for someone else to get their hands on it. Not intruders, not competitors, and not your employees.

 

Maybe you think you have sufficient security for your sensitive data. Maybe you think none of your employees would ever do anything to hurt you or your business, and maybe you think you would know if any of them tried. Maybe you're right. Maybe.

 

Case Study

 

Unable to determine why business was declining lately, a business owner in the upper regions of the state uncovered information that led him to believe that one of his senior employees was approaching long-term clients with lower pricing and expanded services. The client had already talked to the local police and surrendered a computer that contained all his client information. Local police were not able to examine the computer sufficiently to determine if data had been accessed or removed, so the police forwarded the computer to us. We conducted a thorough analysis and reported back to the client that one of his managers had accessed the customer database recently and had deleted information about the customers. By tracking...Read more

 

About Us
Arkansas Investigations is a premier investigative agency that provides a wide range of investigative services to legal professionals, businesses and individuals anywhere in the state of Arkansas (plus Oklahoma and Louisiana). We are strong advocates for our clients. We conduct quality investigations and provide clear and concise reports of our findings. Our 35-plus years of hands-on experience and training provide our clients with a reliable work product in which they can have confidence. We go above and beyond the call of duty. Our staff includes a Certified Fraud Examiner (CFE), an experienced legal investigator, a Certified Law Enforcement Instructor (CLEI), a paralegal and a Certified Forensic Computer Examiner as well as a Certified Hacking Forensic Examiner. Our motto is "We Find Answers®" - and that's exactly what we do! Learn more...
Contact Us

reverse logoArkansas Investigations
400 West Capitol Ave, Suite 1700
Little Rock, AR 72201
Office: 501-372-2202
1-501-605-0360 (24 hours)
info@arkansas-investigations.com
www.arkansas-investigations.com
© 2015 Arkansas Investigations, an Over-Flow Productions, Inc. company. All rights reserved.