International Consultants and Investigations Inc – Corporate Due Diligence

New York, NY, April 6, 2025: Earl R. Johnson, PhD, CII and President/CEO of International Consultants and Investigations, Inc. (ICI) has announced that ICI has been chosen by a Canadian based law firm to provide corporate due diligence on a company based in Saudi Arabia.

International Consultants and Investigations, Inc. (ICI) has been providing consulting and investigative services worldwide for over 30 years. A certified member of the Council of International Investigators and the World Association of Professional Investigators, ICI is licensed in New York, Florida and Nevada with offices world wide. For further information or inquiries email Earl R. Johnson  [email protected] or phone (212) 582-3115.

ICI To Take Counterfeiting Investigation to Next Stage

New York, NY, April 6, 2025: Earl R. Johnson, PhD, CII and President/CEO of International Consultants and Investigations, Inc. (ICI) has announced that a Middle Eastern based corporation has requested that ICI continue to assist in an ongoing investigation into a counterfeiting operation. During the initial stages of this investigation ICI was able to develop information of relevance allowing the investigation to proceed to its next stage.

International Consultants and Investigations, Inc. (ICI) has been providing consulting and investigative services worldwide for over 30 years. A certified member of the Council of International Investigators and the World Association of Professional Investigators, ICI is licensed in New York, Florida and Nevada with offices world wide. For further information or inquiries email Earl R. Johnson  [email protected] or phone (212) 582-3115.

ICI Announces It Is Now An Approved Vendor for Greenberg Traurig, LLP

ICI Announces It Is Now An Approved Vendor for Greenberg Traurig, LLP

New York, New York, May 27, 2024:

International Consultants and Investigations, Inc. (ICI) announced it has been selected as an approved vendor by the law Firm of Greenberg Traurig LLP.

Earl R. Johnson, PhD, CII, and President/CEO of International Consultants and Investigations, Inc. (ICI) has announced that ICI has been approved as a vendor and service provider by the law firm of Greenberg Traurig LLP (GT). Greenberg Traurig is located in 47 locations and 14 countries employing over 2,700 attorneys. ICI is proud to become a trusted vendor of this prestigious Firm.

International Consultants and Investigations, Inc. has been providing consulting and investigative services worldwide for over thirty years. A certified member of the Council of International Investigators and the World Association of Professional Investigators, ICI is licensed in New York, Florida and Nevada with offices worldwide. For further information or inquiries email Earl R. Johnson, [email protected], or by phone: (212) 582-3115.

Common Types of Financial Fraud Business Owners Need to Be Concerned About

Common Types of Financial Fraud Business Owners Need to Be Concerned About

In today’s fast-paced business environment, financial fraud poses a significant risk to companies of all sizes. Business owners must be vigilant and aware of the various forms of fraud that can undermine their operations. Understanding these threats is the first step in developing robust preventive measures. Here are some of the most common types of financial fraud that business owners should be concerned about:

1. Embezzlement

Embezzlement occurs when employees steal money or other assets entrusted to them. This can happen in various ways, such as skimming off the top, creating fake vendor accounts, or manipulating financial records. Embezzlement often goes unnoticed for extended periods, especially if the perpetrator is in a position of trust.

Preventive Measures:

  • Implementing strict internal controls.
  • Conducting regular audits.
  • Segregating duties among employees to prevent a single individual from controlling multiple financial processes.

2. Payroll Fraud

Payroll fraud is one of the most common forms of employee theft, involving actions such as falsifying time sheets, adding ghost employees to the payroll, or claiming unearned overtime. This type of fraud can significantly inflate a company’s payroll expenses.

Preventive Measures:

  • Utilizing automated time-tracking systems.
  • Regularly reconciling payroll records.
  • Conducting surprise payroll audits.

3. Invoice Fraud

Invoice fraud happens when fraudulent invoices are submitted for payment. This can involve fictitious vendors, inflated invoices from real vendors, or duplicate invoices. This type of fraud can drain company resources and often involves collusion between internal and external parties.

Preventive Measures:

  • Verifying all invoices with purchase orders and delivery receipts.
  • Establish a process for verbally verifying requests to change vendor bank account information.
  • Implementing a multi-step approval process for large payments.
  • Conducting vendor audits.

4. Expense Reimbursement Fraud

Employees may submit false or inflated expense reports, claiming personal expenses as business-related or exaggerating the cost of legitimate expenses. This type of fraud is particularly common in companies with lenient expense reporting policies.

Preventive Measures:

  • Requiring detailed receipts for all expense claims.
  • Setting clear policies for what constitutes a reimbursable expense.
  • Review and verify expense reports thoroughly.

5. Check Fraud

Check fraud includes activities such as forging signatures, altering checks, or using stolen checks to make unauthorized payments. This can result in substantial financial losses and damage to a company’s reputation.

Preventive Measures:

  • Using secure, tamper-evident checks.
  • Reconciling bank statements promptly.
  • Implementing positive pay systems that match issued checks against those presented for payment.

6. Procurement Fraud

Procurement fraud involves manipulation in the purchasing process, such as kickbacks, bid rigging, or overbilling by suppliers. This can lead to higher costs and lower-quality goods or services.

Preventive Measures:

  • Enforcing a competitive bidding process.
  • Segregating procurement responsibilities.
  • Conducting regular supplier audits and reviews.

7. Financial Statement Fraud

This type of fraud involves the deliberate misrepresentation of financial information to deceive stakeholders about the company’s financial health. It can include actions like overstating revenues, understating liabilities, or inflating asset values.

Preventive Measures:

  • Ensuring rigorous internal and external audits.
  • Maintaining transparency in financial reporting.
  • Implementing strong corporate governance practices.

8. Cyber Fraud

With increasing reliance on digital platforms, cyber fraud has become a significant concern. It includes phishing, hacking, ransomware attacks, and fraudulent electronic transactions. Cybercriminals target company funds and sensitive information, posing a severe threat to business continuity.

Preventive Measures:

  • Employing robust cybersecurity measures.
  • Training employees on cybersecurity best practices.
  • Establishing multi-factor authentication (MFA) on all highly sensitive accounts (banking, email, etc)
  • Regularly updating software and systems to protect against vulnerabilities.

Summary

Financial fraud can severely impact a company’s bottom line and reputation. Business owners must be proactive in implementing comprehensive measures to detect and prevent fraudulent activities. Regular audits, robust internal controls, employee training, and a culture of transparency are crucial components in safeguarding against financial fraud. By staying vigilant and informed, business owners can protect their enterprises from the various forms of financial fraud that threaten their success.

Understanding W-2 Phishing and Its Impact During Tax Season

Understanding W-2 Phishing and Its Impact During Tax Season

As W-2’s are due to employees by the end of January, businesses face not only the annual task of filing tax statements for employees but also an increasing threat from cybercriminals targeting sensitive employee information through W-2 phishing scams. Understanding the risks and implementing preventive measures is crucial to safeguarding your business, ensuring the protection of the personal information of your employees, and protecting employees from potential financial and reputational damage.

What is W-2 Phishing?

W-2 phishing is a type of cyber attack where scammers impersonate company executives or human resources personnel to trick employees into providing copies of W-2 forms or other sensitive personal information. These forms contain valuable data such as Social Security numbers, earnings, and tax withholdings, which are essential for filing tax returns.

How Does W-2 Phishing Work?

  1. Email Spoofing: Cybercriminals send emails that appear to come from company executives or HR departments. These emails typically request that employees provide W-2 forms or other sensitive information urgently. The emails also can target HR departments from other departments, such as finance, to gather the information of multiple employees at once.
  2. Social Engineering: The emails often use urgency or authority to manipulate employees into complying with the request. They may also contain links to fake websites where employees are prompted to enter their login credentials or sensitive information.
  3. Data Theft: Once scammers obtain W-2 forms or personal information, they can use it for various fraudulent activities, including filing false tax returns, identity theft, or selling the data on the DarkWeb.

Impact on Business

W-2 phishing can have serious consequences for businesses such as:

  • Financial Loss: Businesses may incur financial losses due to fraudulent tax filings or legal expenses resulting from identity theft claims.
  • Reputational Damage: A data breach can damage trust and reputation with employees, customers, and stakeholders.
  • Regulatory Penalties: Businesses may face penalties and legal consequences for failing to protect employee information adequately.

Preventive Measures

Protecting your business against W-2 phishing requires a proactive approach:

  1. Employee Training: Educate all employees about phishing scams, emphasizing the importance of verifying email requests for sensitive information before responding. Also make sure that your Finance and HR departments are fully aware of the threat of W-2 phishing during tax season. An annual reminder does not hurt.
  2. Verification Procedures: Establish clear procedures for verifying requests for sensitive information, such as W-2 forms, particularly when received via email or phone.
  3. Multi-Factor Authentication (MFA): Require MFA for accessing systems that contain sensitive employee information to prevent unauthorized access.
  4. Vendor Due Diligence: Verify the security measures of third-party vendors who have access to employee data, such as payroll service providers.

Conclusion

As tax season approaches, businesses must remain vigilant against W-2 phishing scams. By educating employees, enhancing email security measures, and implementing robust verification procedures, you can significantly reduce the risk of falling victim to these cyber threats. Protecting sensitive employee information not only safeguards your business from financial losses and legal liabilities but also preserves trust and credibility with your workforce. Stay informed, stay proactive, and prioritize cybersecurity to defend against W-2 phishing and other evolving cyber threats. Your diligence today can prevent potential disruptions and protect your business’s future.

ICI’s Legal Division

ICI’s Legal Division

ICI’s Legal Division focuses on international financial fraud matters. ICI has special expertise in the following, including, but not limited to: financial instruments, prime bank notes and offshore tax havens involving banks and trust companies.  Email ICI to with your concerns and one of our agents will respond in a timely manner.

ICI is now offering credit checks

ICI is now offering credit checks

International Consultants and Investigations, Inc. (ICI) is now offering credit checks for pre-employment and rentals for a fee of $50.00.  As an added bonus, ICI will also provide our Global Watch program.  The Global Watch program is inclusive of US Government and financial enforcement checks as well as an international criminal background evaluation.  Complete background checks are available; fees are dependent upon the depth of check required.

Note that an authorization signed by the subject is required for all credit checks within the US. ICI can provide this form upon your request.

For information, contact ICI at: [email protected]

Visit us at : www.icicompanies.com

 

TEGO CYBER SECURITY – ICI’s exciting new client

ICI’s exciting new client, Tego Cyber has requested the we enlighten our associates and clients to this powerful new cyber security solution. As a rule, we do not disclose client names but, in this case, we feel compelled to release this information.

TEGO Cyber’s mission is to deliver an intelligent, state-of-the-art threat intelligence platform with a proprietary process of collecting and enriching threat data to help enterprises identify threats within their environments.

TEGO Cyber threat intelligence application helps enterprises meet the challenges of today’s connected business world. This is an advanced threat intelligence platform utilizing proprietary software solutions for the enterprise space; the founding team is highly experienced and recognized within the cyber security field. The TEGO threat intelligence [platform (TTIP) integrates with top end security platforms to gather, analyze and proactively identify threats to an enterprise network. As a result:

A proprietary process is used to compile, analyze and then deliver data to an enterprise network in a foprmat that is timely, informative and relevant. This data is provided in context and included specific details for the enterprise to identify and counteract threats.

 

Stay tuned for more on Tego Cyber!

Airport and Hotel Wi-Fi Hacks

Connecting to public Wi-Fi gives savvy hackers easy access to your personnel information.  Too avoid these scams use your smart phone to connect to the internet more securely.  You might also invest in a virtual private network (VPN), a service that encrypts your data to keep unscrupulous hackers from stealing sensitive information online.  A VPN costs about $30 to $100 a year.

AARP Bulletin June 2021

  IDENTITY THEFT…IT’S THE CRIME THAT KEEPS ON TAKING

LAST YEAR IDENTITY THEFT COST CONSUMERS IN THE U.S. ALMOST FIVE BILLION DOLLARS.

EARL JOHNSON, CEO OF ICI COMPANIES HAS A FEW SELF-DEFENSE STRATEGIES TO STOP THIS CRIME BEFORE IT HAPPENS TO YOU!

1. THE INTERNET POSES A HUGE THREAT.  HERE ARE SOME OF THE THINGS YOU HAVE TO BE AWARE OF:

a) don’t store credit card info on a website

b) don’t open or respond to unwanted email or email from a party you don’t know.  This can unleash a “worm” air virus on your computer that will disable your system and/or allow hackers to get in.

c) make sure you are on a secure page when shopping on the Internet.

d) use just one credit card exclusively for internet shopping

e) utilize virus and security protection.  These can be purchased or provided for free by firms like Microsoft for users of their operating system.

2. ATMs, ALMOST EVERYONE USES THEM AND WHAT ARE SOME OF THE THREATS YOU FACE USING THEM?

a) do not use convenience store ATMs or those not provided by a financial institution.

b), choose a pin number that’s hard to crack

c) always make sure no one is looking over you shoulder while you’re using an ATM

d) make sure the ATM hasn’t been tampered with

e) use ATSMs that are in trafficked and well lit areas and not isolated or hidden from view

3. YOUR PHONE CAN ALSO EXPOSE YOU TO IDENTITY THEFT.

WHAT ARE SOME PRECAUTIONS YOU CAN TAKE?
a) do not give out personal info over the phone if you didn’t initiate the call own know the party you’re speaking to

b) register with a national do not cal system

c) don’t offer up your social security, credit card or bank account numbers unless you know who you’re speaking to

d)  do not send money over currency apps or give credit/debit card info to parties you don’t know.  Current scams revolve around grand children in trouble needing money, “Medicare” or “IRS” calls threatening legal action if “past due balances” aren’t remitted immediately or any other call from a bank or financial institution requesting verification of account numbers, PIN numbers, etc.

4. RECENTLY, THERE HAVE BEEN SOME CHANGES TO THE FAIR CREDIT REPORTING ACT WHICH WILL ENABLE EVERYONE TO OBTAIN ONE FREE CREDIT REPORT A YEAR.

a) consumers are entitled to a free copy of their credit report every 12 months.  All three of the credit reporting agencies are required by law to fulfill the request.  Log onto consumer.gov for more info or refer to ICI’s website  icicompanies.com