IT fraud is a serious issue and should be addressed without delay


Posted December 16, 2012 by timbaub00

To put it very simply, IT fraud involves the use of information technology to commit a fraud. In the USA the Computer Fraud and Abuse Act proscribes what this is all about.

 
To put it very simply, IT fraud involves the use of information technology to commit a fraud. In the USA the Computer Fraud and Abuse Act proscribes what this is all about. This type of fraud can encompass a whole lot of white collar crimes, ones that have been committed by using computers and the internet. Most companies have very robust policies and practices in place to stop attempts of such frauds but sometimes these measures don’t make any difference. There are enough smart computer criminals out there. The best and most hassle free way to stop these frauds and report that such frauds have happened is to hire professional IT investigators.

One of the notable incidents related to IT fraud is the incident of Roger Duronia. Roger was employed at UBS PaineWebber and he was charged because he used a logic bomb that caused substantial damage to the company’s IT network to the tune of more than 3 million dollars. His logic bomb also planned to drive the company’s stock down but it failed. He was apprehended and suitably sentenced.

Now this is one of many similar incidents that have happened in the recent past. Somewhere some disgruntled employee tried out IT fraud to tarnish the reputation of the company. Somewhere some smart computer geek illegally entered a customer database to steal valuable customer data. Somewhere someone hacked into a website and posted obscene or threatening messages to drive customers away. The incidents are many and hard to control. But if and when such incidents occur professional IT investigators can always track the criminal down.

Some people think that deleting data means deleting the data forever. The fact is that deleted data can be recovered and it can be recovered even from destroyed or corrupt storage devices. There are applications that are specifically designed for such jobs and thanks to these applications most IT fraud incidents get caught, some before they cause any damage. Is it logical to hire someone for such jobs? Possibly not and hence it is best to outsource this activity to IT investigators.

IT investigators collect data from storage devices including mobile phones and present them as evidence. Their data collection technique is specialized and the report cannot be challenged in court. If you and I collect data from a compromised system we will not be able to do so and the integrity of the data will be questioned but not in the case of a professional investigator. Moreover, a professional investigator can also assess whether a third party data is valid or not and if it can be presented in court. So, when you hire someone like this you get a total solution that can help you indict someone that committed some kind of computer fraud.

An act of IT fraud can be disastrous for your company and can drive you out of business. The moment you feel something is not right look for IT investigators. This is the only and the best way to tackle such situations.


If you suspect IT fraud http://digitalinvestigations.com.au/our-service/intellectual-property-theft in your organization then it is time to call IT investigators http://digitalinvestigations.com.au/our-service/computer-forensicss.
-- END ---
Share Facebook Twitter
Print Friendly and PDF DisclaimerReport Abuse
Contact Email [email protected]
Issued By david banks
Country Australia
Categories Computers
Last Updated December 16, 2012