Tag - investigation

technology intelligence

Technology is more than ever changing the intelligence world

Artificial intelligence, “Big Data”, robots, the Internet of Things, and blockchain have altered the rules of the game, putting intelligence communities throughout the globe at a crossroads. The proliferation of these technologies, the bulk of which are civilian, might result in data breaches and pose a threat to intelligence agencies. Recent...

Read more...

The role of forensic investigation in cases of suspected data theft

While it is critical for companies to take safeguards against external threats, such as hackers, trojans, phishing emails, and ransomware, one key risk that is sometimes overlooked is insider threats, most notably the theft of sensitive information by employees—particularly departing ones. A survey conducted by Haytax, a company specializing in data...

Read more...
security

How minor negligence can jeopardize a company’s security

Corporate leaks of classified or sensitive information are prone to occur, ranging from simple human mistakes to full-blown dataset hacks. Companies need to be aware of such risks. A number of research centers specializing in data security found that employee negligence caused major insider data breaches in the last two years. A...

Read more...
verification investigation

When a verification turns into an investigation

In an increasingly competitive job market, jobseekers will do whatever they can to stay ahead of their competition and demonstrate that they are competent, legitimate, and desirable to potential employers. This includes fabricating their resumes. Given the prevalence of this phenomenon, employers should not blindly trust resumes and applicant interviews...

Read more...
media sosial

A closer look at investigator activities

Written by Sam Brown and Gini Graham Scott, Private Eyes: What Private Investigators Really Do basically tells how detectives or investigators carry out their daily work. This book was written based on interviews with eight private investigators with different specializations. The interviews include, among other things, what they specialize in,...

Read more...
dsktop investigation fraud detection through tip

The power of desktop investigation

A successful investigation is not just about the results, but how it is efficiently and accurately done. Just like any other project, an investigation begins with planning to understand the scope and activities that need to be undertaken. The important component of planning is desktop investigation. In simplest forms, desktop investigation...

Read more...
fraud in life insurance

Application fraud in life insurance

There are many types of fraud in insurance, including false claims, forgeries, bogus policies, and the most prevalent, application fraud, which involves giving the insurance company false information when applying for a policy. How the fraud works Application fraud occurs when fraudsters hide their preexisting medical condition with the hope of getting...

Read more...
mystery shopping

Mystery shopping to measure service standards

Consistency in compliance with relevant standards, such as SOPs and government regulations, should be a top priority for organizations, particularly those that deal directly with customers. There are cases when employees fail to execute services according to the standards without the company's knowledge, consequently jeopardizing client satisfaction and the company’s...

Read more...

MEMBER OF

HEADQUARTERS

ADDRESS

Jl. RS. Fatmawati Raya No. 57-B, Cilandak Barat, Jakarta 12430, Indonesia

PHONE

EMAIL

SUBSCRIBE NEWSLETTER

Get the latest updates and offers

    OUR REFERRAL

    Copyright – INTEGRITY – All Rights Reserved © 2023 – Privacy Policy | Terms of Services