Articles

food fraud

Uncovering Food Fraud by Optimizing Due Diligence

Food fraud is not a new issue in the food industry. This unethical practice is intricately complex, encompassing deliberate actions aimed at deceiving consumers or gaining undue economic benefits through food manipulation. This includes contaminating food materials, substituting raw ingredients, falsifying labels, manipulating production processes, certification fraud, and fraud within...

Read more...
brand protection

Brand protection: Market surveys and inspections

Brand protection plays a crucial role in various aspects for businesses. Beyond providing legal safeguards and augmenting brand value, it safeguards investments, preserves company reputation, and shields consumers from the perils of counterfeit products. Two very important methods in brand protection efforts are market surveys and inspections. While distinct in purpose,...

Read more...
recruitment process

Securing the recruitment process with competency certificate verification

In the recruitment process, one of the most crucial factors to consider is the abilities and qualifications of prospective candidates. One common method used to gauge these abilities is through competency certificate verification.  These certificates are official documents that serve as proof that an individual has successfully completed specific training or...

Read more...
bank account trading

Exposing the Practice of Bank Account Trading

The practice of bank account trading is on the rise in Indonesia, haunting the local banking sector. This modus operandi has spread and become a frightening menace.  This practice typically includes the theft of identities, the fraudulent forging of identity cards, and even the unwitting participation of legitimate account holders. A recent...

Read more...
identity theft

Protecting your data from identity theft

When a company's database is compromised, personal information can be stolen and sold on the dark web, where cybercriminals trade these 'commodities.' This stolen information is often used for various criminal activities, including phishing, account takeovers, identity cloning, synthetic identity creation (by combining real and fake personal data), account trading,...

Read more...
whsitleblowing

Anonymity in whistleblowing: The pros, cons, and solutions

Whistleblowing systems play a crucial role in detecting misconduct and promoting ethical behavior within organizations. However, in reality, the very act of “blowing the whistle” can put whistleblowers at great risk. Among other risks, those who choose to disclose misconduct may experience retaliation, harassment, or other professional repercussions. Given the risks,...

Read more...
counterfeit drugs

OSINT: A weapon against counterfeit drugs

The development of the digital world has brought about various changes, including the circulation of counterfeit drugs. As information becomes more accessible on the internet, an increasing number of methods of advertising and selling counterfeit drugs are carried out anonymously by various people. In reality, this is nothing new. Since 2013,...

Read more...

Trademark protection, preventing infringement and mitigating dispute risk

A brand is more than just a logo or a name; it represents values, quality, and a business's identity. Therefore, safeguarding a trademark is an essential step to secure a brand's integrity and reputation. Numerous trademark infringement cases, such as Apple Inc. versus Prepear, Hermes versus Mason Rothschild, and the recent...

Read more...

The role of whistleblowing and digital forensics in exposing data manipulation fraud

In cases of occupational fraud, the perpetrators not only devise intricate schemes to deceive organizations but also employ various techniques to conceal their illicit activities. One such technique is data manipulation. This technique is prevalent in major fraud cases such as Enron, Theranos, Olympus, and a recent case in Indonesia: the...

Read more...