About Henry Hardoon

management consultant and forensic accountant

The value of fraud committed in the UK last year topped £1bn

The value of fraud committed in the UK last year topped £1bn for the first time since 2011, prompting a warning about increasing cyber crime and the risk of more large-scale scams as the economy comes under pressure especially so now we have BREXIT. The 55% year-on-year rise in the value of fraud to £1.1bn [...]

By |2017-10-21T16:08:12+00:00October 21st, 2017|Blog Post|0 Comments

How do you deal with Company fraud

Company fraud levels have been at an all-time high since 2016. The percentage of companies that reported being victim to fraud has risen to 82% in the last year according to the Kroll Annual Global Fraud and Risk Report. Although external frauds often taken place, the most common type of fraud happens to be internal- [...]

By |2019-08-06T14:19:19+00:00October 21st, 2017|Blog Post|0 Comments

Cyber attacks and malware: how can you protect your business?

Marcus Hutchins, the 23 year old who successfully stopped the WannaCry ransomware attack this May, has appeared in a US court after being arrested by the FBI in Las Vegas last Friday. Hutchins was in Las Vegas attending a conference on hacking, and was arrested over his alleged involvement in creating and selling a form [...]

By |2017-10-21T14:36:05+00:00October 21st, 2017|Blog Post|0 Comments

Fraud costs the UK economy £193 billion a year

Fraud in the UK: Updated Insights and Staggering Costs in 2025 Fraud continues to pose a massive challenge in the UK, costing the economy an estimated £193 billion annually, according to the Annual Fraud Indicator. This figure far exceeds previous government estimates of £50 billion in 2013, highlighting the urgent need for robust anti-fraud measures [...]

By |2025-01-17T18:06:18+00:00September 8th, 2016|Blog Post|0 Comments

Using Computer Forensics

Definition of Computer forensics : Computer forensics is the practice of collecting, analysing and reporting on digital data in a way that is legally admissible. It can be used in the detection and prevention of crime. Uses of Computer forensics: It can also be used  in any dispute where evidence is stored digitally. Computer forensics follows a [...]

By |2017-10-27T10:53:13+00:00August 18th, 2016|Blog Post|0 Comments

Employee Surveillance – How Far Does The Rabbit Hole Go?

Top Tips for Employers Considering Employee Surveillance: A 2025 Guide Employee surveillance can be a sensitive yet necessary step for addressing concerns like fraudulent behavior or prolonged absenteeism. Here’s a detailed guide to help employers approach this carefully, ethically, and legally. When Should Employers Use Surveillance? Exhaust All Support Options First Ensure employees receive [...]

By |2025-01-17T18:08:39+00:00August 14th, 2016|Blog Post|0 Comments

UK cyber fraud up 21%, says police fraud unit

Social engineering is a non-technical method of intrusion used by cyber criminals that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. Typically, the aim is to trick people into malware-laden email attachments or to divulge sensitive information that can be used to steal information and credentials to commit fraud. The [...]

By |2019-08-06T14:19:25+00:00August 14th, 2016|Blog Post|0 Comments

Egypt probes $70m fraud in wheat supply

Egypt's general prosecutor said on Sunday that local wheat suppliers worked with government employees to falsely claim E£621 million  ($69.93 million) worth of grain that does not exist. Egypt has been embroiled in a controversy over its local wheat supplies, with grains industry officials claiming that over 2 million tonnes of the 5 million tonnes [...]

By |2016-08-26T14:32:28+00:00August 10th, 2016|Blog Post|0 Comments

ENRON: The smartest guys in the room

The central point in the Enron debate can be simply stated by asking whether or not they acted ethically through their business practices. Executives used mark to market accounting practices along with deregulation across the nation in order to falsify books and to create an illusion of success to the general public. These practices and [...]

By |2019-08-06T14:19:28+00:00August 9th, 2016|Blog Post|0 Comments

Your Asset Search & Trade-Based Money Laundering

If your adversary is using a business entity to conceal assets from you, one thing to look for is trade-based money laundering. A June 2006 report by the Financial Action Task Force explains that trade-based laundering schemes can include: the over or under-invoicing of goods or services; the over or under-shipping of goods; falsely describing [...]

By |2017-10-27T10:57:55+00:00August 8th, 2016|Blog Post|0 Comments
Go to Top