Blog

McCann Investigations is a full service computer forensics and private investigations firms providing a full range of services to law firms, public and private companies and financial services firm in cases such as family law, corporate intelligence, due diligence, embezzlement, fraud, digital debugging, IT Vulnerability Assessments and non compete enforcement

Best Practices for Non-Compete Agreements

October 30, 2014

Having a non-compete agreement in place doesn't ensure that an employer will be able to enforce it.  Getting the terms of the agreement in place from the beginning are key to being sure that it will hold up in court.  Enforcing a non-compete agreement will no doubt require some sort of legal wrangling and not having the proverbial ducks in a row will not ensur.....

READ MORE >

This Is a Nightmare. Get the CSI Team in Here Now. No no, the Computer Forensics Team. Not the Blood Guys.

October 30, 2014

Open on a panning shot of Florida coastline. Closeup on alligator blinking lazily then slowly submerging into water. Quick flash to water snake swimming towards camera. Cut to sweaty, clearly overworked, office worker typing frantically away at computer. He sighs heavily, flops back in chair, revealing sweat marks under arms, and loosens tie and top button on shirt. He mops his brow with a sogg.....

READ MORE >

Choose a Certified Fraud Investigator to Protect Yourself and Your Property

October 30, 2014

When people think of crimes involving fraudulent documents, they usually think of something like insurance fraud. This kind of crime is usually committed by an individual and does not involve stealing or forging information about anyone other than themselves. With insurance fraud, an insurance claim could be exaggerated, or an accident could be caused on purpose, but few people ever end up bein.....

READ MORE >

Make Forensic Accounting Work Right for You

October 30, 2014

In simplest terms, forensic accounting is the practice of using accounting techniques to investigate embezzlement and fraud, as well as to analyze financial information in legal proceedings. Understanding the full definition of forensic accounting, however, is necessary for those who may want to investigate whether or not some kind of fraud, such as insurance fr.....

READ MORE >

Mobile Investigation – INFOGRAPHIC

October 30, 2014

mccann_infographic_499x790

READ MORE >

What Is Insurance Fraud?

October 30, 2014

Insurance fraud, simply put, is any action that someone takes in order to gain money, advantage, or really anything they are not otherwise entitled to from an insurance agency. Some common actions are arson, form alteration, or simple claim exaggeration. Insurance fraud investigation attempts to stop, catch, and prosecute the .....

READ MORE >

Recycled phones retain their previous owners’ data

October 30, 2014

Retrieve the SIM card. All cell phones require a little removable card called a SIM card.  According to Wikipedia, "A SIM {subscriber identity module or subscriber identification module) is an integrated circuit that securely stores the international mobile subscriber identity (IMSI).  A SIM circuit is embedded into a removable plastic card. This plastic card is called "SIM card" and can be t.....

READ MORE >

Insurance Fraud Gets One Person Money That the Rest Have To Pay For.

October 30, 2014

Insurance fraud is no light matter. In fact, it is the second most costly white collar crime in the United States, right after tax evasion. The biggest problem with insurance fraud is that it is not a victimless crime. If someone succeeds at insurance fraud, everyone else using that insurance company has an increase in their p.....

READ MORE >

iPhone 5s Fingerprint Scanner Hacked in just 48 Hours

October 30, 2014

The "apple heads" were out en mass again waiting for Apple's newest incarnation of the iPhone - the 5s.  The most notable feature about the new iPhone's was it's state of the art fingerprint scanner (oh yeah...and now it comes in silver and gold - mindblowing.).  While this type of biometric security feature is really nothing new, this nifty feature makes the .....

READ MORE >

What do Sarah Palin, Ashton Kutcher, Beyonce, and George W. Bush have in common?

October 30, 2014

In this age of "over-sharing" on social media many celebrities share everything about themselves with their fans. If the hacker does his homework, they can learn everything they need to know about the victim such as children's names, pet names, favorite restaurants, favorite places, etc. Many people often use this type of information in their security questions. Hackers can often gain enough in.....

READ MORE >

Latest from the McCann Investigations Blog
Best Practices for Non-Compete Agreements

Having a non-compete agreement in place doesn't ensure that an employer will be able to enforce it.  Getting the terms of the agreement in place from the beginning are key to being sure that it will hold up in court.  Enforcing a non-compete agreement will no doubt require some sort of legal wrangling and not having the proverbial ducks in a row will not ensur.....

READ MORE

This Is a Nightmare. Get the CSI Team in Here Now. No no, the Computer Forensics Team. Not the Blood Guys.

Open on a panning shot of Florida coastline. Closeup on alligator blinking lazily then slowly submerging into water. Quick flash to water snake swimming towards camera. Cut to sweaty, clearly overworked, office worker typing frantically away at computer. He sighs heavily, flops back in chair, revealing sweat marks under arms, and loosens tie and top button on shirt. He mops his brow with a sogg.....

READ MORE

McCann Investigations are accredited members of...