McCann White Papers and Case Studies
As subject matter experts, McCann Investigations provides clients with the latest in Private Investigations techniques and Computer Forensics tools. McCann is a one source solution for full scale investigations that emcompass multiple variances and result in complete and comprehesive gathering of facts and evidence.
From contentious divorce to embezzlement and fraud, learn how McCann can help.
This paper discusses the very serious allegations of possession of child pornography in the workplace and how managers can best deal with the allegations and effect an in depth investigation. Due to the gravity of this type of allegation, the proper steps must be taken in order to ensure that managers conduct sound investigations in order to potentially damaging civil or criminal liability. READ MORE
The Association of Certified Fraud Examiners (ACFE) recently conducted research in its 2012 Report to the Nations on Occupational Fraud and Abuse about the effects of fraud on business revenues. There were a variety of fascinating findings in the study. READ MORE
White Paper - Digital Intellectual Property Theft: Protecting Your Organization from Potential Attacks
This paper explores the complexities of digital intellectual property. The sophistication of cyber assaults has increased at alarming rate allowing hackers to steal intellectual property from individuals and small companies, to large companies with a significant global presence. Threats come from not only state-sponsored cybercriminals, but also from internal employees. Companies must look at securing their data from the view point of a hacker, rather than a company trying to protect its assets. READ MORE
Do you really know your IT person? This individual has access to you network and there is the potential for serious network breach and data loss. There are no licensing requirements IT security professionals. READ MORE
Although data has been deleted from a smart phone, often that data is recoverable. If recovered by a licensed computer forensics expert, this data is admissible in court cases. READ MORE
Texting and driving is the number one cause of death for teen agers and many drivers admit to texting while driving. READ MORE
Partnerships in businesses are formed with the intent of benefiting both partners. However, an incomplete background investigation can put the business at risk. A comprehensive background investigation of a potential partner can prevent catastrophe. READ MORE
Warring spouses are embracing technology in divorce cases. Spyware and key loggers are relatively inexpensive and easy to install for even the most novice computer user. READ MORE
Technology has given rise to the online affair. If there is infidelity occurring, it is taking place on computers, laptops and especially smart phones. READ MORE
The Senior Most IT Professional has an atypical power structure that differs from any other professional in his or her class. The CEO is constantly scrutinized by the shareholders, the CFO is overseen by a 3rd party audit committee, and the COO is under frequent discussions with the CFO and CEO. READ MORE
Identity Theft is a crime that has been around for a long time, but has only in recent decades gotten out of control. Looking toward the future, it seems that this crime will continue to be on the forefront of expanding criminal enterprise. READ MORE
If one heard the phrase "my phone is bugged" ten or fifteen years ago, the first image that would come to mind would be a scene from some 1980s movie in which the main character discovers a recording device attached to his landline phone socket. READ MORE