Stop Fraud From Within: Detecting and Preventing Employee Fraud (Currently Unavailable)

More than half of all fraud comes from company insiders – whether its purposefully, for financial gain, or due to carelessness and poor security measures. Join expert instructor Robert K. Minniti as he shares his experiences in forensic accounting, fraud examinations, internal financial audits and more.

In this on-demand bundle, you will get an overview of the varying types of fraud that many tax practitioners encounter. This includes common red flags, recent fraud cases, and some of the legal repercussions behind fraud.

Learn to Spot Red Flags of Fraud in Financial Statements - If you are an auditor or a preparer of financial statements you need to be aware of the red flags for potential red flags for fraud in the financial statements. Other users of the financial statements including shareholders, regulators, and creditors, will also find this useful. Expert presenter, Robert Minniti, will discuss potential red flags for fraud in the financial statements including the types of transactions that can be used to create fraudulent financial statements.
In March 2020, the government passed $2.2T in funding due to the COVID crisis. A portion of that funding was to establish the Payroll Protection Program (PPP). The intent of this program was to assist small businesses with less than 500 employees with sufficient funds to provide employees with paid leave. Personnel and payroll are critical to all businesses. The payroll process includes a multitude of factors including pay rates, employee classification, sick leave, paid time off, withholdings, taxing, benefit plans and other elements that impact workers. With the quick onset of the legislation, the potential for fraud within the application and loan repayment process is strong.
This course will concentrate on employee fraud, specifically bid rigging. We will review the red flags for bid rigging. We will also discuss bid rigging by vendors without employee collusion. Real world examples will be provided for the participants to see how this is occurring in the business world. This course is designed for individuals who would like to refresh their understanding of bid rigging schemes and to learn how to recognize the red flags for detecting bid rigging in an organization. Understanding how employees and vendors commit fraud is the first step in preventing fraud.
This course explores many of the way’s employees can commit fraud, especially the types of fraud that use documents to skirt internal controls. We will consider embezzlement schemes, theft schemes (Cash, inventory, data, and fixed assets), and will examine how employees conceal these frauds. We will review the red flags for employee fraud. Real world examples will be provided for the participants to see how this is occurring in the business world.
This course is designed to review the issue of payroll frauds. Examples of actual frauds will be provided so participants can understand how the frauds are being committed and how they were uncovered. Information will be provided about payroll frauds committed by employees as well as payroll frauds committed by management and company owners. We will review various methodologies for detecting payroll fraud and will discuss developing internal controls to help prevent and detect payroll fraud.
When small businesses commit tax fraud they are usually trying to hide revenue and expense personal items as business expenses. In this course we will review the various ways small businesses commit tax fraud. We will discuss the red flags that could be indicative of tax fraud. Current cases from the news will be presented for discussion.
With the 2020 pandemic many organizations have employees working from home for the first time. This creates additional cyber security risks for the employees and their organizations.
Per the IRS Education Provider Standards this course must be COMPLETED by 12/31/2025 to receive credits. NOTE: Go to My Professional Profile in your CCH CPELink account settings to ensure your name, and PTIN number; matches your PTIN card

The IRS has recently updated its guidelines for data and cyber security placing new responsibility for the security of taxpayer’s personal information on tax preparers. This course is designed for tax professionals who collect and store client’s personal information, who would like to obtain an understanding of data and cybersecurity. You have probably heard of some of the more common types of cyber crimes such as ransomware, spyware, computer viruses, phishing, vishing, spoofing, data breaches, denial of service attacks, hacking, etc. This course is also designed to familiarize tax professionals who are not information technology (IT) experts on data breach and cybersecurity risks and internal controls. We will review the IRS recommendations for securing taxpayer information. We will cover the material in a plain language, nontechnical manner. We will cover what you need to know, but not how to write the computer programs or code.

Total: 8 courses (15 CPE hours)

">
 Chat — Books Support