At a recent staff training meeting, Joseph Wellington, CFE, is discussing how to investigate fraud when a case calls for concealment investigative methods because of breaches in the investigative process. He goes further to state that the evaluation of a security breach from an external source is difficult, but from […]