Internal Theft
We all worry about the threats that external parties pose to our businesses, but too often we forget the damage that those inside the organisation can do. Alarm systems, CCTV, and security all serve to keep people out, but what about those who are already on the inside and know how to get around these security measures?
Why is Internal Theft a Problem?
The threat of internal theft is in many ways far greater than the threat of theft from external parties. Your employees know the ins and outs of your organisation better than anyone else, and as such are far better positioned both to begin the process of internal theft, and to refine and continue it undetected over time. As a result, the potential losses are far greater.
Whether the perpetrator is stealing for immediate financial gain or in order to set up their own competing enterprise in future, your customer lists, pricing schedules and structures, product details, propriety software and perhaps even other employees could well be at risk.
Protecting from Internal Theft
The best way to protect from Internal Theft, is to ensure that protection of assets is an intrinsic part of your company culture. This can be achieved by introducing a better review process, improving existing safeguards, and most importantly communicating policies to staff, and securing their buy in by involving them in the process.
To truly protect yourself from the threat of Internal Theft, it’s important to understand the methods that employees may use. These could include but are not limited to:
• Diversion of business to a competitor or their own entity
• Sale of assets or services for cash with no receipt
• Under delivery of goods to a customer
• Replacement of genuine product or parts with substandard or counterfeit versions
• Amending asset records to reflect lower stock count so that the excess can be stolen
• Consorting with supplier to allow delivery of less than the stated quantity or product of poor quality
• Theft of product or material from the workplace
Regents’ Approach
At Regents, we understand that one of the most groups most susceptible to involvement with Internal Theft, is middle management. This group not only has access to a great deal of company knowledge, but may not have been senior enough to establish complete loyalty to the brand. As such, they are often the most likely to strike out on their own.
Regents can help you to implement a policy that will help you to protect your assets from the inside out, through the engagement of these middle managers. We recommend a multi faced approach that deters such activity by making protection of assets part of the corporate culture, and promoting the fact that errant behaviour will be investigated, and in many cases followed by civil action.
Corporate Investigations
Internal Theft
Intellectual Property
Employee Misconduct
Locating People
Need Professional Advice?
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module
Regents Blog
Eight Pointers to Stay Safe While Shopping Online
With stay-at-home orders, MCO in Malaysia and Circuit Breaker in Singapore being imposed during 2020 and into 2021, online shopping and home delivery is at an all-time high. Figures from analysts indicate that orders placed with Lazada, Shopee and Amazon have...
Learn to recognise and identify scams, so you don’t get cheated
Learn to recognise and identify scams, so you don’t get cheated The Macau scam is fairly well known today - unwitting victims receives a phone call from an individual impersonating as an official of a significant establishment or organisation and is told that...
Business Email Compromise Scams Are On The Rise
Business Email Compromise Scams Are On The Rise There has been a surge in business email compromise (BEC) or email account compromise scams (EAC) in recent years, causing losses of Millions of Dollars every year to individuals, plus Small and Medium companies. This...
Procurement Fraud threats to companies
There are five basic bid rigging schemes which target vulnerable procurement tenders
More scam and cheat schemes in 2021
More scam and cheat schemes in 2021 Mobile number portingScammers transfer a registered mobile phone number from one telco provider to a different provider without the knowledge of the owner followed by syncing the scammer’s mobile phone with the ported number to...
Glossary of Scams in Malaysia
LHDN impersonation scamsRecent years have seen scammers boldly impersonating Lembaga Hasil Dalam Negeri Malaysia (LHDN), approaching Malaysians with offers of rebates for overpaid taxes or worse, threats of legal action for overdue tax. Impersonation scams known as...