Company N called for a tender for preparation of design estimate documentation. At the stage of receiving requests the company found out that one of their employees had attempted to participate too. This employee had a shell company that offered services at a triple price, but due to the position, the employee could promote their own candidacy. Two more colleagues used to help the fraudster – they were given disciplinary probation, and the initiator was fired.
Exploitation of a company's resources and usage of a job position for promotion of some hidden business is a threat to a company which can keep on being undetected. You may not know why clients are going to some other side, why the solution gives way to some similar product with the same features but more suitable terms of use and support opportunities, and who are these people who know all the details of a software unit which are confidential to a third party.
HR director of company Z was taken under control after some suspicious communications were revealed in social networks. It turned out that the top manager had been trafficking drugs to remote offices using the logistics network of the company. The illegal substances were planted in the trucks along with common goods. Naive drivers became involuntary copartners supplying “additional” cargo. The collected information was provided to the law enforcement authorities.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!