Sangeeta Jan 11, 2014 No Comments
Is there an unauthorized payment transaction to a vendor?
Does a suspicious amendment to banking details show up in payroll or supplier data records?
Can weakness within the client system be identified to prevent fraud recurrence?
How to detect SIM card cloning?
With increase in the use of net, mobile, IVRS (Interactive Voice Response System), ATM, commercia