SlideShare a Scribd company logo
1 of 10
Call Now: (800) 713-7670
                                     (281) 456-2474


Computer And Digital Forensic Services
         in Houston, Texas




                         mccanninvestigations.com
• McCann Investigations is a full service private investigations firm
  encompassing computer forensics, digital debugging, network
  breaches as well as traditional private investigations.
• McCann Investigations Texas-based One Source, One Provider solution
 removes the need to hire multiple providers for your Electronically Stored
 Information (ESI) investigative needs.
• McCann Investigations' computer forensics, digital forensics, and
 electronic discovery services serve law firms, private industry, and
 government with the same dedication and expertise that has had clients
 turning to McCann for over 25 years.




                                                  mccanninvestigations.com
Our Services

• Computer forensics
• Digital Debugging
• Network Breach
• Surveillance
• Background Checks
• Undercover Investigations




                      mccanninvestigations.com
1 Computer forensics
1
   • What is Computer Forensics?
   • How do you get started with a computer forensic investigation?
    The answer is simple: call and speak to a McCann Investigator.
   • The McCann Investigation will help you understand the electronic
     discovery process from start to finish. Regardless of whether your ESI is
     trapped in laptops, desktops, external drives, backup tapes, cellular
     phones, smart phones, servers, hosted drives, or shared drives, McCann
     Investigation has the expertise to harvest the ESI for forensic evidence.
   • We utilize the latest digital forensic tools and software to provide you
    with the best in Investigations. In general, the computer process
    follows the following steps:




                                                    mccanninvestigations.com
2 Digital Debugging
2
  • With inexpensive and rapidly evolving spyware, key loggers, and
   other forms of malware, the risk of “digital bugging” has never been
   greater, and the delivery methods of “bugs” designed to spy on your
   content or active key strokes are plentiful.
   • You do not need physical access to the network or computers.
    “Digital bugs” can be picked up surfing the Internet or unwittingly
    downloaded from emails. They can also be installed locally with just a
    few seconds of access time.




                                                   mccanninvestigations.com
3 Network Breach
3
  • IT Network Security & Penetration Testing
  • Safeguarding customers’ confidential information is important to any
    business, but it is especially important for companies that collect and
    store non-public customer financial information.
  • As regulations and compliance issues regarding your organization’s
   information and security systems become more complex, uncovering
   and addressing IT security issues before an incident occurs can be vital.




                      Source: http://www.librait.net/index.php?id=52

                                                                       mccanninvestigations.com
4 Surveillance
4
  • McCann Investigators are skilled in the art of traditional
   surveillance techniques, however, we update this skill by deploying
   the most advanced recording devices .
   • Regardless if your case requires vehicle-based surveillance for
    watching a large warehouse area or if you require body-worn
    surveillance for recoding an illicit meeting at a bar, McCann
    Investigators can help.
   • Surveillance of suspicious suspects requires years of experience,
    which are often times and best gained during a law enforcement
    career.




                                                    mccanninvestigations.com
5 Background Checks
5
  • In general, background checks and background investigation are the
   process of locating and compiling criminal records, civil and
   commercial records, and financial records of an individual.
   • McCann can review basic information or we can dig deeper to interview
    the applicant and check directly with former employers, neighbors, and
    business partners.
   • McCann can go beyond the sources that the applicant or partner expects
    to be checked to uncommon sources and find past points of conflict.
    McCann can help fill in the gaps and provide deeper pictures so that you
    can make better decisions and minimize risk.
    Entry Level Background Checks
    Managerial Level Background Checks
    Executive Background Checks




                                                  mccanninvestigations.com
6 Undercover Investigations
6
  • McCann Investigations provides two types of undercover
   investigations.
   a) An external undercover investigation
   b) An internal undercover investigation
   • An external undercover investigation is performed when you want to
    obtain information on an outside group or organization that is seeking to
    harm your business or interests.
   • An internal undercover investigation is performed when you discover or
    suspect that information or a product is being diverted from one of
    your company’s locations.




                                                  mccanninvestigations.com
Facebook     Twitter


Offices: Houston | Dallas | Austin | San Antonio | New York
      Headquarters: 5205 Spruce, Houston, TX 77401
         Call Now (800) 713-7670 or (281) 456-2474


        mccanninvestigations.com

More Related Content

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Computer And Digital Forensic Services in Houston, Texas

  • 1. Call Now: (800) 713-7670 (281) 456-2474 Computer And Digital Forensic Services in Houston, Texas mccanninvestigations.com
  • 2. • McCann Investigations is a full service private investigations firm encompassing computer forensics, digital debugging, network breaches as well as traditional private investigations. • McCann Investigations Texas-based One Source, One Provider solution removes the need to hire multiple providers for your Electronically Stored Information (ESI) investigative needs. • McCann Investigations' computer forensics, digital forensics, and electronic discovery services serve law firms, private industry, and government with the same dedication and expertise that has had clients turning to McCann for over 25 years. mccanninvestigations.com
  • 3. Our Services • Computer forensics • Digital Debugging • Network Breach • Surveillance • Background Checks • Undercover Investigations mccanninvestigations.com
  • 4. 1 Computer forensics 1 • What is Computer Forensics? • How do you get started with a computer forensic investigation? The answer is simple: call and speak to a McCann Investigator. • The McCann Investigation will help you understand the electronic discovery process from start to finish. Regardless of whether your ESI is trapped in laptops, desktops, external drives, backup tapes, cellular phones, smart phones, servers, hosted drives, or shared drives, McCann Investigation has the expertise to harvest the ESI for forensic evidence. • We utilize the latest digital forensic tools and software to provide you with the best in Investigations. In general, the computer process follows the following steps: mccanninvestigations.com
  • 5. 2 Digital Debugging 2 • With inexpensive and rapidly evolving spyware, key loggers, and other forms of malware, the risk of “digital bugging” has never been greater, and the delivery methods of “bugs” designed to spy on your content or active key strokes are plentiful. • You do not need physical access to the network or computers. “Digital bugs” can be picked up surfing the Internet or unwittingly downloaded from emails. They can also be installed locally with just a few seconds of access time. mccanninvestigations.com
  • 6. 3 Network Breach 3 • IT Network Security & Penetration Testing • Safeguarding customers’ confidential information is important to any business, but it is especially important for companies that collect and store non-public customer financial information. • As regulations and compliance issues regarding your organization’s information and security systems become more complex, uncovering and addressing IT security issues before an incident occurs can be vital. Source: http://www.librait.net/index.php?id=52 mccanninvestigations.com
  • 7. 4 Surveillance 4 • McCann Investigators are skilled in the art of traditional surveillance techniques, however, we update this skill by deploying the most advanced recording devices . • Regardless if your case requires vehicle-based surveillance for watching a large warehouse area or if you require body-worn surveillance for recoding an illicit meeting at a bar, McCann Investigators can help. • Surveillance of suspicious suspects requires years of experience, which are often times and best gained during a law enforcement career. mccanninvestigations.com
  • 8. 5 Background Checks 5 • In general, background checks and background investigation are the process of locating and compiling criminal records, civil and commercial records, and financial records of an individual. • McCann can review basic information or we can dig deeper to interview the applicant and check directly with former employers, neighbors, and business partners. • McCann can go beyond the sources that the applicant or partner expects to be checked to uncommon sources and find past points of conflict. McCann can help fill in the gaps and provide deeper pictures so that you can make better decisions and minimize risk.  Entry Level Background Checks  Managerial Level Background Checks  Executive Background Checks mccanninvestigations.com
  • 9. 6 Undercover Investigations 6 • McCann Investigations provides two types of undercover investigations. a) An external undercover investigation b) An internal undercover investigation • An external undercover investigation is performed when you want to obtain information on an outside group or organization that is seeking to harm your business or interests. • An internal undercover investigation is performed when you discover or suspect that information or a product is being diverted from one of your company’s locations. mccanninvestigations.com
  • 10. Facebook Twitter Offices: Houston | Dallas | Austin | San Antonio | New York Headquarters: 5205 Spruce, Houston, TX 77401 Call Now (800) 713-7670 or (281) 456-2474 mccanninvestigations.com