<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Services Archive - Riskhouse International Limited</title>
	<atom:link href="https://riskhouse.co.ke/service/feed/" rel="self" type="application/rss+xml" />
	<link>https://riskhouse.co.ke/service/</link>
	<description>Forensic Investigation, Risk Management &#38; Compliance Services </description>
	<lastBuildDate>Wed, 11 Mar 2026 07:44:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>

<image>
	<url>https://riskhouse.co.ke/wp-content/uploads/2022/02/favicon-68x70.png</url>
	<title>Services Archive - Riskhouse International Limited</title>
	<link>https://riskhouse.co.ke/service/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Advisory &#038; Consulting</title>
		<link>https://riskhouse.co.ke/service/advisory-consulting/</link>
		
		<dc:creator><![CDATA[riskuser]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 11:37:38 +0000</pubDate>
				<guid isPermaLink="false">https://riskhouse.co.ke/?post_type=ot_service&#038;p=9328</guid>

					<description><![CDATA[<p>Dealing with complex issues of fraud, regulatory compliance and business disputes can detract from efforts to succeed. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/advisory-consulting/">Advisory &#038; Consulting</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img fetchpriority="high" decoding="async" width="1000" height="667" src="https://riskhouse.co.ke/wp-content/uploads/2026/03/advisory-services.webp" class="vc_single_image-img attachment-full" alt="" title="advisory-services" srcset="https://riskhouse.co.ke/wp-content/uploads/2026/03/advisory-services.webp 1000w, https://riskhouse.co.ke/wp-content/uploads/2026/03/advisory-services-300x200.webp 300w, https://riskhouse.co.ke/wp-content/uploads/2026/03/advisory-services-768x512.webp 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1773040147803" >
		<div class="wpb_wrapper">
			<p>We provide strategic advisory and consulting services to help organizations identify risks, strengthen compliance frameworks, and make informed decisions. Our experts deliver practical, evidence-based guidance in forensic investigation, risk management, and asset tracing to protect value, enhance resilience, and support sustainable business operations.</p>

		</div>
	</div>
<div class="vc_tta-container" data-vc-action="collapseAll"><div class="vc_general vc_tta vc_tta-accordion vc_tta-color-blue vc_tta-style-outline vc_tta-shape-square vc_tta-spacing-2 vc_tta-gap-3 vc_tta-controls-align-left vc_tta-o-no-fill vc_tta-o-all-clickable"><div class="vc_tta-panels-container"><div class="vc_tta-panels"><div class="vc_tta-panel" id="readiness-and-awareness-training" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#readiness-and-awareness-training" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Readiness &amp; Awareness Training</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  vc_custom_1773215049824" >
		<div class="wpb_wrapper">
			<h4>Actions Constituting Fraud</h4>
<p>The scope of fraud within an organization might range from internal theft of cash in small amounts to a third-party billing scheme worth millions. We assist the management teams to assess the control environment within their organizations and identify specific areas and situations where fraud could occur.</p>
<p>We also assist to create awareness among the management to help them to clearly define all types of fraud that occur within the company. This enables employees understand what actions constitute fraud and provide management with the legal grounds to investigate and punish violators.</p>
<h4>Fraud red flags and how to identify fraud</h4>
<p>Fraud red flags refer to undesirable situations that consistently contribute to fraud, waste, and abuse of resources.</p>
<p>When an investigator is reviewing a company’s financial statements, certain undesirable characteristics may stand out as fraud red flags, contributors to fraud or circumstances that may indicate the presence of fraud.</p>
<p>The employees should be aware of the warning signs of fraud such as financial/transactional red flags and behavioral red flags.</p>
<h4>Training staff on fraud prevention, detection and Investigation</h4>
<p>Fraud detection activities seek to identify fraud occurrences as soon as possible after they begin to limit the damage done.</p>
<p>Fraud prevention activities focus on proactively identifying and assessing fraud risks and taking steps to address those risks. A fraud investigation is aimed at examining evidence to determine if a fraud occurred, how it happened, who was involved, and how much money was lost. We train employees on fraud detection and prevention.</p>
<h4>How to report fraud</h4>
<p>They say more fraud is uncovered by tips than by any other means, making employees the best fraud detection control.</p>
<p>Employees must be well informed on how to report any suspicious activity, as well as empowered to make such reports without risk of retribution. <strong>Riskhouse</strong> trains your employees on how to report fraud.</p>
<h4>How to handle factors leading to fraud; Pressure, Opportunity and Rationalization</h4>
<p>We train your employees in handling factors that lead to fraud that is pressure, opportunity and rationalization such as increasing the perception of detection, proactive audit procedures, fraud assessment questioning, surprise audits where possible, employee antifraud education, handling of known fraud incidents’, minimizing employee pressures, open-door policies and writing the anti-fraud policy.</p>
<h4>Corruption &amp; Economic crimes awareness training</h4>
<p>An organization that understands the specific factors involved in corruption schemes can take steps to prevent, detect and investigate them. A culture of corruption can exist even in companies with seemingly sound policies in place. We assist in drafting and training employees on anti-corruption policies.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="1773042494894-16eb6a2d-a8901" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#1773042494894-16eb6a2d-a8901" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Cyber Security Solution</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  vc_custom_1773042576958" >
		<div class="wpb_wrapper">
			<p>We offer the following services to our clients:</p>
<p><strong>Vulnerability Assessment – </strong>We evaluate if your system is susceptible to any known vulnerabilities, assign severity levels to those vulnerabilities, and recommend remediation or mitigation, if and whenever needed.</p>
<p><strong>Penetration Testing</strong> – We assist in conducting Ethical hacking into the system. This entails the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in your computer systems, networks, websites, and applications. Through the process, we seek to provide you with the deep solution to fix the vulnerabilities identified within your system.</p>
<p><strong>Business Continuity Planning – </strong>Most organizations cannot oversee or predict some of the security challenges awaiting. We provide a detailed plan and strategy on how business operations can be maintained for both short-term and long-term outages.</p>
<p><strong>Disaster Management planning (DRP) – </strong>Disaster is unplanned incident which organizations cannot control. We are here to assist organization resolve data loss and recover system functionality to enable it to perform in the aftermath of an incident.</p>
<p><strong>IT roadmap Assessment – </strong>We develop and implement a strategic guide that can help your organization to understand system security challenges and manage cyber risks.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="1773042642465-1816148d-1edd2" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#1773042642465-1816148d-1edd2" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">System Security Audit</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  vc_custom_1773042699164" >
		<div class="wpb_wrapper">
			<p>Among other system audits, we conduct the following:</p>
<p><strong>IT governance Review – </strong>We ensure the IT processes are effective and efficient to enable an organization to achieve its goals. We review maturity of IT governance in relation to top management involvement in making the ICT decisions.</p>
<p><strong>System application review</strong> – Through our detailed system application-level review, we assist to identify the key controls that are critical for the functioning of the system at application level and provide recommendations that will enhance system security and ensure seamless business continuity.</p>
<p><strong>Database Administration Review</strong> – We seek to help towards establishing whether adequate controls are in place.  Among others, this controls include (i) User access controls (ii) Administrative access controls (iii) Audit logging (iv) Authentications and verification (v) Maintenance and monitoring (vi) Back up and (vii) Data restoration Test. Our review focuses on identifying key areas of weaknesses and providing recommendations to enhance controls.</p>
<p><strong>System Post-Implementation Review</strong> – We provide a systematic and designed approach to evaluate whether the system implementation objectives were met. We also determine how effectively and comprehensively the system implementation was conducted.</p>
<p><strong>System security maturity assessment and Management – </strong>We Test the system security model and check whether different system development stages are met. The following are the models;(i) Scanning the system (ii) Managed Assessment and Compliance (iii) Formalized Analysis and Prioritization (iv) Attack Focused Management (v) Optimization.</p>
<p><strong>IT General Controls Review – </strong>Our team of experts will assist you in reviewing general IT controls which includes (i) Application security (ii) Privilege access (iii) User identification and verification (iv) System users’ rights, role matrix and maker checker (v) Audit trails, program, and configuration changes of the system (vi) Restrictions and controls regarding access to the server room.</p>

		</div>
	</div>
</div></div></div></div></div></div></div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-classic vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><p>Book a free 30-minute consultation to discuss the background of your case and requirements.</p>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-inline" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-primary" href="https://riskhouse.co.ke/become-a-client/" title="Become a client">Book a consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/advisory-consulting/">Advisory &#038; Consulting</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Asset Investigations Services &#038; Recovery</title>
		<link>https://riskhouse.co.ke/service/asset-investigations-services-recovery/</link>
		
		<dc:creator><![CDATA[Michael Wainaina]]></dc:creator>
		<pubDate>Fri, 13 Jan 2023 11:20:16 +0000</pubDate>
				<guid isPermaLink="false">https://riskhouse.co.ke/?post_type=ot_service&#038;p=8742</guid>

					<description><![CDATA[<p>We have a team consisting of specialist insurance fraud investigators who can obtain all the requisite evidence that allows insurers to question an insurance claim they suspect to be fraudulent. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/asset-investigations-services-recovery/">Asset Investigations Services &#038; Recovery</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img decoding="async" width="1600" height="686" src="https://riskhouse.co.ke/wp-content/uploads/2023/01/shutterstock_1776251150-scaled.jpg" class="vc_single_image-img attachment-full" alt="" title="Asset,Management.,Business,,Technology,,Internet,And,Network,Concept.,3d,Illustration" srcset="https://riskhouse.co.ke/wp-content/uploads/2023/01/shutterstock_1776251150-scaled.jpg 1600w, https://riskhouse.co.ke/wp-content/uploads/2023/01/shutterstock_1776251150-300x129.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2023/01/shutterstock_1776251150-1024x439.jpg 1024w, https://riskhouse.co.ke/wp-content/uploads/2023/01/shutterstock_1776251150-768x329.jpg 768w, https://riskhouse.co.ke/wp-content/uploads/2023/01/shutterstock_1776251150-1536x658.jpg 1536w, https://riskhouse.co.ke/wp-content/uploads/2023/01/shutterstock_1776251150-2048x878.jpg 2048w" sizes="(max-width: 1600px) 100vw, 1600px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1673858712421" >
		<div class="wpb_wrapper">
			<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<h3><strong>Asset Investigations Services &amp; Recovery</strong></h3>
<p>Asset investigation is crucial for the successful recovery of proceeds of fraud and embezzlement. It is also through asset investigation that financiers can carry out proper due diligence in respect of assets they intend to take as security and investors can access the legitimacy of assets and ventures, they intend to invest in.</p>
<p>Asset tracing and investigation is also an important tool for creditors as it allows those who are considering instituting claims in court to ascertain unencumbered assets and obtain preservation orders against them to aid in recovery; it also aids in the enforcement of court decrees and judgments which would otherwise be hindered by lack of knowledge of the judgment debtor’s assets.</p>
<p>At Riskhouse, we combine our skills in forensic accounting, forensic investigations, financial &amp; intelligence analysis, understanding of the insolvency process, and digital investigations to perform complex analyses and identify and trace assets of the relevant subjects to satisfy our clients’ needs including; due diligence, recovery of debts and/or proceeds of fraud, enforcement of legal orders,  identification of assets for distribution in family law proceedings, money laundering, resolution of disputes and assessment of cost-benefit of instituting debt recovery claim. With our support, our clients can identify and also assume control of available assets subject to the subsisting contractual relationship with the relevant subject.</p>
<p>We through the combined expertise of our trained investigators assist our clients in ascertaining assets’ position to allow them to make an informed decision when engaging in contract negotiations, recovering debts in an aftermath of litigation, enforcing international arbitration awards, addressing complex frauds including recovery of transferred assets in insolvency-related matters and resolving contractual disputes.</p>
<p>We also assist in identifying misappropriated assets, and trace assets transferred in illegal phoenix activities as part of formal insolvency processes or in support of ongoing litigation or fraud investigations.</p>
<p>We have forensics experts that have the requisite skills to analyze financial records, bank statements, contracts, and documentation pertaining to financial transactions as well as email trails to reconstruct financial records and successfully identify any fraudulent activities by directors or stakeholders of a Company.</p>
</div>
</div>

		</div>
	</div>
</div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>The below aspects define and differentiate us;</strong><br />
We employ a variety of strategies to ensure successful recovery by integrating both physical investigative techniques and leading technology and/or digital tools;</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Individual Investigations:</strong> &#8211; We tailor our solutions and approach to suit our client’s needs to ensure optimal results;</li>
<li><strong>Cost-benefit considerations</strong> – At Risk House, we understand that our Clients need solutions that make commercial sense and that are financially beneficial to them, and in this regard, cost-benefit analysis is at the core of our solutions and approaches; and</li>
<li><strong>Total Confidentiality</strong> – We ensure that our investigations are conducted with due regard to our client’s privacy.</li>
</ul>
</li>
<li style="list-style-type: none;"></li>
</ul>
<p><strong>Our clientele includes: &#8211; </strong></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Law firms;</li>
<li>Banks and other financial institutions;</li>
<li>Transport and logistics companies;</li>
<li>Manufacturing companies; and</li>
<li>Individual clients.</li>
</ul>
</li>
</ul>
<p><strong>Our Staff and qualifications: &#8211; </strong></p>
<p>We have a multi-disciplinary team with the necessary knowledge and know-how required in asset investigations. Our forensic staff includes trained forensic accountants, asset-tracing experts, forensic technology specialists, and deep-web searchers.</p>
<p>The team, which includes a team of lawyers with experience in debt restructuring and insolvency, plays a critical role in offering practical strategies for the appropriate legal remedies available to our clients depending on their needs.</p>
<p>The strategies we employ for clients are tailored, making the best use of our depth of experience and skills in asset identification.</p>
<p>Please <a href="https://riskhouse.co.ke/become-a-client/">contact us</a> for more information about how our asset tracing team can support you to meet your asset tracing needs.</p>

		</div>
	</div>
</div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-classic vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><header class="vc_cta3-content-header">Book a free 30-minute consultation to discuss the background of your case and requirements.</header>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-inline" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-blue" href="https://riskhouse.co.ke/become-a-client/" title="Become a client">Book a consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/asset-investigations-services-recovery/">Asset Investigations Services &#038; Recovery</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Business Continuity Plan</title>
		<link>https://riskhouse.co.ke/service/business-continuity-plan/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Mon, 14 Feb 2022 12:22:25 +0000</pubDate>
				<guid isPermaLink="false">http://riskshouse.co.ke/?post_type=ot_service&#038;p=7541</guid>

					<description><![CDATA[<p>Business continuity is the capability of an organization to continue the delivery of products or services following a disruptive incident. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/business-continuity-plan/">Business Continuity Plan</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img decoding="async" width="846" height="421" src="https://riskhouse.co.ke/wp-content/uploads/2022/02/business-continuity.jpg" class="vc_single_image-img attachment-full" alt="" title="business-continuity" srcset="https://riskhouse.co.ke/wp-content/uploads/2022/02/business-continuity.jpg 846w, https://riskhouse.co.ke/wp-content/uploads/2022/02/business-continuity-300x149.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2022/02/business-continuity-768x382.jpg 768w" sizes="(max-width: 846px) 100vw, 846px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1645514349402" >
		<div class="wpb_wrapper">
			<p>Business continuity is the capability of an organization to continue the delivery of products or services following a disruptive incident. With a business continuity plan you create systems of prevention and recovery to deal with potential threats to a company. Our specialized services in relation to BCP covers the following:</p>
<p><strong>Business Continuity Plan Program assessment &#8211; </strong>companies believe that once they have a fully documented program, they are covered should an emergency hit. However, you don’t know for certain if your plans will work. At <strong>Riskhouse</strong>, we asses your BCP program by identifying whether it is continuously maintained, follows industry leading standards and complies with the laws. We come up with a Program Governance document, a technology focused Disaster Recovery Plan, Emergency Response Plans and a Crisis Communication plan.</p>
<p><strong>Security Risk Assessment – </strong>we conduct a comprehensive security assessment that includes (i) identifying assets (e.g. network, servers, applications, data centers, tools, etc.) within the organization (ii) conducting a business impact analysis to identify critical business functions and processes and the resources that support them (iii) Understanding what data is stored, transmitted, and generated in an organization (iv) Assessing asset critically regarding business operations which includes the overall impact to revenue, reputation, and the likelihood of a firm’s exploitation (v) measuring the risk ranking for assets and prioritizing them for assessment (vi) applying mitigating controls for each asset based on assessment results and (v) creating risk profiles for each asset.</p>
<p><strong>BCP Policy Review</strong> &#8211; once your organization implements a business continuity plan system and creates a business continuity plan, the work is not entirely done. <strong>Riskhouse</strong> can review your plan deed regularly and update to remain effective after proper testing.</p>
<p><strong>BCP Policy Development – </strong>we develop a business continuity plan which involves <strong>conducting a business impact analysis</strong> to identify critical business functions and processes and the resources that support them.</p>
<p><strong>BCP Monitoring</strong> – we  conduct realistic and feasible BCP that is simple, easy to perform and regularly monitored.</p>
<p><strong>BCP Trainings – </strong>we offer trainings on BCP to better understand your organization’s framework for business continuity management or disaster recovery management. Train you on disaster recovery plan and Business Continuity Plan for all systems and business processes supporting customer data. In addition, we train you on information technology business continuity and disaster recovery program for your business that includes a process for reliable backup and recovery of all data.</p>

		</div>
	</div>
</div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-classic vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><p>Book a free 30-minute consultation to discuss the background of your case and requirements.</p>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-inline" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-primary" href="https://riskhouse.co.ke/become-a-client/" title="Become a client">Book a consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/business-continuity-plan/">Business Continuity Plan</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Insurance Fraud Investigation</title>
		<link>https://riskhouse.co.ke/service/insurance-fraud-investigation/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Thu, 03 Feb 2022 08:36:18 +0000</pubDate>
				<guid isPermaLink="false">http://riskshouse.co.ke/?post_type=ot_service&#038;p=7400</guid>

					<description><![CDATA[<p>We have a team consisting of specialist insurance fraud investigators who can obtain all the requisite evidence that allows insurers to question an insurance claim they suspect to be fraudulent. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/insurance-fraud-investigation/">Insurance Fraud Investigation</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="846" height="421" src="https://riskhouse.co.ke/wp-content/uploads/2022/02/fraud-investigations-img.jpg" class="vc_single_image-img attachment-full" alt="" title="fraud-investigations-img" srcset="https://riskhouse.co.ke/wp-content/uploads/2022/02/fraud-investigations-img.jpg 846w, https://riskhouse.co.ke/wp-content/uploads/2022/02/fraud-investigations-img-300x149.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2022/02/fraud-investigations-img-768x382.jpg 768w" sizes="auto, (max-width: 846px) 100vw, 846px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1645515734321" >
		<div class="wpb_wrapper">
			<p>We have a team consisting of specialist insurance fraud investigators who are able to obtain all the requisite evidence that allows insurers to question an insurance claim they suspect to be fraudulent. Our Investigators are capable of dealing with the alleged frauds using forensic techniques, experience and methodologies that produce successful outcome for our clients.</p>
<p>We have established a proven reputation in the industry for exposing suspected insurance claims which include:</p>
<p><strong>Car accident benefits and vehicle repair claims</strong> &#8211; we conduct investigations that target staged and exaggerated accidents. We also evaluate the legitimacy of a claim and design measures to safeguard the prevalence of false and/or inflated claims.</p>
<p><strong>Car accident personal injury benefit claims</strong> &#8211; we gather sufficient evidence to help verify suspicious claims. We also confirm the circumstances of an alleged accident and the state of the alleged injuries.</p>
<p><strong>Personal injury / death claims benefits</strong> – we verify injury and death claims to authenticate their genuineness. Our team verify suspicious medical report, circumstances of the injuries and deaths as well as death notifications and certificates. We also confirm disability and restricted ability claims.</p>
<p><strong>Third-party claim investigations </strong>&#8211; our professionals in Insurance Claim Investigation services possess vast experience for exposing fraudulent applications of claims. The modus operandi of a fraud claim generally goes with the road accident/other kinds of accident in which the third person are liable to claim for the damages. We have a dedicated team of investigators who are well versed with the kinds of investigating frauds under the third-party claims</p>
<p><strong>Health and medical claims</strong> – these claims are investigated by private and public insurers. Both the practitioner and the patient can participate in fake or inflated healthcare claims, sometimes together, to line their own pockets. We carry out investigation to verify these suspicions.</p>
<p><strong>People tracker probe/trace of beneficiaries</strong> – there are a number of different scenarios where you may need to search for missing or unknown beneficiaries. You may be presented with a claim where the policy holder has named a beneficiary that is unknown to the family or you could need to find a beneficiary that relatives have lost touch with. In such scenarios, <strong>Riskhouse</strong> can assist you overcome the challenge of locating missing or unknown beneficiaries in an insurance claim.</p>
<p><strong>Retrenchments/redundancy compensation claims investigation</strong> – We confirm employment status for employees declared redundant under the life insurance cover with retrenchment benefits. We also confirm the reasons for retrenchments to prove or disapprove the compensation claims.</p>
<p><strong>Workers compensation insurance investigation</strong> – we conduct investigations incorporating a careful blend of humanity and technology. We help you ensure that suspicious injury claims do not enter the system undetected.</p>
<p><strong>Document examination</strong> – we conduct document examinations on alleged fraudulent proposal forms to systematically reveal how they were prepared or modified.</p>
<p><strong>Insurance Agent fraud &#8211; </strong>we utilize Forensic data analytics to unravel schemes by fraudulent agents.</p>

		</div>
	</div>
</div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-blue vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><p>Book a free 30-minute consultation to discuss the background of your case and requirements.</p>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-inline" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-primary" href="https://riskhouse.co.ke/become-a-client/" title="Become a client">Book a consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/insurance-fraud-investigation/">Insurance Fraud Investigation</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AML (Anti-Money Laundering) &#038; CFT (Combating Financing of Terrorism)</title>
		<link>https://riskhouse.co.ke/service/anti-money-laundering-combating-financing-of-terrorism/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Thu, 03 Feb 2022 07:24:41 +0000</pubDate>
				<guid isPermaLink="false">http://riskshouse.co.ke/?post_type=ot_service&#038;p=7394</guid>

					<description><![CDATA[<p>We are among the leaders towards assisting institutions to prevent instances of money laundering and Predicate crimes. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/anti-money-laundering-combating-financing-of-terrorism/">AML (Anti-Money Laundering) &#038; CFT (Combating Financing of Terrorism)</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="846" height="421" src="https://riskhouse.co.ke/wp-content/uploads/2022/02/aml.jpg" class="vc_single_image-img attachment-full" alt="" title="aml" srcset="https://riskhouse.co.ke/wp-content/uploads/2022/02/aml.jpg 846w, https://riskhouse.co.ke/wp-content/uploads/2022/02/aml-300x149.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2022/02/aml-768x382.jpg 768w" sizes="auto, (max-width: 846px) 100vw, 846px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1645514073813" >
		<div class="wpb_wrapper">
			<p>At <strong>Riskhouse</strong>, we examine the effectiveness of your Anti-Money Laundering/ Combating the Financing of Terrorism (AML/CFT) programs by offering the services below:</p>

		</div>
	</div>
<div class="vc_tta-container" data-vc-action="collapseAll"><div class="vc_general vc_tta vc_tta-accordion vc_tta-color-blue vc_tta-style-outline vc_tta-shape-square vc_tta-spacing-2 vc_tta-gap-3 vc_tta-controls-align-left vc_tta-o-no-fill vc_tta-o-all-clickable wpb_animate_when_almost_visible wpb_fadeIn fadeIn"><div class="vc_tta-panels-container"><div class="vc_tta-panels"><div class="vc_tta-panel vc_active" id="Health-Check-Independent-Assessments" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#Health-Check-Independent-Assessments" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">AML/CFT Health Check &amp; Independent Assessments</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644836238892" >
		<div class="wpb_wrapper">
			<p>We conduct independent reviews to assess the design and operational effectiveness of anti-money laundering and counter-terrorism financing programmes that have been developed.</p>
<p>We assist you to develop, implement and review your customer and third-party due diligence &amp; enhanced due diligence measures. Further, we design / review your internal AML/CFT framework as well as checking the controls in place to enhance reporting of suspicious transactions both internally and externally (as required by the regulator).</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="Diligence-Screening-Remediation" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#Diligence-Screening-Remediation" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">KYC Diligence, Screening &amp; Remediation</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644836267004" >
		<div class="wpb_wrapper">
			<p>KYC is an important practice in business and finance as it allows institutions to certain that their clients are not involved in money-related crimes.  We assist you in checking and screening your third parties on AML and CFT before entering into any business arrangement.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="Analytics-Monitoring-Investigations" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#Analytics-Monitoring-Investigations" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">AML/CFT Analytics, Monitoring &amp; Investigations</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644836293101" >
		<div class="wpb_wrapper">
			<p>Through our data analytics, we conduct investigations into alleged AML incidences. This process involves identifying instances that meet the AML/CFT violation from a wide range of data.</p>
<p>We further assist you in designing and reviewing your monitoring process and adequacy of the systems used for transactions monitoring.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="Training-Awareness" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#Training-Awareness" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">AML/CFT Training &amp; Awareness</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644836368931" >
		<div class="wpb_wrapper">
			<p>Our diverse team of professionals train employees in detecting money laundering activities such as depositing but not recording revenues, overstating reported revenues and expenses and also tracing illicit transactions.</p>
<p>The team assists organizations in creating Anti money laundering (AML) compliance policy and also the importance of conducting customer due diligence and or know your customer KYC. We further assist in checking on adequacy of AML/CFT Training program and conduct training on AML/CFT.</p>

		</div>
	</div>
</div></div></div></div></div></div></div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-classic vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><p>Book a free 30-minute consultation to discuss the background of your case and requirements.</p>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-inline" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-primary" href="https://riskhouse.co.ke/become-a-client/" title="Become a client">Book a consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/anti-money-laundering-combating-financing-of-terrorism/">AML (Anti-Money Laundering) &#038; CFT (Combating Financing of Terrorism)</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fraud Risk Assessments</title>
		<link>https://riskhouse.co.ke/service/fraud-risk-assessments/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Thu, 03 Feb 2022 06:51:57 +0000</pubDate>
				<guid isPermaLink="false">http://riskshouse.co.ke/?post_type=ot_service&#038;p=7390</guid>

					<description><![CDATA[<p>Dealing with complex issues of fraud, regulatory compliance and business disputes can detract from efforts to succeed. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/fraud-risk-assessments/">Fraud Risk Assessments</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="846" height="421" src="https://riskhouse.co.ke/wp-content/uploads/2022/02/risk-assesment-img.jpg" class="vc_single_image-img attachment-full" alt="" title="risk-assesment-img" srcset="https://riskhouse.co.ke/wp-content/uploads/2022/02/risk-assesment-img.jpg 846w, https://riskhouse.co.ke/wp-content/uploads/2022/02/risk-assesment-img-300x149.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2022/02/risk-assesment-img-768x382.jpg 768w" sizes="auto, (max-width: 846px) 100vw, 846px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644834939528" >
		<div class="wpb_wrapper">
			<p>Dealing with complex issues of fraud, regulatory compliance and business disputes can detract from efforts to succeed. Therefore, better management of fraud risk and compliance exposure is a critical business priority.</p>
<p>We help to Identify current and emerging risks to the company’s business and operations relating to its products and services, the public’s expectations and enforcement trends.</p>
<p>Refining risk assessments and tailoring compliance programs to help put Risk management at the heart of the organization.</p>
<p>We leverage on a customized, repeatable and cost-effective framework to address compliance risks and rapidly respond to regulatory scrutiny.</p>

		</div>
	</div>
</div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/fraud-risk-assessments/">Fraud Risk Assessments</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Anti-Bribery &#038; Anti-Corruption Assistance</title>
		<link>https://riskhouse.co.ke/service/anti-bribery-anti-corruption-assistance/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Thu, 03 Feb 2022 06:47:45 +0000</pubDate>
				<guid isPermaLink="false">http://riskshouse.co.ke/?post_type=ot_service&#038;p=7386</guid>

					<description><![CDATA[<p>Corruption and Bribery subject organizations to legal, regulatory, fines or penalties and reputational damage. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/anti-bribery-anti-corruption-assistance/">Anti-Bribery &#038; Anti-Corruption Assistance</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="846" height="421" src="https://riskhouse.co.ke/wp-content/uploads/2022/02/anti-bribery-and-corruption-banner.jpg" class="vc_single_image-img attachment-full" alt="" title="anti-bribery-and-corruption-banner" srcset="https://riskhouse.co.ke/wp-content/uploads/2022/02/anti-bribery-and-corruption-banner.jpg 846w, https://riskhouse.co.ke/wp-content/uploads/2022/02/anti-bribery-and-corruption-banner-300x149.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2022/02/anti-bribery-and-corruption-banner-768x382.jpg 768w" sizes="auto, (max-width: 846px) 100vw, 846px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644836949009" >
		<div class="wpb_wrapper">
			<p>Corruption and Bribery subject organizations to legal, regulatory, fines or penalties and reputational damage. We help our institutions spanning across multiple jurisdictions to define, assess and respond to bribery and corruption issues.</p>
<p>We support our clients with comprehensive Anti-Bribery &amp; Anti-corruption (ABAC) reviews. We conduct analysis of the existing relevant legislation, review the existing policies and procedures, conduct transactions review and verifications of third parties.</p>
<p>We also help to identify any existing gaps and provide recommendations to help clients in preventing bribery and corruption and ensuring the highest level of ethical standards and transparency in conducting business.  We also provide guidelines to organizations on how to mitigate corruption and bribery risk.</p>

		</div>
	</div>
</div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-classic vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><p>Book a free 30-minute consultation to discuss the background of your case and requirements.</p>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-inline" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-primary" href="https://riskhouse.co.ke/become-a-client/" title="Become a client">Book a consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/anti-bribery-anti-corruption-assistance/">Anti-Bribery &#038; Anti-Corruption Assistance</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Forensic Investigations</title>
		<link>https://riskhouse.co.ke/service/forensic-investigations-data-recovery/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Fri, 05 Feb 2021 09:56:35 +0000</pubDate>
				<guid isPermaLink="false">http://riskshouse.co.ke/?post_type=ot_service&#038;p=7137</guid>

					<description><![CDATA[<p>We help to detect fraud and conduct investigations into any allegations of financial fraud, financial bribery, waste, misuse and misappropriations of assets and financial resources and regulatory breaches relating to finance. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/forensic-investigations-data-recovery/">Forensic Investigations</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="846" height="421" src="https://riskhouse.co.ke/wp-content/uploads/2021/02/Forensic-Investigations-banner-2.jpg" class="vc_single_image-img attachment-full" alt="" title="Forensic-Investigations-banner-2" srcset="https://riskhouse.co.ke/wp-content/uploads/2021/02/Forensic-Investigations-banner-2.jpg 846w, https://riskhouse.co.ke/wp-content/uploads/2021/02/Forensic-Investigations-banner-2-300x149.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2021/02/Forensic-Investigations-banner-2-768x382.jpg 768w" sizes="auto, (max-width: 846px) 100vw, 846px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644832639134" >
		<div class="wpb_wrapper">
			<p>Our dedicated and experienced team of professionals help institutions to respond rapidly to identify or confirm instances of alleged fraud, bribery, other misconduct and investigating matters relating to law enforcement and regulatory inquiries.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644832666596" >
		<div class="wpb_wrapper">
			<h4>Some of the services we offer under Forensic Investigations include:</h4>

		</div>
	</div>
<div class="vc_tta-container" data-vc-action="collapseAll"><div class="vc_general vc_tta vc_tta-accordion vc_tta-color-blue vc_tta-style-outline vc_tta-shape-square vc_tta-spacing-2 vc_tta-gap-3 vc_tta-controls-align-left vc_tta-o-no-fill vc_tta-o-all-clickable wpb_animate_when_almost_visible wpb_fadeIn fadeIn"><div class="vc_tta-panels-container"><div class="vc_tta-panels"><div class="vc_tta-panel vc_active" id="digital-forensic" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#digital-forensic" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Digital Forensics</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1645525623159" >
		<div class="wpb_wrapper">
			<p>We take a comprehensive approach to managing digital investigations. Our services strictly adhere to the ACPO (Association of Chief Police Officers) and NIST (National Institute of Standards and Technology) guidelines of the handling and analysis of digital evidence. Further, our experts have experience in using some of the best industry tools and licensed forensic software. Our scope covers:</p>
<p><strong>Incident preparedness and response – </strong>We offer digital investigative services to enable organizations</p>
<ul>
<li>extract and preserve evidence from digital devices</li>
<li>analyze digital evidence using advanced forensic tools</li>
<li>recover and process evidence on the attack vectors and perpetrators</li>
<li>produce forensic reports for management and litigation purposes</li>
<li>document forensic report for the management and for record purposes</li>
<li>provide expert testimony in Courts.</li>
</ul>
<p><strong>Forensic Document Examination &#8211; </strong>We conduct forensic examination on documents to systematically reveal how they were prepared or modified. Questioned material for examination may consist of identification cards, contracts, wills, titles and deeds, seals, stamps, bank checks, handwritten correspondence, machine-generated documents (such as those from photocopiers and printers), currency and electronic documents. We have expertise and tools to undertake forensic analysis of your questionable documents.</p>
<p>Our forensic document examination covers the following:</p>
<ul>
<li>Handwriting &amp; Signature Analysis</li>
<li>Document print analysis</li>
<li>Stamp &amp; Seal Impression Analysis; Counterfeits Analysis (Documents &amp; Currency)</li>
<li>Erasure, Obliteration &amp; Alterations Analysis</li>
<li>Expert Opinion in Court of law</li>
</ul>
<p><strong>Data Recovery</strong> &#8211; <em><u>Have you lost your data</u></em><em>?</em> We can assist you recover the lost data. <em><u>Has your storage media malfunctioned and cannot access your data</u>?</em> We are enable to access your data and get you back to normal operations. <em><u>Has your computer or server operating system crashed or encountered software errors</u>?</em> We can establish the cause and recover the lost data. <em><u>Has anyone accidentally or intentionally deleted your data</u>? </em>We can recover your lost data. <em><u>When your USB flash or your computer no longer recognizes drive</u>?</em> We can give you a solution.<em> <u>Have you accidentally dropped your computer or other storage media</u></em>? We can give you a permanent solution for this.</p>
<p>Digital media storage that we can recover data from:</p>
<ul>
<li>Internal hard drives</li>
<li>Solid state drives</li>
<li>External USB hard drives</li>
<li>USB Flash disks</li>
<li>Memory cards and SD cards</li>
</ul>
<p><strong>Data Erasure Services &#8211; </strong>Formatting your computer or external hard drive does not securely delete your data. When disposing, maintaining, selling, and donating your computer assets without securely erasing the data on them, your personal or confidential information is no longer safe until proper erasing of the information is done.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="Forensic-Data-Analytics" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#Forensic-Data-Analytics" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Forensic Data Analytics</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1645525688180" >
		<div class="wpb_wrapper">
			<p>We leverage on forensic data analytics to draw insights and patterns from data which can then be used by the clients for decision making and building more resilient strategic focus areas to protect and grow business.</p>
<p>We also conduct analytics of varying data sources to uncover links, patterns and anomalies and present findings in legal proceedings.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="Financial-Forensic" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#Financial-Forensic" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Financial Forensic</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644833963197" >
		<div class="wpb_wrapper">
			<p>We help to detect fraud and conduct investigations into any allegations of financial fraud, financial bribery, waste, misuse and misappropriations of assets and financial resources and regulatory breaches relating to finance.</p>
<p>Incase of any reported financial irregularities, we are able to determine facts quickly and accurately. We investigate matters relating to:</p>
<ul>
<li>Fraudulent financial statements and other accounting frauds;</li>
<li>Potentially fraudulent payments;</li>
<li>Revenue related irregularities such as revenue overstatement or understatement;</li>
<li>Asset misappropriations;</li>
<li>Incidents of corruption such as conflict of interest, bribery, illegal gratuities and economic extortions;</li>
<li>Matters involving fraudulent disbursements, cash larceny and skimming; and</li>
<li>Inventory frauds.</li>
</ul>
<p>We conduct Financial Forensics through;</p>
<ul>
<li>allegations identification &amp; confirmation</li>
<li>conducting analysis of existing data, information and records</li>
<li>gathering and preserving evidence</li>
<li>conducting interviews</li>
<li>reporting on the findings of our forensic investigations</li>
<li>providing recommendation for future improvement and</li>
<li>providing support in case of litigation.</li>
</ul>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="cyber-security-solution" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#cyber-security-solution" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Cyber Security Solution</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1645525794428" >
		<div class="wpb_wrapper">
			<p>We offer the following services to our clients:</p>
<p><strong>Vulnerability Assessment &#8211; </strong>We evaluate if your system is susceptible to any known vulnerabilities, assign severity levels to those vulnerabilities, and recommend remediation or mitigation, if and whenever needed.</p>
<p><strong>Penetration Testing</strong> &#8211; We assist in conducting Ethical hacking into the system. This entails the intentional launching of simulated cyberattacks that seek out exploitable vulnerabilities in your computer systems, networks, websites, and applications. Through the process, we seek to provide you with the deep solution to fix the vulnerabilities identified within your system.</p>
<p><strong>Business Continuity Planning &#8211; </strong>Most organizations cannot oversee or predict some of the security challenges awaiting. We provide a detailed plan and strategy on how business operations can be maintained for both short-term and long-term outages.</p>
<p><strong>Disaster Management planning (DRP) &#8211; </strong>Disaster is unplanned incident which organizations cannot control. We are here to assist organization resolve data loss and recover system functionality to enable it to perform in the aftermath of an incident.</p>
<p><strong>IT roadmap Assessment &#8211; </strong>We develop and implement a strategic guide that can help your organization to understand system security challenges and manage cyber risks.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="system-security-audit" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#system-security-audit" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">System Security Audit</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1645525897096" >
		<div class="wpb_wrapper">
			<p>Among other system audits, we conduct the following:</p>
<p><strong>IT governance Review &#8211; </strong>We ensure the IT processes are effective and efficient to enable an organization to achieve its goals. We review maturity of IT governance in relation to top management involvement in making the ICT decisions.</p>
<p><strong>System application review</strong> &#8211; Through our detailed system application-level review, we assist to identify the key controls that are critical for the functioning of the system at application level and provide recommendations that will enhance system security and ensure seamless business continuity.</p>
<p><strong>Database Administration Review</strong> &#8211; We seek to help towards establishing whether adequate controls are in place.  Among others, this controls include (i) User access controls (ii) Administrative access controls (iii) Audit logging (iv) Authentications and verification (v) Maintenance and monitoring (vi) Back up and (vii) Data restoration Test. Our review focuses on identifying key areas of weaknesses and providing recommendations to enhance controls.</p>
<p><strong>System Post-Implementation Review</strong> &#8211; We provide a systematic and designed approach to evaluate whether the system implementation objectives were met. We also determine how effectively and comprehensively the system implementation was conducted.</p>
<p><strong>System security maturity assessment and Management &#8211; </strong>We Test the system security model and check whether different system development stages are met. The following are the models;(i) Scanning the system (ii) Managed Assessment and Compliance (iii) Formalized Analysis and Prioritization (iv) Attack Focused Management (v) Optimization.</p>
<p><strong>IT General Controls Review &#8211; </strong>Our team of experts will assist you in reviewing general IT controls which includes (i) Application security (ii) Privilege access (iii) User identification and verification (iv) System users’ rights, role matrix and maker checker (v) Audit trails, program, and configuration changes of the system (vi) Restrictions and controls regarding access to the server room.</p>

		</div>
	</div>
</div></div></div></div></div></div></div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-classic vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><p>Book a free 30-minute consultation to discuss the background of your case and requirements.</p>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-inline" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-blue" href="https://riskhouse.co.ke/become-a-client/" title="">Book a consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/forensic-investigations-data-recovery/">Forensic Investigations</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Intellectual Property Rights &#038; Infringement Investigations</title>
		<link>https://riskhouse.co.ke/service/intellectual-property-rights-infringement-investigations/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Tue, 26 Mar 2019 09:57:26 +0000</pubDate>
				<guid isPermaLink="false">http://localhost/consultax/?post_type=ot_service&#038;p=1427</guid>

					<description><![CDATA[<p>We protect the integrity and efforts of our commercial, corporate, and small business clients that hold intellectual property rights. </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/intellectual-property-rights-infringement-investigations/">Intellectual Property Rights &#038; Infringement Investigations</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="770" height="423" src="https://riskhouse.co.ke/wp-content/uploads/2019/03/copyright-infrignemnt.jpg" class="vc_single_image-img attachment-full" alt="" title="copyright-infrignemnt" srcset="https://riskhouse.co.ke/wp-content/uploads/2019/03/copyright-infrignemnt.jpg 770w, https://riskhouse.co.ke/wp-content/uploads/2019/03/copyright-infrignemnt-300x165.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2019/03/copyright-infrignemnt-768x422.jpg 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644837069164" >
		<div class="wpb_wrapper">
			<p>We protect the integrity and efforts of our commercial, corporate, and small business clients that hold intellectual property rights. Our resources, both human and technical allow us to approach every investigation under the premise that we will provide our clients with fact based conclusive findings that enable them to protect their interests.</p>

		</div>
	</div>

	<div class="wpb_text_column wpb_content_element  wpb_animate_when_almost_visible wpb_fadeIn fadeIn vc_custom_1644837085824" >
		<div class="wpb_wrapper">
			<p>Our specialized services in relation to intellectual property protection covers the following:</p>

		</div>
	</div>
<div class="vc_tta-container" data-vc-action="collapseAll"><div class="vc_general vc_tta vc_tta-accordion vc_tta-color-blue vc_tta-style-outline vc_tta-shape-square vc_tta-spacing-2 vc_tta-gap-3 vc_tta-controls-align-left vc_tta-o-no-fill vc_tta-o-all-clickable wpb_animate_when_almost_visible wpb_fadeIn fadeIn"><div class="vc_tta-panels-container"><div class="vc_tta-panels"><div class="vc_tta-panel vc_active" id="Trademark" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#Trademark" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Trademark, copyright, patent and design infringement investigations</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  vc_custom_1644837106288" >
		<div class="wpb_wrapper">
			<p style="text-align: justify;">We gather evidence in relation to breaches of intellectual property rights. We have a team of experts that conduct investigations on passing off, use of deceptively similar and substantially identical trademarks and use of offending logos and devices.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="anti-counterfeit" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#anti-counterfeit" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Anti-Counterfeit Investigations</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  vc_custom_1644837172452" >
		<div class="wpb_wrapper">
			<p>We conduct investigations that target several product counterfeiters. We have been engaged by our clients to participate in execution of orders for seizures and impoundment of tons of counterfeit goods worth millions of shillings.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="illegal_import" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#illegal_import" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Illegal Import Investigations</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  vc_custom_1644837191850" >
		<div class="wpb_wrapper">
			<p style="text-align: justify;">We take cognizant of importers of illegal goods who would sell anything to make a profit in utter disregard to consumer safety and the law.  We carry out investigations for government bodies and private companies by identifying the supply chain, gather evidence to expose the illegal importers and trap purchase to obtain samples to use as evidence.</p>

		</div>
	</div>
</div></div><div class="vc_tta-panel" id="parallel_import" data-vc-content=".vc_tta-panel-body"><div class="vc_tta-panel-heading"><h4 class="vc_tta-panel-title vc_tta-controls-icon-position-left"><a href="#parallel_import" data-vc-accordion data-vc-container=".vc_tta-container"><span class="vc_tta-title-text">Parallel Import Investigations</span><i class="vc_tta-controls-icon vc_tta-controls-icon-chevron"></i></a></h4></div><div class="vc_tta-panel-body">
	<div class="wpb_text_column wpb_content_element  vc_custom_1645515945736" >
		<div class="wpb_wrapper">
			<p style="text-align: justify;">Parallel imports, commonly referred to as “grey goods” are often genuine products that have been brought into a market by a rights holder in one territory and subsequently sold to a third party in a different territory without the consent of the original rights holder.</p>
<p style="text-align: justify;">At <strong>Riskhouse</strong>, we identify the chain from the seller to the reseller.</p>

		</div>
	</div>
</div></div></div></div></div></div></div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-classic vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><p style="text-align: left;">Book a free 30-minute consultation to discuss the background of your case and requirements.</p>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-left" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-primary" href="https://riskhouse.co.ke/become-a-client/" title="Become a client">Book a Consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/intellectual-property-rights-infringement-investigations/">Intellectual Property Rights &#038; Infringement Investigations</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Litigation Support &#038; Research</title>
		<link>https://riskhouse.co.ke/service/litigation-support/</link>
		
		<dc:creator><![CDATA[riskshouse]]></dc:creator>
		<pubDate>Tue, 26 Mar 2019 09:57:04 +0000</pubDate>
				<guid isPermaLink="false">http://localhost/consultax/?post_type=ot_service&#038;p=1426</guid>

					<description><![CDATA[<p>We provide independent, unbiased, robust expert testimony and opinion on a wide range of specialized matters.  </p>
<p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/litigation-support/">Litigation Support &#038; Research</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="wpb-content-wrapper"><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img loading="lazy" decoding="async" width="846" height="421" src="https://riskhouse.co.ke/wp-content/uploads/2019/03/litigation-banner.jpg" class="vc_single_image-img attachment-full" alt="" title="litigation-banner" srcset="https://riskhouse.co.ke/wp-content/uploads/2019/03/litigation-banner.jpg 846w, https://riskhouse.co.ke/wp-content/uploads/2019/03/litigation-banner-300x149.jpg 300w, https://riskhouse.co.ke/wp-content/uploads/2019/03/litigation-banner-768x382.jpg 768w" sizes="auto, (max-width: 846px) 100vw, 846px" /></div>
		</figure>
	</div>

	<div class="wpb_text_column wpb_content_element  vc_custom_1644845442514" >
		<div class="wpb_wrapper">
			<p>We provide independent, unbiased, robust expert testimony and opinion on a wide range of specialized matters.  We assist legal counsels or advocates in research and coloration of requisite evidence or documentation in relation to commercial disputes, shareholders’ disputes, employment disputes, property disputes, accident and personal injuries claims.</p>
<p><strong>Court process service</strong> &#8211; we assist with hand-to-hand services of individuals who are attempting to avoid service. As part of the Due Process of Law, it is important that if action is taken against a person in the Court of law, they must be notified. Our Process Servers provide the necessary legal documents so that a person is fully informed (most often delivered by hand).</p>

		</div>
	</div>
</div></div></div></div></div></section><section class="wpb_row vc_row-fluid"><div class="container"><div class="vc_row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><section class="vc_cta3-container"><div class="vc_general vc_cta3 vc_cta3-style-classic vc_cta3-shape-rounded vc_cta3-align-left vc_cta3-color-classic vc_cta3-icon-size-md vc_cta3-actions-bottom"><div class="vc_cta3_content-container"><div class="vc_cta3-content"><header class="vc_cta3-content-header"><h2>We are here to help you.</h2></header><p>Book a free 30-minute consultation to discuss the background of your case and requirements.</p>
</div><div class="vc_cta3-actions"><div class="vc_btn3-container vc_btn3-left" ><a class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-color-primary" href="https://riskhouse.co.ke/become-a-client/" title="Become a client">Book a consultation</a></div></div></div></div></section></div></div></div></div></div></section>
</section><p>The post <a rel="nofollow" href="https://riskhouse.co.ke/service/litigation-support/">Litigation Support &#038; Research</a> appeared first on <a rel="nofollow" href="https://riskhouse.co.ke">Riskhouse International Limited</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
