Power Hour Optometry Podcast Summary
Episode Title:
"$4.8M Stolen by a Trusted Employee | How Fraud Could Happen in Your Practice & What to Look For"
Release Date:
March 13, 2026
Main Theme
This episode features a candid and eye-opening conversation between host Eugene Shotsman and guest Mick Hall, a respected optometry practice owner, about large-scale employee fraud. With striking transparency, Mick recounts discovering a $4.8 million embezzlement carried out by his most trusted accounting manager. The discussion covers how the theft was detected, patterns of employee dishonesty, vulnerabilities in practice management, practical prevention strategies, and the emotional and professional fallout of such a betrayal.
Key Discussion Points & Insights
1. The Shocking Discovery
- Introduction of the story: Mick Hall shares that in 2024 his accounting manager—employed for nine years—was discovered to have stolen nearly $5 million from his optometry business. The theft escalated over the last few years of her employment. (02:46–04:12)
- Scope of the fraud: $4.8M stolen, 16 criminal charges filed, including involvement from the FBI and IRS. (03:02)
Notable Quote:
"She started stealing almost immediately. It was relatively small amounts. I think, like a lot of thieves do, it’s test what you can get away with." — Mick Hall (03:35)
2. How the Embezzlement Was Detected
- Initial suspicion: During a Juneteenth accounting review, Mick noticed inconsistencies in the 'cash on hand' figure between accountant records and the bank. On inspection, the bank statements provided were expertly forged using Adobe Acrobat Pro. (05:25–11:46)
- Verification step: Visiting the bank, he immediately learned the documents were altered PDFs. (08:36–10:42)
- First evidence: Reviewing three years of ACH transaction records, he found multiple transactions to the employee and her husband’s accounts. (11:46–13:30)
- Immediate action: Upon confronting the employee with evidence, she admitted to the forgery, and was terminated swiftly to prevent further damage or evidence destruction. (13:37–15:30)
- Authorities involved: Local police initially; then the FBI and IRS. (16:18)
Memorable Moment:
"She tried to say they were just mistakes... then she knew that I knew." — Mick Hall, on confronting the employee (14:35)
3. Investigative Process and Methods of Theft
- Three-pronged investigation: Internal, forensic accountants, and federal authorities. (17:54)
- Overview of theft mechanisms:
- ACH payments—employee initiated payments to herself/husband masked as vendors.
- Forged checks—using signature stamps intended only for refunds.
- Credit card fraud—charges to a fictitious company (owned by the perpetrator), creative expense inflation, unauthorized use of company cards for personal gambling and expenses.
- Manipulation of original documents to hide fraudulent payouts. (20:54–24:55)
Notable Quote:
"This person or the accounting manager had access to all of the credit card numbers... She was also the person that would reconcile the bills." — Mick Hall (22:40)
- Advanced manipulation: Use of ACH 'pulls' (initiated from the vendor side) rather than 'pushes' (originating from the bank), allowing the bypassing of dual-control security measures. (24:57–27:59)
- Document falsification: Bank statements were expertly altered to match fraudulent records. (08:36–10:42)
4. Reflections and Statistics on Employee Theft
- Prevalence of embezzlement:
- 64% of small businesses experience it; only 16% report it.
- Barriers to reporting: embarrassment, cost of forensic accounting, fear of publicity, judicial system inefficiencies. (36:05)
- Insurance: Employee theft insurance and the arduous process of financial recovery. (39:56)
Notable Quote:
"Is it embarrassing? Hell yeah, it's embarrassing. ... I hope there's somebody out there who goes and checks that credit card, goes and looks for those ACH pulls..." — Mick Hall (37:58)
5. Warning Signs and Practice Vulnerabilities
- Information silos: Thieves typically isolate themselves, limiting who accesses sensitive data ("information siloing"). (38:53–45:04)
- Weak onboarding/background check gaps: The perpetrator had a prior conviction under a previous name, which was missed. (43:44)
- Process weaknesses:
- Overlapping responsibilities (bill paying and reconciliation handled by one person).
- Lack of direct owner or third-party oversight of documents.
- Small teams not using outside bookkeepers or auditors. (47:10)
Actionable Strategies:
- Mandate that original documents/statements are sent to multiple parties (owner + bookkeeper).
- Consider outside bookkeepers or accountants, even for small practices.
- Transparency: Ensure more than one person reviews financial documents. (48:34–49:20)
- For larger practices, annual independent audits. (51:45)
6. Types of Theft Beyond Cash/Funds
- Inventory shrinkage: Employees stealing physical goods (e.g., sunglasses, frames).
- Deposit manipulation: “Borrowing” cash deposits and returning after payday.
- Example: Polygraphing staff after missing deposit—everyone confessed some level of theft. (53:59–55:44)
- Refund fraud: Processing refunds or returns to personal accounts or credit cards rather than the patient/customer. (57:18–58:26)
- Inventory diversion: Employees opening competing stores with stolen stock. (58:49–59:39)
Notable Quote:
"If you are in business long enough, you’re going to have people who steal from you. It is just a matter of fact." — Mick Hall (60:07)
7. Lessons Learned & Recommendations
- Transparency and Data Sharing
- Share original statements and documents with at least one other trusted person (owner or third-party).
- Never allow a single individual to manage and reconcile all finances.
- Frequent, direct financial reviews by ownership.
- Tight controls on refund processes and cash handling.
- Careful, comprehensive background checks that include all previous names of employees.
- Create a work environment where open discussion of “bad actors” or incidents is normalized for industry-wide learning.
- Maintain robust employee theft insurance.
Notable Quote:
"The team needs the information. Not an individual needs the information." — Mick Hall (45:04)
8. Aftermath and Broader Impact
- The employee, before working at Mick’s company, had a prior embezzlement conviction under another name.
- After termination, she obtained employment elsewhere and allegedly repeated the crimes.
- Cases of internal theft and embezzlement are likely dramatically underreported in eye care and other small business sectors.
Notable Moment & Reflection:
“If it can happen to somebody as big as us, it can happen to somebody smaller. And do all you can to protect yourself.” — Mick Hall (63:27)
Timestamps for Important Segments
- 02:46 — The initial revelation of theft
- 05:25 — How the theft was first suspected
- 08:36 — Discovering altered documents
- 13:37 — The confrontation with the employee
- 17:54 — Describing the parallel investigations
- 24:57 — Explanation of ACH push vs. pull and their vulnerabilities
- 36:05 — Statistics on prevalence of embezzlement
- 43:44 — How background checks missed prior convictions
- 45:04 — Importance of transparency and team over individuals
- 53:59 — Inventory and cash deposit theft stories
- 57:18 — Refund fraud example
- 63:27 — Final lessons learned and call to action
Memorable Quotes
- "It's going to make you a little bit uncomfortable. And honestly, I kind of think it's a good thing, because... protecting your business is part of leading it." — Eugene Shotsman (01:18)
- "If you are in business long enough, you're going to have people who steal from you. It is just a matter of fact." — Mick Hall (60:07)
- "She had used one of the credit cards on an online Hong Kong gambling site... they were charging this card up to 300 times a day." — Mick Hall (24:55)
- "The interesting thing is whether this lady was doing it... you could tell that she gave it some aforethought. It's going to look odd if it's a particular amount of money, like 25,000 or 15,000. It was always more like $14,848.92..." — Mick Hall (30:39)
- "There’s nothing like the mind of a thief. ... If you are in business long enough, you’re going to have people who steal from you." — Mick Hall (59:39)
Summary & Final Takeaways
This episode is an essential listen for any practice owner or business leader. Through Mick Hall’s painful but frank account of his business’s massive embezzlement experience, listeners gain a rare inside look at the realities of occupational fraud. The story serves as a wake-up call for implementing transparency, regular financial audits, and tighter process controls regardless of size or trust in current staff. Mick emphasizes that fraud doesn’t just happen to poorly run organizations—sometimes, it occurs precisely because of trust and lack of vigilance.
Final message:
If it can happen to the best, it can happen to anyone—review your statements, question anomalies, eliminate information silos, and regularly verify your business’s financial health.
For more resources and learning tools, visit PowerPractice.com.
Note: All timestamps reference MM:SS as per the published podcast transcript. Quotes are attributed by speaker and location within the episode for further reference.
