Fraudsters ignore laws! That much is clear. But what about definitions, distinctions, and standards? Probably similar.
I wonder, is it primarily about defining every incident perfectly when it comes to preventing these cases? In other words, is it essential for raising employee awareness whether the uncovered fraud case of Martin Meng at konfidal is identity theft or just the presentation of false information?
In my opinion, it’s much more important that employees are well-informed about the considerable criminal effort that goes into these deceptions and are educated on the scenarios currently circulating.
(Editorial note: Permission to reprint has been granted.)
The people who process hundreds of transactions daily also need support in verifying authenticity.
We know two-factor authentication (2FA) from passwords as a security method where two different and independent components are required to confirm a person’s identity.
In the Purchase to Pay procurement process, this can be easily applied to verifying the existence of suppliers, purchase orders, or recorded goods receipts during the invoice entry process.
But what about invoices without purchase orders?
Process guidelines often prohibit such transactions, but in reality, there are many reasons and exceptions. And it’s precisely these exceptions that fraudsters exploit.
Therefore, for such cases, similar to two-factor authentication, consideration should be given to what measures can be implemented to ensure the integrity of senders or payment recipients.
A relatively simple verification step: checking the bank account details.
For example, just look it up on the respective authority’s website or ask the known contact at the business partner’s office.
Is that enough? Certainly not!
What exactly is needed should be individually defined for each company or department. But it doesn’t always have to be complicated or elaborate; it should be practical.
Currently, I am deeply involved with CEO fraud, a scam that involves identity theft. While considering prevention measures, I keep noticing that these verification methods also protect against other types of fraud, regardless of whether the "boss" calls or the tax office writes.
If you're interested, feel free to check out the CEO Fraud Blog.
Transform data into EBIT, prevent fraud, and boost profitability with our tailored Data & Analytics and IT coaching. We help optimize and secure your business processes and IT systems.
No comments yet
What do you think?