Fraud & Abuse

Share

Q. My Treasury Manager attended a webinar for her treasury certification and they mentioned giving… Read More
Q. My husband was asked to complete a job for a new client, who promised to pay half up front and… Read More
Q. With the pandemic situation and remote work, we hear that fraudsters have been proliferating… Read More
A fraudster will often attempt to change a legitimate vendor's payment information in the following ways: The fraudster impersonates a vendor. The fraudster uses the vendor's e-mail address… Read More
On Friday, July 31st, from 12 p.m. to 1 p.m., IOFM conducted a Community Call with Financial Operations professionals to discuss best practices for mitigating the risk of fraudsters from inside and… Read More
Q. We are having a challenge finding what's best practice to verify that the information entered… Read More
Q. My supervisor asked me to check with the Advisory Panelists to see if anyone has any… Read More
Fraudulent activities are rooted in the ability of bad actors to gain unauthorized access to funds by circumventing weak financial controls, points out Michael Volkov, CEO of the Volkov Law Group… Read More
It is every American’s civil duty to keep cash out of the hands of criminals (including fraudsters) and terrorists, and people who work in accounts payable departments have an even greater… Read More
Q. What are best practices to validate vendor ACH information? There are cases where hackers will… Read More

Subscribe to our Monthly Insider

You may unsubscribe from our mailing list at any time. Diversified Communications | 121 Free Street, Portland, ME 04101 | +1 207-842-5500