Fraud & Abuse

Share

A fraudster will often attempt to change a legitimate vendor's payment information in the following ways: The fraudster impersonates a vendor. The fraudster uses the vendor's e-mail address… Read More
On Friday, July 31st, from 12 p.m. to 1 p.m., IOFM conducted a Community Call with Financial Operations professionals to discuss best practices for mitigating the risk of fraudsters from inside and… Read More
Q. We are having a challenge finding what's best practice to verify that the information entered… Read More
Q. My supervisor asked me to check with the Advisory Panelists to see if anyone has any… Read More
Fraudulent activities are rooted in the ability of bad actors to gain unauthorized access to funds by circumventing weak financial controls, points out Michael Volkov, CEO of the Volkov Law Group… Read More
It is every American’s civil duty to keep cash out of the hands of criminals (including fraudsters) and terrorists, and people who work in accounts payable departments have an even greater… Read More
Q. What are best practices to validate vendor ACH information? There are cases where hackers will… Read More
On Monday, June 8th, from 12 p.m. to 1 p.m., IOFM conducted a Community Call with Financial Operations professionals in the Healthcare Industry. The Zoom call was moderated by IOFM's Executive Editor… Read More
Q. What best practice standards should be used to set up a new vendor or update an existing vendor… Read More
Q. Have any of you received altered PDF invoices as a method for attempting fraud? If so, would… Read More

Subscribe to our Monthly Insider

You may unsubscribe from our mailing list at any time. Diversified Communications | 121 Free Street, Portland, ME 04101 | +1 207-842-5500