Fraud Prevention for AP and AR

Share

Fraud is an ever present threat for AP and AR practitioners. The pages in this section will help you take appropriate steps to prevent fraud - or, understand what to do if you think you are the victim.

Best_Practices_for_Elevating_Your_Accounts_Payable_Internal_Controls_&_Compliance_ProgramAs a foundational corporate transactional function, accounts payable establishes the integrity of the supplier master file within the Procure to Pay (P2P) process and ensures accuracy of this

Read More

Security directors already have a full plate of concerns related to international security risks, but you need to add another, warns James Clapper Jr., Director of National Intelligence. Clapper told

Read More

Contrary to conventional wisdom, the great majority of cyber attacks do not have a large impact on corporations, according to Dr. Gordon and Dr. Loeb, authors of Managing Cybersecurity Resources: A

Read More

Physical security failures are at least partly to blame for why federal officials are ramping up enforcement of current regulations and proposing to strengthen existing medical privacy and security

Read More

Few security programs have become as universally implemented as employment screening. In a new survey of employers of all sizes and industries, 94 percent says they have a background investigations

Read More

Companies are overlooking the very real vulnerability of cell phone call interceptions, according to a survey released in December. And it’s not the only security hole that companies often neglect

Read More

In today’s “hyperconnected” global business environment, cybersecurity has emerged as a major compliance challenge for controllers and other corporate leaders. Whether it’s the risk of a data

Read More

Cyber and breach insurance coverage has become a critical security best practice for many companies. The good news is that the cost of such coverage—not long ago an exotic specialty product—has

Read More

Cyber thieves are growing ever more sophisticated in breaching company defenses, including by exploiting employees' legitimate use of social media in today's wired business world. For controllers, a

Read More

Of 300 security executives included in a SDR survey, only about half said their organizations have specifically addressed social media in computer use policies (see the figure below). But there are

Read More

Subscribe to our Monthly Insider

You may unsubscribe from our mailing list at any time. Diversified Communications | 121 Free Street, Portland, ME 04101 | +1 207-842-5500