3 timeless tips to reduce corporate payments fraud

January 03, 2022

With the right tools and mindset, you can protect your data and money from payments fraud attempts.

 

Here’s a scenario that might sound familiar: An employee receives an email, supposedly from your organization’s CFO, requesting a large financial transfer in advance of a merger. The details are scant, and the email requests funds through a newer payment solution with faster clearing times (such as Real Time Payments or Same Day ACH). Since the email looks legitimate, the employee doesn’t raise any immediate concerns.

A day later, the company discovers that this “CFO” was a scammer, and the payment cleared with less chance of revocability.

It doesn’t need to end this way.

You have the power to protect your organization from emerging payments fraud. With the right combination of tracking tools and education, you can stay ahead of the increasingly sophisticated cybercrime industry.

The technologies for moving money may change, but the best practices for protecting your organization remain. Here is how you can take charge of payments fraud protection:

 

Ensure dual approval verification practices

No matter which solutions you choose, you must be confident that the people on the other end of your transactions are the rightful recipients. Fraud — both external and internal — can occur in any transaction, but the increased speed of modern payment solutions often means less time to catch fraudulent requests.

Fraud risk affects both payers and payees, in financial and non-financial terms. Even if payments are revocable (with some modern payment options), fraudsters might empty the recipient accounts before a revocation attempt. Reputational risks can also arise in these cases.

Banking partners and modern payment providers have measures in place to prevent and mitigate losses, but the burden to build verification best practices falls to organizations that choose to use the payments method. And most of the platform-specific fraud risks trace back to the goal of ensuring payer/payee account authenticity.

 

Review your tech infrastructure and security patches

Even the best-laid plans won’t succeed if your IT infrastructure falls behind on security updates. As new real-time payment options arise, those back-end systems must adjust to handle new venues for malware and spyware to infiltrate.

Consider the following short-term steps to shore up your back-end security:

  • Ensure all systems are current with security updates and anti-virus software
  • Review password policies for best practices in security
  • Expand multi-factor authentication processes, including the use of security tokens and biometric authentication
  • Validate any request to add or update customer information
     

Combating these risks may require your organization to refresh more traditional fraud prevention infrastructure and practices.

 

Limit the number of users for each type of transaction, but train everyone

Even if some of your employees are multifaceted in their skillsets, it’s best practice to allow as few hands as possible on a transaction. Just from a security standpoint, a large user base increases the chance of human error and adds more touch points for scammers to target.

This doesn’t mean that the rest of your team should be kept in the dark. Effective fraud protection rests largely on an educated and informed workforce. Here are a few lessons that you’ll need to solidify among your payments management team:

  • Segregate duties between payment types (check, wire, ACH, etc.)
  • Reinforce Business Email Compromise risk best practices, which can include how employees open emails, click on links and reply to emails
     

While no single control or set of controls will prevent your organization from being a target, we suggest these five tips to prevent your organization from falling victim to BEC:

  1. Confirm and verify email requests for fund transfers
  2. Use dual control for money movement activities
  3. Use multi-factor authentication for web-based email accounts
  4. Communicate quickly when fraud or security events occur
  5. Evaluate staff compliance with internal controls by using real-world security awareness testing
     

Cyber-fraudsters are smart, sophisticated, and they can steal your customer data and money if you’re not careful. Tools to combat these risks are readily available, and the opportunity to strengthen your payments process lies within your organization.

 

If you need further help identifying these risks or would like more information on how U.S. Bank protects customers, contact your relationship manager.

Related content

Liquidity management: A renewed focus for European funds

Cryptocurrency custody 6 frequently asked questions

3 tips to maintain flexibility in supply chain management

How to choose the right custodian for your managed assets

5 questions you should ask your custodian about outsourcing

The benefits of a full-service warehouse custodian

Insource or outsource? 10 considerations

10 ways a global custodian can support your growth

Webinar: Cash management strategies for higher education

Solutions banks can offer during the COVID-19 pandemic

Post-pandemic fraud prevention lessons for local governments

Authenticating cardholder data reduce e-commerce fraud

Webinar: Robotic process automation

Webinar: Digitize your AP processes to optimize results

Hospitals face cybersecurity risks in surprising new ways

Webinar: Empower your AP automation with strategic intelligence

Proactive ways to fight vendor fraud

Tactical Treasury: Fraud prevention is a never-ending task

Risk management strategies for foreign exchange hedging

5 Ways to protect your government agency from payment fraud

4 tips for protecting your business against Coronavirus-related scams

The cyber insurance question: Additional protection beyond prevention

Protecting your business from fraud

The latest on cybersecurity: Vulnerability testing and third-party software

The latest on cybersecurity: Mobile fraud and privacy concerns

Avoiding the pitfalls of warehouse lending

Fight the battle against payments fraud

Fraud prevention checklist

5 steps you should take after a major data breach

Cybercrisis management: Are you ready to respond?

The password: Enhancing security and usability

Why KYC — for organizations

How to improve your business network security

Cybersecurity – Protecting client data through industry best practices

BEC: Recognize a scam

Higher education strategies for e-payment migration, fighting fraud

Webinar: Approaching international payment strategies in today’s unpredictable markets.

White Castle optimizes payment transactions

Webinar: A closer look at U.S. Bank AP Optimizer

How to improve digital payments security for your health system

Increase working capital with Commercial Card Optimization

Automate accounts payable to optimize revenue and payments

5 winning strategies for managing liquidity in volatile times

The surprising truth about corporate cards

The future of financial leadership: More strategy, fewer spreadsheets

Protecting cash balances with sweep vehicles

3 timeless tips to reduce corporate payments fraud

Alternative investments: How to track returns and meet your goals

Manufacturing: 6 supply chain optimization strategies

Webinar: CRE Digital Transformation – Balancing Digitization with cybersecurity risk

Webinar: Fraud prevention and mitigation for government agencies

Small business growth: 6 strategies for scaling your business

Healthcare marketing: How to promote your medical practice

How to keep your assets safe

4 strategies for coping with market volatility

Learn to spot and protect yourself from common student scams

Webinar: How to fight off fraud

Keep your finances safe and secure: Essential tips for preventing check fraud

Webinar: How to stay safe from cyberfraud

How to spot an online scam

What is financial fraud?

4 ways to outsmart your smart device

Learn how to spot scams related to COVID-19

Dear Money Mentor: What is cryptocurrency?

Money muling 101: Recognizing and avoiding this increasingly common scam

How-to guide: What to do if your identity is stolen

How you can prevent identity theft

The mobile app to download before summer vacation

Webinar: Mobile banking tips for smarter and safer online banking

Start of disclosure content

Loan approval is subject to credit approval and program guidelines. Not all loan programs are available in all states for all loan amounts. Interest rate and program terms are subject to change without notice. Mortgage, home equity and credit products are offered by U.S. Bank National Association. Deposit products are offered by U.S. Bank National Association. Member FDIC.