TrainingBriefs® Cybersecurity & Fraudulent Payments
TrainingBriefs® Course ID: 3278

TrainingBriefs® Cybersecurity & Fraudulent Payments

NEW

Preventing Cybersecurity Breaches (Payments)

Cybersecurity policies and procedures set clear expectations for how an organization protects its systems, data, and users from digital threats. They define required behaviors, roles, and safeguards, and provide step-by-step guidance for preventing incidents and responding effectively when issues arise. They specifically help prevent costly fraudulent payments.

Additional Information

Cybersecurity policies and procedures establish clear rules and steps to protect an organization’s data and systems - especially when it comes to fraudulent payments. Following them ensures consistency, reduces risk, and prevents mistakes.

  • Do not take shortcuts on processes that are in place to confirm the identity of approved and existing vendors.
  • When employees are involved with the transfer of funds, employees should always take the extra step of verifying that the request is legitimate by making a phone call to verify a request.
  • The phone call should not be to a phone number provided in an email request, since fraudsters will likely substitute a phony number, but to a phone number the company already has on file.

Related Programs & Training Ideas

Category & Details

Also Available as

Competencies

  • Developing Critical Work Skills
  • Managing Risk

Learning Objectives

  • Understand how not following verification procedures can end up in costly fraudulent payments.
  • Learn the importance of scrutinizing all inbound email requests (specifically for payment requests).

Interactivity

  • Audible Narration
  • Integrated Video
  • Interactions and Activities
  • Post-Assessment

Share This Page