Additional Information
Cybersecurity policies and procedures establish clear rules and steps to protect an organization’s data and systems - especially when it comes to fraudulent payments. Following them ensures consistency, reduces risk, and prevents mistakes.
- Do not take shortcuts on processes that are in place to confirm the identity of approved and existing vendors.
- When employees are involved with the transfer of funds, employees should always take the extra step of verifying that the request is legitimate by making a phone call to verify a request.
- The phone call should not be to a phone number provided in an email request, since fraudsters will likely substitute a phony number, but to a phone number the company already has on file.