Additional Information
When it comes to beating cyber criminals:
- Do not take shortcuts on processes that are in place to confirm the identity of approved and existing vendors.
- When employees are involved with the transfer of funds, employees should always take the extra step of verifying that the request is legitimate by making a phone call to verify a request.
- The phone call should not be to a phone number provided in an email request, since fraudsters will likely substitute a phony number, but to a phone number the company already has on file.