How to protect your business against the most common threats
At Ebury we’re always looking for tips on how to keep your business and your money safe. APP fraud and data theft are recurring fraud trends to look out for and protect your business against. We'd like to share some insight and tips on how to protect yourself against this threat.
In The News
At Ebury we’re always looking for tips on how to keep your business and your money safe. APP fraud and data theft are recurring fraud trends to look out for and protect your business against. We'd like to share some insight and tips on how to protect yourself against this threat.Authorised Push Payment FraudIt is widely recognised that APP fraud is now the fraud of choice globally, as well as at Ebury, this is unsurprisingly also the most common fraud typology. Below is a reminder of the red flags to watch out for:
- An existing supplier unexpectedly changes their payment details just before an invoice is due:– Especially if the new bank account is located in a different country to the supplier– Especially if the new bank account is held in a different name or is a personal account– Especially if the supplier gives a strange reason why the bank details are changing, such as “our usual bank account is under audit”
- An existing supplier expresses undue urgency to send a payment or you notice spelling mistakes or a change of tone in their emails
- An existing supplier starts emailing you from a different email address, or one that is slightly different (i.e. @supplier.com vs @suppplier.com)
- A new supplier has a recently created website, which may be poorly maintained or under construction, or has very little web presence at all when searched online
- A new supplier has negative media when searched online, such as ‘scam’ reviews
How can organisations protect against this threat?
- Data access policies should be integrated into onboarding, security awareness and offboarding processes. Limits to data access should also be set so staff can only access data that is necessary for their role;
- Training should be provided to promote the awareness of insider recruitment methods, such as contact via LinkedIn or social media;
- Vetting processes should be used to counter the risks posed by “organised placing” of applicants to act as malicious insiders;
- Anonymous reporting channels should be established for staff to report incidents of suspicious behaviour;
- Offboarding processes should include returning equipment, deprovisioning access and analysis of previous activity where there are concerns;
- Privacy by design should be implemented so that Data Protection Impact Assessments (DPIA) and Privacy Impact Assessments (PIA) become routine activity; and
- Machine learning and analytics can be implemented and configured to spot suspicious activity, such as data transfers, accessing files outside of business hours, or attempts to rename files with something innocuous.