Login

Register

Login

Register

AP Automation Combats COVID Scams | #employeefraud | #recruitment | #corporatesecurity | #businesssecurity | #


COVID-19 has afforded internet villains what will certainly go down as the greatest cybertheft opportunity of their shadowy lifetimes. Business email compromise (BEC), B2B phishing scams, synthetic identities, fake accounts and trillions of aid dollars flooding out at a time of maximum uncertainty make this a fraudster’s paradise.

For bigger scores like financial institutions (FIs) and online merchants, scammers are using ransomware, account takeovers (ATO), phishing and other malicious means to shake down companies already reeling from disruptions.

In the April The Next-Gen AP Automation Tracker®, a PYMNTS and Bottomline Technologies collaboration, we discover how accounts payable (AP) developments like invoice automation and spend tracking save and earn money, while AP automation hardens systems against COVID-era fraud.

More Vulnerable in AP

The sudden arrival of a pandemic caught everyone off-guard, including companies running legacy AP systems that are costly and difficult to reconfigure – to say nothing of the ongoing reliance on paper invoices and checks, which are certain to contract even more now.

“…Fifty-four percent of surveyed companies in the United States [said] they will not miss any of their payment obligations, despite financial staff working remote[ly],” the report states. “Other companies were less prepared and expected to struggle to process invoices and miss some payments. Manual practices may be hindering such companies’ abilities to keep up normal payment practices, and the pandemic may shine a light on companies that need to seriously examine automation tools and other modernizations.”

Considering that, “AP operations were the area in which 90 percent of companies saw [fraud] issues the most,” the latest Next-Gen AP Automation Tracker notes. “Companies can tighten security by requiring those seeking access to AP systems to undergo MFA [multi-factor authentication], which requires users to verify their identities with at least two types of credentials.”

Telling PYMNTS in a recent interview that “no doubt, [COVID] will accelerate the digital transformation of business payments,” Bottomline Technologies CEO Rob Eberle echoed findings in the latest Tracker that AP departments need to upgrade now for what’s next.

“Vendors that are nervous about their cash flows are requesting greater transparency into their payments’ statuses,” the report states, “and this is simply not possible when funds are being made via checks sent through the mail.”

Next-Level Payments Security

With one study finding that employee fraud goes undetected by business owners for an average of 16 months, AP automation and the theft detection/prevention it provides is one of the primary weapons businesses can employ to minimize fraud in these hectic times.

“Businesses are automating parts of their AP workflows for a variety of reasons, including to make operations more convenient and secure,” the report states.

“Companies that cannot keep fraudsters from accessing their resources will be hard-pressed to invest in these systems to salvage the damage and move forward,” it continues. “Businesses must also be able to clearly detect and catch false payment claims so they do not mistakenly reject genuine invoices from suppliers and damage valuable relationships. Foiling AP fraud may be tricky, but automation systems can bring payments security to the next level.”

——————————

PYMNTS LIVE ROUNDTABLE: TUESDAY, APRIL 21, 2020 | 12:00 PM (ET)

Gig workers were already on track to become roughly half of the U.S. workforce in 2019. Now, gig work is taking on critical new importance as the U.S. economy and millions of unemployed Americans navigate the effects of COVID-19. Join PYMNTS CEO Karen Webster and her guests, Payoneer CEO Scott Galit, Wonolo VP of Supply Monica Plaza, and Roadie Founder & CEO Marc Gorlin, for a virtual live panel discussion about the expanding gig economy, how it will play out across industries in 2020, and the systems and services needed to support a surge in remote workers.





Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW