Topics: Finance and Accounting Transformation

Is your accounting department vulnerable to the most common online frauds?

Posted on February 07, 2017
Written By QX Global Group

Is your accounting department vulnerable to the most common online frauds?

Most businesses today have an online presence and most accounting departments use online tools that make accounting faster and easier. Whether you are a small business, SME or a large enterprise, you will have no doubt benefited from the internet; after all, it helps to make payments instantly, leaves an easily accessible trail of transactions, and improves the efficiency of your employees.

However, accounting departments’ reliance on the internet and cloud-based applications has also opened the doors of opportunity for cyber criminals. According to PWC’s Global Economic Crime Survey 2016:

  • Cybercrime climbs to the 2nd most reported economic crime affecting 32% of organisations.
  • Most companies are still not adequately prepared for – or even understand the risks faced: only 37% of organisations have a cyber incident response plan.

Is your business vulnerable to the most common frauds?

When it happens, it comes as a rude shock. When a business it hit with an online scam or any other economic fraud, there is the obvious risk of losing money. But it is often secondary to the sudden loss of reputation or loss of sensitive information. The costs of remediation and compliance can be really high when you try to close the stable door after the horse has bolted.

Accounting departments are often at the top of the list of fraudsters. Here are the most common and effective methods that online scammers or fraudsters use to wheedle money out of businesses like yours.

1. Phishing
Phishing attacks are usually made to demand transfer of money or to gain access to confidential information such as login credentials or account information. Such emails may not necessarily demand payment – some may just ask for your confidential information. They gather information regarding the authorised personnel and accountants. This information can be used at a later date to commit an email fraud.

For example, online fraudsters often send emails that seem to come from the CEO or other authorised person. For this they can use forged email addresses using email masking techniques, or simply use emails, IM or other communication channels, that appear similar to the original communications. Such emails may relay instructions for the urgent transfer of money to a particular account.

For example, let’s suppose that Mr. A is finance director of ABC Limited. You usually receive emails from him asking for payments to be made to specific bank accounts. His email address is [email protected].  One day you receive a request to make payment to an existing or unknown bank account – from the email address [email protected] or [email protected].  Often the email is almost identical to the original one.

2. Forged documents
The fraudster poses as a regular supplier and sends dummy invoices with details resembling the normal business invoices but with different bank details. In order to force the accountant to make a hasty payment, they may say that the due date for the payment has passed or say that non-payment will negatively affect your credit rating. The fraudster may also send a request for change of bank details via email or send a document on a letterhead requesting such change.

3. Social engineering
This technique psychologically manipulates people to give up confidential information like passwords or bank details. It may also be used to trick people into giving access to the computer system and secretly install malicious software, which will help the fraudsters get control of the computer and access to banking information and passwords

For example, you may receive an email from your friend whose account has been hacked, asking you for urgent monetary help or requesting you to donate to a charitable fundraiser.

4. Ransomware
Ransomware is a malware that gets installed when you mistakenly open an attachment. It is usually disguised as a legitimate file that gets downloaded unknowingly. Once opened, it encrypts your files or the entire hard drive, making it completely inaccessible. It is often set up so that only one file is left behind, which when opened issues demands for a particular amount of money, often in Bitcoins.

Only after the payment of ransom will the data will be decrypted. The victim is left with no option but to pay the amount demanded to get the data decrypted.

Is your business safe?

Have you taken all the steps you can to combat these types of fraud? Compare your actions to the list of key fraud prevention measures to find out – download our free fraud prevention checklist.

Originally published Feb 07, 2017 09:02:05, updated Apr 24 2024

Topics: Finance and Accounting Transformation

Don't forget to share this post!

Related Topics

Understanding the Impact of Outsourced Credit Control Services on Customer Relations

Understanding the Impact of Outsourced C...

15 Jul 2024

In today’s business environment, where cash flow serves as the lifeblood and customer satisfac...

Read More
Can Outsourced Compliance Services Scale Your Workforce?

Can Outsourced Compliance Services Scale...

12 Jul 2024

Compliance is a crucial aspect of modern business operations. Ensuring adherence to various legal, r...

Read More
How to Evaluate R2R Services Outsourcing ROI?

Evaluating R2R Services Outsourcing ROI:...

12 Jul 2024

In an era of rapid economic shifts and technological advancements, CFOs must rethink their Record to...

Read More
outsourced candidate sourcing

How Outsourced Candidate Sourcing Boosts...

11 Jul 2024

Finding the right people and managing remote operations are both difficult tasks in the IT staffing ...

Read More