Educate and train employees. This is the most powerful tool leaders can use to shore up defenses. Regularly train every employee to recognize and respond to red flags, including:
- Changes to wire instructions
- Impersonation of parties involved in transactions
- Communications—emails, phone calls, or texts—that exhibit potential risk signs and arouse suspicion by:
o Demanding immediate action (e.g., transferring funds)
o Asking for sensitive information
o Occurring outside of regular business hours
o Containing spelling or grammatical errors
Teach all staff to handle suspicious requests by verifying changes to instructions before acting on them. Make sure employees use only authenticated phone numbers and contacts to confirm changes and requests that arrive via email, text, or phone call.
Strengthen financial oversight. Set up processes and controls to safeguard finances and tighten your financial controls:
- Conduct regular audits and account reconciliations.
- Fight check fraud with control systems like payee positive pay, reverse positive pay, and controlled payment reconciliation.
- Schedule periodic, independent reviews of financial records.
- Segregate financial duties to prevent any one person from having unchecked control over financial transactions.
- Control and monitor who has access to bank accounts and credit cards.
- Perform multiple reviews of each invoice.
Replace fraud-prone checks. Choose safer, electronic forms of payment like commercial credit cards, ACH, and Real Time Payments (RTP®) when possible.
Consider moving to an integrated payables platform. These streamlined payment processes allow governments to send all vendor payments to the bank in a single electronic file. Their bank then distributes these payments based on predefined criteria that identify risk-prone transactions.
Institute ACH best practices. Ensure that accounts payable staff consistently:
- Verify authenticity and ownership of bank routing and account numbers.
- Separate ACH file processing from file creation and maintenance.
- Restrict access to payment data forms and records.
- Use ACH Fraud Control to set parameters for allowed transactions and receive daily activity reports.
- Perform daily reconciliation on ACH debit accounts.
Segregate accounts. Designate specific accounts for use with specific transactions, and block wire and ACH activity on accounts not designated for those purposes.
Establish stronger cybersecurity controls. As governments continue to pursue digitization, cybersecurity is a critical component of their overall risk management strategy. Limit your vulnerability by adopting these cybersecurity best practices:
- Keep technology systems, devices, and software updated with the most current security protections. Update and patch immediately—don’t wait.
- Back up data regularly.
- Limit access to devices and sensitive data to authorized individuals.
- Use single sign-on (SSO) systems.
- Require strong passwords and two-factor authentication.
- Invest in cyber insurance.
- Establish a cyberattack response plan.