A Multidisciplinary Approach to Preventing Payment Fraud

The current crisis has destabilised the entire economy through the simultaneous occurrence of risks that were previously considered independent. It has made companies more vulnerable, particularly to the risk of payment fraud. An escalation in fraud and cybercrime activities has been observed in recent months, as cyber attackers have been able to make use of the weaknesses caused by the current health crisis.The current crisis has destabilised the entire economy through the simultaneous occurrence of risks that were previously considered independent. It has made companies more vulnerable, particularly to the risk of payment fraud. An escalation in fraud and cybercrime activities has been observed in recent months, as cyber attackers have been able to make use of the weaknesses caused by the current health crisis.

TYPOLOGY OF FRAUD

Social engineering fraud takes advantage of emergency situations and non-compliance with control processes. The success of a fraudulent urgent payment request by someone pretending to be an executive is often facilitated by stress and workload. At the same time, fraud linked to cyber technological attacks on the tools and systems put in place for remote work that may have a lower security level has also been on the rise. Finally, fraud related to internal threats is based on the lack of control over existing processes, giving fraudsters the opportunity to detect new flaws and overcome the controls in place (modification of files, etc.).

A COMMON APPROACH

Treasurers, along with heads of IT security and internal audit, are the guarantors of the security of the payment process. The proper implementation and updating of control systems is their only defence against fraudsters. The response strategy is a four-step approach.

  1. PREVENT
    Defining an appropriate leading entity is the first preventative action. Its role is to map the risks and define the control strategy. Priority should be given to a group composed of primary stakeholders (Treasury, Information Systems, Internal Audit and Accounting) to promote a better understanding of functional risks as well as those related to IT architecture and their interdependencies. Both definition of crosschecks and employees risk awareness are therefore facilitated. In addition, regular interactions with external partners (banks, IT solutions providers, Swift, etc.) provide up-to-date knowledge regarding risks and available solutions.

  2. PROTECT
    The combination of functional and IT controls constitutes the second step of the fraud response strategy. Indeed, 62% of frauds are identified thanks to companies’ internal control system. What are the key controls to cover risks across the end-to-end payment process?

    - Implementing operational controls and maintaining their efficiency are the main challenges for functional teams. Therefore, aligning roles with delegation of powers and access profiles, formalising the signature and authorisation process for sending payment files, or identifying backup solutions in case of attacks are priority actions

    - For IT teams, the challenge is to strengthen the control of payment processes by securing the network access, conducting regular audits of malware protection, and controlling the security of passwords.

  3. DETECT
    The monitoring of anomalies that may reveal a fraud must also be built in a cross-disciplinary way in order to maximise chances of identifying fraud and mitigating risks. The key indicators to watch out for are to be identified jointly by treasury, IT and internal audit. Teams must consider the nature of the quantitative and qualitative elements to be monitored: location of payments, review of internal rules, data modifications and, in general, elements related to the various fraud attempt scenarios identified.

  4. REACT
    Finally, in order to best manage proven fraud, companies must draw up a crisis management plan by identifying, for each fraud scenario, both the procedures to put in place and the key players to mobilise. This crisis management system will facilitate a smooth cooperation between treasury, IT, legal and communications departments.The resilience of companies relies on the good capacity for anticipating situations and the quality of communication between all departments involved in the payment process. These approaches have to be tested on a regular basis to be able to adapt to permanently changing environment.

Christelle Lecouturier, Partner, PwC

Articles


Photo from Trends in Treasury and Leadership

Trends in Treasury and Leadership

Interview with José-Carlos Cuevas, European Association of Corporate Treasurers (EACT) Board Member for Spain from 2007 to 2024.

Read
Photo from Staying Ahead: Focus on What is Trending Within Treasury Automation

Staying Ahead: Focus on What is Trending Within Treasury Automation

Treasurers should look for ways to use latest technologies to increase profitability and efficiency, especially in FX management, a still highly manual process.

Read
Photo from The LEI's Role in Streamlining European Payments

The LEI's Role in Streamlining European Payments

The inclusion of the LEI in the EU’s Instant Payments Regulation means that organizational identity can now transform the EU payments ecosystem.

Read
Photo from Dublin Calling: An Update from the Irish Association

Dublin Calling: An Update from the Irish Association

The IACT has reached new heights and is stronger than ever, with ambitions to evolve and grow further.

Read
Photo from Assessing Counterparty Risk Remains a Tough Task for Corporate Treasurers

Assessing Counterparty Risk Remains a Tough Task for Corporate Treasurers

There is no infallible method to assess counter party risk, but there are some common-sense solutions that you need to adopt and integrate to sleep comfortably at night.

Read