Story image

Businesses warned about invoice fraud

14 Jun 2016

Businesses are being advised to protect themselves against invoice fraud, with the increase of email fraud placing businesses without automated invoice management software at risk.

“SMEs are at the greatest risk of invoice fraud, especially as many continue to rely on paper-based processes and spreadsheets to complete supplier invoice administration,” explains Matt Goss, managing director, ANZ, Concur.

“Invoice fraud can have significant ramifications and hamper the business’s ability to operate by stifling cash flow.” 

Concur has identified five practical tips to protect the business from invoice fraud: 

1. Be cautious with new suppliers 
If the company has not worked with a supplier before, administrative staff should be extra vigilant. Take the time to check in with the person who ordered the goods, and ensure the supplier details and invoice totals match the agreed costs. 

2. Be curious and suspicious 
Run an internet search to check that the supplier is a legitimate business and look up their ABN on the government web page. A simple step like calling the phone number provided on the invoice can help alert you to scams. 

3. Be wary of a change in process 
Any time a supplier notifies you of a change in banking details, company name, or address, validate the new details directly with the main contact at the supplier. Where possible, work with the person within the business that ordered the goods or services. 

4. Re-examine current invoice processes 
Review how the accounts payable (AP) team processes invoices. Assess if there are opportunities to move the more fallible, paper- and spreadsheet-based steps to a simpler, automated model. Supplier changes can be approved and monitored in an automated AP model. Aside from saving a considerable amount of time, centralising invoicing and payment details will reduce the available contact points where fraud can occur. 

5. Spend time on reporting 
Run regular reports to see what types of invoices are being paid each month, and for how much. Scrutinise what is being spent and where, and look out for abnormalities. If any big-ticket items stand out or the business has spent more in a certain category than normal, it may be worth investigating. With an automated solution, businesses can run these reports quickly and frequently. Utilising one AP platform will also let businesses spot key trends and discrepancies. 

“Some of the key signs of invoice fraud are: different bank details on invoices, bills for directory listings, advertising, domain name renewals, office supplies, or tax lodgings that the company did not order or place,” says Goss.

“It is important for businesses to be vigilant, review their invoicing procedures and regularly monitor invoices to avoid this type of fraud.” 

Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
A multi-cloud approach - what is in it for me?
OVH CEO Michel Paulin explains the benefits of a multi-cloud approach to an organisations digitalisation and what to consider before implementation.
IDC: Top 10 trends for Australia’s digital transformation
The CDO title is declining, 35% of us will be working with bots, the Net Promoter Score will be key to success, and more.
Why the IT service integration market is becoming highly automated
"The SIAM market is not large, but it is one of the fundamental pillars of every digital transformation strategy."
Intel and Rakuten partner to address 5G network gap
“We believe this full end-to-end virtualised network will help us to shift away from reliance on dedicated hardware and legacy infrastructure.”
Exclusive: How Australian businesses can foster customer loyalty with CX
From boardrooms to meeting rooms, there’s an overwhelming recognition of the importance of CX, particularly when it comes to building customer loyalty.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
HCL and IBM collaborate to encourage global hybrid cloud uptake
HCL announced a collaboration with IBM designed to help advance the hybrid cloud journeys of organisations worldwide.