Social Engineering Fraud & Vendor Management: Friction vs. Risk
Social Engineering Fraud & Vendor Management: Friction vs. Risk Live Event Synopsis
Case Studies
Real-life examples of how organizations use PaymentWorks to improve compliance, reduce workload, and add value.Stuff to Watch
Library of short and sweet videos featuring product demos, customer interviews, and sessions with experts.Podcasts
The perfect way to geek out on all things vendor management, and get tips from our guests, partners, and customers.Vendor Management Appreciation Day
Dedicated to celebrating the unsung heroes of vendor management and up-leveling your strategy.Events
We go places. We do things. Join us!Social Engineering Fraud & Vendor Management: Friction vs. Risk Live Event Synopsis
This article was initially published in March of 2022. We updated it in February 2024 because learning how to prevent social engineering attacks is still a widely sought-after topic.Â
Social engineering fraud, business email compromise (BEC) fraud and business-to-business payments fraud: three different names, same game.Â
All are a form of a man-in-the-middle attack, where a fraudster sends an email to an accounts payable person to request a change to the banking credentials in the vendor master to divert a valid vendor payment to a fraudulent bank account. This is the largest source of cybercrime from a monetary standpoint, with the FBI reporting that it cost $50 billion+ in global losses between October 2013 and December 2022 â and it only continues to increase.
To figure out how to prevent social engineering attacks, we brought together three industry experts in a panel discussion, âSocial Engineering Fraud & Vendor Management: Friction vs. Risk.âÂ
Joe Hussey, then vice chair at J.P. Morgan, currently senior vice president at Wells Fargo;Â Rob Unger, senior director for product management and strategic initiatives with Nacha and Thayer Stewart, CEO of PaymentWorks, dissected social engineering fraud and how it plays into the vendor management process and specifically what role the battle between friction and risk plays in finding a solution.
Social Engineering Fraud, A Primer
Top Takeaways on How to Prevent Social Engineering Fraud
#1. Education, Education, Education
#2. Strike a Balance Between Risk and Cost
#3. Put Your Vendors to the Test
How to Prevent Social Engineering Attacks With AutomationÂ
 â Let vendors own data entry
Get Ready For Vendor Management Appreciation Day 2024
Want Help Aligning Teams on How to Prevent Social Engineering Attacks?
Interested in Tips On How to Prevent Social Engineering Attacks?
Want Personalized Guidance on How to Prevent Social Engineering Attacks?
Social engineering fraud is a particularly insidious type of fraud. Why? Because when most people hear âfraud,â they often default to an organizationâs technological weaknesses. For example, hackers might breach or attack data networks, steal information, and perpetrate fraud. And sure, thatâs a threat, but itâs one that has concrete preventative measures.Â
On the other hand, social engineering fraud takes advantage of human weakness by tricking, fooling, or duping someone into doing something theyâre not supposed to do.
Take, for example, the recent case of a finance worker who paid out $25 million after fraudsters using deepfake technology posed as the company’s Chief Financial Officer on a video call â along with several other “members of staff” (more deepfakes) â and asked for a transaction to be completed in secret.
As you can imagine, these types of things makes preventative measures a bit more complex.Â
Vendor onboarding is especially prone to social engineering fraud. In many cases, itâs the perfect environment in which to commit this type of fraud. Think about all the risk factors:Â
No matter how buttoned up you think your operation is, the risk is always there, lurking in the shadows. Listen to the close call from Matt McDonald, Finance Manager and Deputy Treasurer for the City of Vista:Â
Itâs the perfect example of just how vulnerable most organizations are, whether they realize it or not. Even an all-star IT team with best-in-class controls around systems and email environments can only go so far.Â
If your vendorâs environment isnât secure, youâre at risk.Â
So, where do you start in learning how to prevent social engineering attacks? We’ve got you covered!
Fraudsters are getting even more sophisticated (weâre talking next-level stuff like AI voice cloning to scam an organization out of $35 million), and they’re always going to be attacking and probing for weaknesses, which is why it is so important to stay educated.Â
However, even when employees are educated, best practices are not always followed. This can be the case with “out of band” verifications when it comes to an email request to change bank account information, which is not an easy thing to do if youâve got hundreds or thousands of suppliers.Â
According to Rob, âWe know from some of our surveys that not everybody verifies that out of band with a phone call. That solution doesn’t always scale.â
Joe utilizes multiple training tools to ensure his staff receives between 10 to 15 hours of fraud-related training each year. He said, âEducation is a very difficult thing. It has to be done upfront and then it needs to be done at least annually. Without it, people will forget and will stray away from those standard protocols. Keeping it in front of employees is key.â
So, how can you keep employees engaged? Joe recommends sample testing; sending employees emails to see how they respond. âIn this case, we kind of need that level of audit, and I hate to use that word because everyone cringes when you say audit, but that auditing of, âShow me your last 50 vendor changes. How did they occur? Show me the steps that were validated in them.â”Â
We know that even with automation, which is the only way to truly prevent fraud, humans will always play a role in the process. Gatekeepers and decision-makers will always play a part. But finding the right balance remains the toughest part of getting it right. Thayer elaborates on the heart of the issue in this clip:
The bottom line seems to be that even with the best internal defense in place, anytime you have an exchange of information, you have an opportunity for fraud. This is why Rob feels that while having policies, adding automation and defining risk tolerance does indeed add pressure to internal personnel who are following the controls and adds customer friction, itâs simply what has to be done.
When it comes to truly tackling the risk of fraud, Joe states: âBeing nimble and being automated is the only way you do this.â So, what should you look for when partnering with a vendor to automate supplier onboarding?Â
Rob said that it depends on your risk tolerance, your internal policy and how far you want to go, but at minimum, a solution should do the basics in validating name, tax ID, address and managing compliance, and you should re-verify the solution at least annually. Joe takes it a step further and advises his clients to be really careful when selecting a vendor package that’s already attached to something else they bought or purchased. He elaborates in this clip:
This underscores why it is so important to choose a vendor who is committed to evolving to meet the ever-changing needs of organizations in todayâs world. Because if there is one thing weâve established, it is that fraudsters are never going to rest, so neither should your vendor onboarding partner. (BTW, PaymentWorks solves for the automation and goes a step further by assuming the risk for fraudulent payments.)
You can watch the full webinar here.Â
Letting vendors own data entry makes a ton of sense logistically. Who is better suited to enter the vendorâs information thanâŠthe vendor? Jenn Glassman puts it well:Â
When you consider all of the details that need to be collected â contact information, address, payment type, and more â it underscores all of the areas where things can go wrong. The old-school way of using a form that someone else fills out is a recipe for disaster.Â
Between typos, miscommunications, and other data entry errors, it leaves too much to chance. And believe me, when it comes to social engineering fraud, you donât just want to cross your fingers and hope for the best.Â
Empowering vendors to own the input of their information also provides them with reassurance that the information is correct, building a foundation of trust.Â
In the same vein, email is a risk proposition. If your vendor onboarding and change management process relies on email, youâre opening the door to fraud every time you hit send or open an email from your âvendor.â
Again, even legitimate information that you receive from vendors â like an address change request â equals another opportunity to mistype or misenter data.Â
Worse yet, an email-based vendor onboarding process makes you a prime target for bad actors who know how to take advantage. None of the scenarios are good.Â
Firstly, you could face the consequences of lackluster vendor security. All it takes is one vendor contactâs email getting hacked, and youâre receiving an email requesting a bank information update. Why wouldnât you make the change? Youâve confirmed the vendorâs email address, so the logical next step is to fulfill the request. Except neither you nor the vendor realizes the vendorâs email has been compromised until after a payment for hundreds of thousands or millions of dollars is already out the door.Â
Secondly, you could get a really, really well-crafted email from a spoofed email address that looks legitimate but originates from a fraudster. You think you received an email from the vendor, ronmays@biz.com, but you really received an email from ronrnays@biz.com. Were you able to catch that? Or will you end up approving a request and/or making a change that costs your organization millions?
Even if your vendor onboarding process leans heavily on email, there are things you can do to create obstacles for would-be fraudsters.Â
Authentication is one of those obstacles. When you receive requests, authenticate that the email or phone call is actually coming from the vendor. Confirm email addresses and phone numbers. Require authenticating data.Â
Debra Richardson puts it succinctly when she talks about using this tactic to get rid of lazy fraudsters:Â
In an ideal world, this type of authentication happens automatically. With a vendor onboarding platform, for example, vendors would need to sign in and authenticate themselves before making any changes. It takes a whole lot of guesswork out of the equation and ensures that payments are going where they are meant to go.Â
If the thought of social engineering fraud has you down, weâve got something to lift your spirits: Vendor Management Appreciation Day (VMAD) continues in 2024!Â
Thatâs right, itâs a year-long party aimed at honoring of one of the most critical, under-recognized roles across industries: vendor management.Â
VMAD is a brand-new holiday geared toward unifying vendor management professionals and celebrating innovation in the field.
Weâve released gifts each month to help you supercharge your vendor management efforts. Weâre also planning some awesome events so everyone can connect and celebrate the important, strategic role of vendor management.Â
Learn more here, and grab some free vendor management goodies.
Explore our blogs below. Theyâre filled with action items you can implement right away.
How to Prevent Social Engineering: 3 Common Scams Fraudsters Use to Trick Your Employees
Social Engineering Fraud Never Sleeps: 3 Ways to Prevent It
Top Three Takeaways: Social Engineering Fraud and Your Vendor Master â Managing the Risk
Vendor Verification: How NOT to Do it and What to Do Instead
Weâd love to walk through your process with you and talk about security, compliance, efficiency and sleeping better at night.
© Copyright 2024 - PaymentWorks