Up In Your (Family) Business

Unmasking Deception: Understanding, Avoiding, and Recovering from Business Fraud

With Greg Bramwell

 

Summary

This podcast episode discusses the topic of business fraud, its various forms, prevention strategies, and recovery methods. Greg Bramwell, a relationship manager at Star Financial Bank, shares his expertise and insights on fraud, emphasizing the importance of being proactive and implementing measures to protect businesses. Key points include the prevalence of fraud, common types such as check fraud, ACH fraud, and internal fraud, the role of positive pay systems, fraud insurance, strong internal controls, password management, and the need for trusted banking relationships. Greg provides real-life examples and actionable advice for business owners to safeguard their assets and mitigate the risks of fraud.

Chapters

00:04:29 Introduction to Business Fraud

The episode begins with an introduction to the topic of business fraud, highlighting its prevalence and the various forms it can take, such as identity theft, payment fraud, account takeover fraud, and cybercrime. Greg emphasizes that fraud is not limited to internal activities but also encompasses external scams targeting businesses.

00:06:24 Internal Fraud and Trusted Employees

Greg discusses the risks of internal fraud, where trusted employees or individuals with access to financial accounts may misappropriate funds. He stresses the importance of verifying and monitoring financial records, as well as implementing checks and balances to prevent such incidents. Greg provides an example of a business owner who fell victim to internal fraud by a CFO, highlighting the need for vigilance and proper controls.

00:10:32 Positive Pay Systems and Fraud Prevention

Greg introduces the concept of positive pay systems, which are services offered by banks to help businesses prevent check and ACH fraud. These systems require businesses to pre-authorize payments, allowing the bank to cross-reference and validate transactions. Greg emphasizes the importance of implementing positive pay as a proactive measure against fraud.

00:29:01 ACH Fraud and Email Scams

Greg discusses the growing threat of ACH fraud, where criminals hack into vendor systems and send fraudulent invoices with altered payment instructions. He stresses the importance of verifying any changes to payment methods through direct communication rather than relying solely on emails. Greg also highlights the risks of phishing emails and the need for strong internal controls and employee awareness.

00:38:16 Fraud Insurance and Recovery Strategies

Greg recommends exploring fraud insurance options to mitigate potential losses and aid in recovery efforts. He also emphasizes the importance of having a trusted banking relationship, with direct access to fraud departments and prompt response times, to increase the chances of recovering funds within the critical 24-hour window.

00:48:00 Password Management and Authentication

Greg advises businesses to implement strong password management practices, including regular password changes and the use of complex combinations. He also highlights the importance of two-factor authentication and avoiding email-based verification, as emails can be compromised. These measures help prevent unauthorized access to accounts and systems.

00:47:26 Ransomware and Cybersecurity Threats

The discussion touches on the growing threat of ransomware attacks, where cybercriminals hold data and systems hostage for ransom payments. Greg emphasizes the need for robust cybersecurity measures and internal controls to prevent such attacks, as well as the potential benefits of specialized insurance policies.

Action Items

  • 00:10:54 Implement positive pay systems for both check and ACH transactions to pre-authorize payments and prevent unauthorized transactions.
  • 00:38:49 Explore fraud insurance options to mitigate potential losses and aid in recovery efforts.
  • 00:41:03 Establish a trusted banking relationship with direct access to fraud departments for prompt response and recovery assistance.
  • 00:48:11 Implement strong password management practices, including regular password changes and the use of complex combinations.
  • 00:48:29 Utilize two-factor authentication and avoid email-based verification to prevent unauthorized access to accounts and systems.
  • 00:44:29 Maintain strong internal controls, including employee awareness and verification protocols for changes to payment methods or invoices.
  • 00:19:45 Regularly review and monitor financial records, account activity, and cash flow to detect any irregularities or discrepancies.
  • 00:48:11 Consider implementing cybersecurity measures and specialized insurance policies to protect against ransomware attacks and other cyber threats.

Transcript