Tag Archive for: fraud

Strategic Treasurer’s Analyst Report Series: Treasury and Risk Management Systems

06-09-2021 | treasuryXL | Kyriba |

This document contains a comprehensive illustration of the current state of treasury technology and the exciting future direction using new tools that are already with us. This FinTech analyst report from Strategic Treasurer takes a look at the current health of the TMS space and what benefits can come from implementing a treasury management system in your operations. Additionally, this report covers emerging technologies within treasury, such as the use of robotic process automation, artificial intelligence, and more.

Understand the current TMS space and its benefits

The Treasury and Risk Management Systems Analyst Report offers a thorough evaluation of the TMS space by covering the emerging uses of AI/ML (artificial intelligence and machine learning), RPA (robotic process automation), and API (application programming interface) technologies in treasury.

It also discusses:

  • The place of a TMS/TRMS in business continuity planning and preparing for disruption and volatility
  • The best practices and proper mindsets for avoiding pitfalls in selecting, making a business case for, and implementing treasury technology
  • The varied ways in which these solutions address the day-to-day pain points and inefficiencies of treasury departments

Download it now!

How global enterprises can finally end the cycle of redundant IT-related payments projects

30-08-2021 | TIS |

This article begins by examining the current state of enterprise treasury and finance technology implementations, including the standard project timelines, core challenges, and ultimate outcomes. This is followed by an analysis that outlines an improved methodology for enterprises to follow as they seek to ensure the global optimization and standardization of their payment systems, workflows, and technologies.

Modern enterprises are stuck in an endless cycle of payment technology upgrades

 

For enterprise finance and treasury professionals, why does it feel like the road to payments automation and technology optimization is never complete?

If you’re an active practitioner, you’ve likely asked yourself this very question (or at least a variation of it) within the past few years. Perhaps it was during a very long and arduous TMS or ERP implementation, a major acquisition of a new entity, or a rationalization of your global bank relationships. In any case, your musings were probably due to the fact that these types of projects have become an all-too-regular occurrence (and a subsequent thorn in the side) for enterprises around the world.

As recently as 2018, data showed that the average corporate timeline for a SaaS-based TMS implementation was 10-18 months. Technology overhauls involving larger and more widely used systems, such as global ERPs, may have taken up to 3-5 years. And although these respective timelines continue to grow shorter as cloud services and other innovations rise to the forefront, projects of this magnitude still represent a massive undertaking.

During these periods, it’s common for practitioners to wind up collaborating with dozens of internal and external stakeholders, joining hundreds of calls, and spending countless hours training, testing, and configuring the new system – all while continuing to perform their core list of daily responsibilities.

The ultimate result being?

Although seasoned professionals will tell you that every implementation is different, let’s think about the bigger picture. Of course, the results of each specific project can vary drastically, sometimes for reasons far outside of anyone’s control. There may be budget constraints, bandwidth constraints, technical limitations, and even geopolitical or environmental obstructions. Employee turnover may cause undue delays as well. And yet other times, the entire project may flow smoothly and on budget from start to finish.

But looking beyond the individual success or failure of any single project, how long after each project’s completion will it be until a new technology implementation is required?

One year? Two years? Five years?

Or, in the case of global enterprises, perhaps you are simultaneously working on numerous financial technology implementations all at once, and the completion of one only results in your reprioritization of another.
Unfortunately, this endless cycle of new technology and payment upgrades is what most enterprise treasury and finance teams find themselves dealing with today, and it has become one of the primary sources of confusion and headache for global companies.

Let’s quickly evaluate the underlying complexities in more detail.

Why does global expansion often lead to excessive payments complexity?

 

Although domestic companies operating in a single country or region undoubtedly face their own degree of technology and payments complexity, the level of difficulty associated with managing a global network of systems, data, and information is exponentially greater.

What are the main reasons for this?

To begin, consider the sheer volume of payments being made across a global enterprise, including all the various locations, currencies, and payment types. For the largest companies, there may be millions of inbound customer payments occurring every day through a combination of cash, check, card, and account-to-account options like ACH and SEPA. At the same time, an equally large and diverse variety of outbound payments must be generated by the enterprise to compensate employees, vendors, and partners. And every time a new entity, industry, or market vertical is added to the mix, these volumes intensify.

Adding further complexity, consider how the payment channels and formats in use across each world region can vary broadly as well. Just to name a few, there is EBICS in Europe, NACHA in North America, SWIFT for international payments, and H2H (direct) connections that may be utilized globally. Local variations of these channels also exist in other regions, and going a step further, each of the specific banks used by an enterprise will have its own connectivity preferences for payments and information reporting. Individual clients, partners, and vendors may also request payment data to be created in specific formats such as SWIFT MT, ISO 20022, EDI, BAI, and BAI2.

Measure Payments Complexity

Finally, the diverse compliance and security standards that exist across various countries require unique filtering and monitoring workflows to be established in different regions. Although U.S. companies may be familiar in dealing with OFAC sanction lists, FBAR statutes, and data privacy laws like GDPR, the regulatory landscape in Asia, Africa, and the Middle East looks quite different. In fact, each specific country within these regions might have its own distinct set of rules and restrictions, and these protocols must closely adhere to any time that payments data and technology solutions are managed locally.

But despite all these challenges, perhaps the largest source of headache and confusion for enterprise practitioners stems from attempting to manage a disparate and unintegrated web of back-office payment solutions.

What do we mean by this?

The back-office conundrum: too many solutions and not enough integrations

 

In 2016, research from Fortune highlighted that global enterprises were undergoing merger and acquisition (M&A) activity at incredible rates, with the five most active companies absorbing 122 new entities between them on the year. Data from more recent years showcases a similar story, and at the same time, organic growth is also driving these enterprises to open new offices, enter into new markets, and expand into new world regions.

The challenge?

As these new acquisitions and locations ultimately go on to form new company entities and subsidiaries, the underlying systems used at each locality must be connected to the enterprise’s main technology stack in order to facilitate data transmission, cash and payment visibility, and other core financial functions. But for enterprises with hundreds of already-existing entities and a steady stream of new acquisitions, consider how many systems must be connected to the enterprise’s core technology stack each year. Also consider the amount of maintenance, upkeep, and investment that managing this global network of technology requires. And finally, reflect on how each of these systems will gradually become a legacy over time and need to be replaced as new technologies and solutions rise to the forefront of the industry.

We know from experience that not all of these global systems are able to connect or integrate with one another. Perhaps some solutions are too old, the budget too insufficient, or IT bandwidth is stretched too thin to prioritize the development of proper connections. As a result, it may take days, weeks, or even months for the data and information contained within these local systems to be made available across the entire enterprise. And if these siloed systems are not isolated occurrences but actually comprise a significant portion of the enterprise’s back-office infrastructure, then almost every single financial and payments-related function will be impacted.

EPO Payments Complexity

Without automated connectivity and integration, visibility to cash balances and payment statuses will take a hit. Creating a standardized compliance and security process will be almost impossible, and stewarding the company’s liquid assets will be hampered by a lack of transparency to global data.

Today, these siloed entity technology stacks and legacy systems are often the unintended result of sustained business growth. In fact, it’s almost natural for them to occur. However, with today’s speed of change in commerce and technology, it is no longer an option to leave each of these functions, systems, and geographies unconnected. Siloes trap data, reduce communication and visibility, and ultimately stifle growth. And in the world of payments and technology, a lack of visibility and automation will directly impact liquidity, profitability, and exposure to risk across the entire enterprise.

So then, for enterprises that find themselves in this situation, what is the best approach to optimization?

Introducing a new framework for managing enterprise payment maturity

 

In a perfect world, enterprises that need to connect all of their global technology and payments solutions, including bank platforms and 3rd party solutions, would simply integrate every system with every other system. This would effectively enable complete unification and connectivity across the enterprise’s entire network, and data could flow immediately and seamlessly across any department, entity, and location for real-time visibility and control.

Of course, active practitioners understand how unrealistic this approach would be. In reality, it would require an almost endless variety of custom integrations to be established across each internal system and potentially hundreds of banks and external solutions. Despite innovations surrounding APIs and other connectivity methods, this task would still be insurmountable, from both a budgetary and bandwidth perspective. And even if an enterprise did somehow manage to connect all these solutions together, the maintenance and upkeep required to sustain each integration would require a whole army of dedicated IT personnel and even more investment.

An alternative solution?

Given the fragmented systems landscape that exists across most global enterprises, the most effective way to achieve a holistic view of (and control over) every siloed process, system, and geography is by implementing a single Enterprise Payments Optimization (EPO) layer that sits above all other solutions in an enterprise’s technology stack. Rather than connect every platform with every other, each solution need only connect to the EPO platform instead. This drastically simplifies the process of integrating new solutions with an enterprise’s tech stack, and also automates the process of transmitting payments data between any system that is connected to the EPO platform, including those used by different entities, offices, and departments.

Although the adoption of an EPO platform requires some up-front legwork, using a vendor like TIS ensures that the complexity of connecting to banks and performing other technical functions is almost entirely outsourced. This means that formerly difficult and time-consuming tasks that were managed by internal IT teams (such as configuring and maintaining the links between external banks and internal ERPs, HR systems, and TMSs) are now managed by the EPO vendor. As formats evolve or new regulations require changes in integration, EPO vendors like TIS automatically handle the upgrades and also manage the addition of new countries, banks, and users to an enterprise’s network as growth and expansion dictate over time.

Once this type of implementation has been performed, the EPO platform can become the sole channel through which all company payment workflows and data streams are managed and controlled.

TIS Eliminates Global Complexity

As payment instructions or files from ERPs and other back-office systems pass through an EPO platform, they can be quickly transferred to the appropriate bank or end party. In addition, data can be shared with 3rd party vendors and other companies and partners within the network. Subsequent bank statements and reports can also be transmitted from the bank through an EPO platform to the various internal departments and systems where payment instructions are originating from.

Ultimately, the information stored on an EPO platform serves as the single source of truth for payments data across all corporate departments, subsidiaries, and geographies, and it prevents enterprises and their IT departments from having to manage a tangled mess of disparate back-office connections.

EPO solutions provide the perfect option to support ongoing enterprise growth and expansion

 

While the EPO orchestration strategy outlined above is very effective at breaking down geographic and entity-specific siloes, it is also the ideal platform for fostering a strategic, long-term approach to enterprise payment maturity.

Today, the technology landscape continues to evolve rapidly, as do the payment solutions and methods used by global enterprises. In the current era, this means that approximately once every decade, a company’s existing technology infrastructure will need to be overhauled. However, because various internal solutions are installed at different times and for different purposes, the upgrades and maintenance schedules for these solutions are rarely conducted in an organized and timely fashion. Sometimes, these upgrades are not completed at all. And as a result, it’s very easy for an “optimized” payment workflow and the underlying technology stack to start falling behind the curve.

This is why adopting an EPO orchestration layer is so essential for maintaining a constant state of consistency and control.

By connecting all of the various internal systems that comprise your global payments technology stack to an EPO platform, you effectively ensure that regardless of where an entity is located or what local systems are being used, the data and information stored on their platforms is never left isolated or unaccounted for. And as older or outdated enterprise payment solutions are eventually replaced by newer and more upgraded systems, connecting them to the EPO platform in a similar fashion will ensure ongoing cohesion and connectivity across your global networks, even as various technology overhauls and system migrations occur at specific entities or locations within the enterprise.

So, if you’re a treasury or finance professional working for an enterprise with significant process, system, and global complexity — complexity that is ultimately hindering your ability to operate efficiently — ask yourself whether a new approach to payments technology could be the answer.

And if that answer is yes, we invite you to consider TIS and our newly introduced Enterprise Payment Optimization (EPO) platform.

About TIS

TIS is reimagining the world of enterprise payments through a cloud-based platform uniquely designed to help global organizations optimize outbound payments. Corporations, banks and business vendors leverage TIS to transform how they connect global accounts, collaborate on payment processes, execute outbound payments, analyze cash flow and compliance data, and improve critical outbound payment functions. The TIS corporate payments technology platform helps businesses improve operational efficiency, lower risk, manage liquidity, gain strategic advantage – and ultimately achieve enterprise payment optimization.

Visit tis.biz to reimagine your approach to payments.

 

Identifying Types of Fraud/Scams

26-08-2021 | treasuryXL | XE |

Knowledge is power. When it comes to avoiding scams, forewarned is forearmed. Here are a few common types of scams that criminals will use to try to steal your money or – more importantly – your identity.

1. Give Money to Get Money

If you ever receive an “official” notification that you’ve won a lottery or that someone wants to generously give you a large sum of money but first you need to send money to cover taxes, fees, clearances, or some other cost before collecting your prize, proceed with extreme caution!

The common thread with this scam, apart from the too-good-to-be-true offer, is that you must “act now” or respond immediately to the official sending the notice. This scam relies on you feeling pressured to not miss out on the deal or prize.

One of the most well-known versions of this type of scam is the Nigerian Prince (also known as the 419 Scam).

2. Phishing

Phishing is almost what it sounds like. Someone is fishing – and using bait – to obtain sensitive information to steal everything from the cash in your bank account to your identity.

Phishing scams replicate official-looking emails (or other communication types) from well-known and reputable companies. These fake emails include links or phone numbers encouraging you to change passwords or send personal documents and information (to update your account). The email will make some claim that there is an issue with your account (i.e. you need to supply documents to receive funds being remitted to you) and you need to click on the link provided to fix the problem. These links may take you to a look-alike site created by the criminals or contain malware (malicious software) which can give the criminals access to your computer (so don’t click!). Phone numbers may work the same way by directing you to a fake answering service.

There are a number of sub-species of the Phishing scam:

a) Spear Phishing

Spear Phishing is a little more sophisticated as it specifically targets you and relies on the trust you’ve built around a person, company, or brand. Most likely the communication will be personalized. Criminals target you from information they have found on sites like social media.

b) Clone Phishing

Clone Phishing differs in that it will copy a legitimate email that included an attachment or link. The attachment or link is replaced with a fraudulent version and the email is sent from a disguised address that appears to come from the original sender. The email may claim to be just a resend of the original or even an updated version.

c) Whaling

Whaling goes after the “big fish”. It targets senior executives or high-profile people within in a company. This type of fraud usually appears as a legitimate concern such as a legal request or subpoena, client issue, or corporate matter.

d) SMiShing

Cute name, not so cute fraud tactic using text or SMS. Potential victims receive an unsolicited text or SMS message with a link to a site that can contain malware or viruses. The urge to click is usually based on a “confirmation” of account activity and the risk of incurring additional charges or fees if the intended victim doesn’t take care of the problem immediately (by clicking the link).

3. Fear-Based (Service Cut Off/Jail Time)

You receive notification, usually through email or phone, that your account is in areas and you need to pay the balance immediately or have the utility service cut off. This type of fraud includes claims of unpaid taxes requiring immediate payment to avoid jail time. Criminals in this case are dependent on your fear of losing a necessity, like heat or water, or your personal freedom.

Conclusion

The ultimate goal of the criminal is to rob you. Criminals will try every sneaky tactic to get what they want and will play upon your fears, your generosity, or your trustfulness to get it.

Scammers attack when you’re least expecting it and often prey on the most well-intentioned people. Educate yourself on how to protect yourself and your loved ones from unexpected fraud. Here are several resources that provide helpful information:

Remember, no matter who is contacting you, NEVER give them any of your passwords, account numbers, or personal information without double-checking their identity first.

Be smart, be aware, and be safe!

Are you curious to know more about XE?
Maurits Houthoff, senior business development manager at XE.com, is always in for a cup of coffee, mail or call to provide you the detailed information.

 

 

Visit XE.com

Visit XE partner page

 

 

 

A Culture of Fraud Prevention: It’s Everyone’s Responsibility

23-08-2021 | treasuryXL | Kyriba |

It seems like every day there is a new fraud headline. As a result, companies are learning that preventing fraud needs to be a responsibility of all employees in the organisation. To prevent fraud, an organisation needs to focus on education through training, standardized controls, and IT policies on top of a strong technology solution.

The threat of fraud has grown dramatically in recent years. In fact, according to the 2021 AFP Fraud and Control Study, overall, 74% of companies have experienced fraud or attempted fraud. Your organisation needs to be prepared and Treasury activities need to support identifying and preventing fraud. Recently, I had a conversation with a Treasurer who said, “if it’s (fraud) not on your mind in Treasury, you’ve already lost”. He went on to talk about how much more difficult it is to manage fraud when you have a decentralized Treasury team.

Best in class fraud prevention is about having a strong overall ecosystem, culture and technology – the fabric of an organisation. Fraud prevention must be top of mind for everyone in the company. Specific training should be included in introductory orientation as well as ongoing training and annual awareness campaigns. Individuals need to be able to identify potential phishing and Business Email Compromise (BEC) campaigns to ensure they don’t become victims.  It only takes one person to make a poor judgment call to allow access into a company’s system. It’s also important to consider cultural differences for offices in other parts of the world. Fraudsters are taking advantage of cultural norms. In some Asian countries it’s natural to defer to individuals with seniority. For example, receiving a message from the CFO to make a payment wouldn’t normally be questioned. Make sure that all individuals have a way to share, escalate and/or stop a transaction when there could be potential problems.

Standardised procedures are essential. With BEC, fraudsters assume that using the name and email of senior members of the management team, such as the CEO or CFO, will cause employees lower in the organisational hierarchy to do as instructed without question. To combat this, it is imperative that the procedures set up require strict adherence, and that senior management provides an environment where fewer senior members of the team are comfortable asking whether a payment is legitimate. If multiple ERP systems exist, ensure that consistent approval processes are in place across all systems. For smaller regional offices, set up procedures and approvals to ensure that separation of duties is in place and that you have visibility to the activities in remote offices. Some fraudsters like to target attacks on regional offices in hopes of bypassing some of the more stringent processes that are in place at headquarters.

 

Having an IT focus on fraud prevention and policies that support these efforts is also essential. IT should ensure that employees are password protected and that their passwords aren’t easily guessed. They should maintain strong firewalls and keep current on technology to identify potential hacker activity. In addition, it is helpful to randomly test employees with phishing emails to assist employees in recognizing fraudulent emails.

Finally, technology solutions to identify fraud are a critical component of fraud prevention. Solutions should include rules-based fraud detection that identifies multiple scenarios, for example situations where a vendor bank account number has changed. These transactions should be flagged and sent for validation. An individual should call the company using a phone number that is listed in the system of record. Or, the transaction should be sent for account verification allowing for confirmation that the bank account is owned by the organisation that is to be paid, and not some fraudulent entity. Account verification is a new tool that is being added to rules engines. It allows you to increase your confidence that the account is owned by the entity with which you have a relationship without having the time-consuming process of having to reach out to the entity directly to verify. The verification is quick and doesn’t slow down legitimate payments. Your fraud technology solution should also identify other fraud situations that you and a community of your peers have experienced or considered.

Machine learning to identify payment anomalies based on transaction history is also critical. It allows for patterns to be identified in the immense amounts of transactional data that your organisation has accumulated and then to match that in real-time to your specific transactions to identify potential fraud. This added layer of protection looks for behaviours that may not be identified by the human eye – timing of invoice receipt or change in the frequency of payment requests. The system continually adapts based on the information that it is tracking and provides suggestions when it identifies potentially fraudulent behavior.

Fraudsters continue to attack since they only need to find that one weak link on one day with a single person in your organisation. It’s up to you to make sure that the individuals in your company are prepared for the attack. Ensure that you have a training program that helps your employees identify potential fraud attempts. Define, monitor and enforce policies that support segregation of duties and consistent processes throughout the organisation. Confirm that your IT department is staying on top of technology that identifies and prevents hackers and supports best practices when establishing policies across the organisation. Last, but certainly not least, make sure that you are utilizing best-in-class technology to identify potentially fraudulent payments to stop those payments from going out your door. Some treasury solution providers use the terminology fraud detection tools to refer to having sanction screening or workflow tools in place while others notify you of a fraudulent item after the transaction is sent to the bank. A best-in-class technology solution combines workflow tools and approvals in addition to a robust rules engine and machine learning to identify potentially fraudulent transactions in real-time. Giving you an opportunity to stop any transaction before it leaves your organisation.

Preventing fraud is something that everyone in your organisation needs to commit to in order to prevent fraudsters from being successful.

How to Start Avoiding Payment Fraud from Happening

| 18-08-2021 | treasuryXL | Nomentia |

It’s 2021 and even with advancing technologies and AI detecting fraudulent behavior, payment fraud remains an ever-present Risk for any company.

The other day we met with someone who has recently been a target of Payment Fraud and is now implementing a payment factory in order to reduce the risk. We wanted to take a look at how we approach the subject with our solution. Having the right software in place is important, sure but it goes beyond technology.

Let’s start with the Software, Nomentia’s Cash Management solution has several mechanisms in place that protect you against fraud.

Here’s a Quick list

  • First of all, our software creates a single point of managing all payments. We talk a lot about centralizing, and this is just that. Our product brings all these payments into a single view. If we think of a typical case, a company might upload some payments to internet banks, some to a service bureau, use host-to-host connections for others and maybe even run some payments via SWIFT. That creates at least 5 times X channels where payments are executed. This means all payments can’t be seen from one view, which already makes it impossible to detect fraudulent or suspicious payments. But in addition, those 5 times X channels also mean 5 times X places where user rights need to be maintained and controlled.
  • This brings us also to the second point; our software comes with a comprehensive user and user rights management. Our software creates a clear structure and visibility as to who has rights to which companies and accounts and what kind of user roles they are having. We create visibility and an easy way to maintain those rights.
  • When payments are transferred from one source system such as ERP, payroll and the likes to our cloud, files cannot be altered. This creates additional security measures that protect companies from attacks.
  • Lastly, we have created capabilities to set up straight forward approval flows that ensure a segregation of duty into the way payments are done, within the users’ approval limit. Approval limits can be set for each user when working in different roles for multiple companies.

Those are the things that come built into our software. But it’s important to highlight one key fact, most fraud attempts have a human factor and that’s why it’s important to look beyond the software and take a critical look at the processes. As a matter of fact, despite all the noise about external risks, fraud and theft are more likely to be committed by an internal actor than an external actor (Source: FBI Internet Crime Complaint Center).

In other words, if you focus on validating data for possible fraud, you probably should take steps to minimize the possibility of fraud in the first place. Otherwise, proverbially speaking, it’s winter (Northern Finland winter for that matter) and you are going out in shorts and with wet hair.

Apart from controlling user access rights, we would like to share some more tips and ideas that can help to mitigate the risk of fraud.

  • Payments that are made from ERP but rejected by the bank cannot be modified by all users. In practice this means when a payment is made from the ERP system but rejected by the bank, it bounces back where users need to review the failed payment, before sending it to the bank. Fixing the payment data on ERP master data instead of manual adjustments. This would highlight and prevent for example internal fraud attempts.
  • Consider working with your system admins to install payment templates that your end users can use. This decreases the risk for fraud and error by limiting the manual work of filling in information.
  • Make use of the full audit trail that we provide. You can see the whole lifecycle of a payment from its creation to its reconciliation, including by whom and which changes were made, who has approved and sent the payment.
  • Create clear rules on manual payment creation. We enforce a 4-eye approval flow before sending it. In manual payments, there might be a reason to have more than 2 persons approval. If you are having SSC’s in use or even multiple SSC globally. Use the standard 4-eye approval flow locally but have additional approval from another SSC to reduce the internal actor.

These are a few ideas from our side. We are always happy to hear more ideas and feedback on how we can together create safe payment processes.

DOWNLOAD PAYMENT FRAUD E-BOOK

 

 

Strength in Numbers: A Community-Based Approach to Fighting Digital Payments Fraud

11-08-2021 | TIS |

This article provides a modern review of the tactics used by cyber criminals to target enterprises with fraudulent schemes and also evaluates the primary methods used by companies for defending against digital payments fraud. This is followed by an introduction to TIS’ innovative Payee Community Screening (PCS) solution, which addresses payments fraud on a global scale by curating a community-based network of trusted beneficiaries, vendors, and bank account information that enterprises can use to verify the legitimacy of their outbound payment instructions.

Enterprise Payments Fraud in 2021 is More Elaborate & Subversive than Ever Before

Within the past year alone, thousands of finance and treasury practitioners across the world have learned through bitter experience that digital payments fraud is rarely orchestrated by your average, everyday criminal.

Rather, the vast majority of today’s technology-oriented attacks, particularly those that target large enterprises, are led by sophisticated, well-funded, and innovative fraudsters.

In many cases, these software-savvy perpetrators are working on behalf of state-sponsored actors or underground “black-hat” organizations. And because these groups are well-organized and well-funded, they can provide members with the latest technology and training. Ultimately, this has led to rapid digital innovation within the criminal underworld, and subsequently to a growing frequency of highly-orchestrated payments fraud attacks against the corporate environment.

Consisting primarily of software hacks or malware attacks, many of the most prevalent forms of fraud in existence today involve numerous layers of subterfuge and deception, which is necessary for bypassing the various security controls that organizations have in place. Common examples include the use of cleverly disguised Business Email Compromise (BEC) schemes, “Man-in-the-Middle” tactics, invoicing fraud, and the use of ransomware or other forms of “system takeover” fraud.

But of course, enterprises are not entirely helpless in defending themselves.

What Payment Security Tools Does a Modern-Day Treasury Group Utilize?

If you’re operating in a role with direct access or authority over an enterprise’s outbound transactions, you could probably name a broad number of tools at your company’s disposal for detecting and preventing payments fraud.

Some quick examples?

When initially establishing internal payment protocols, most companies will require clear segregation of duties between each stakeholder in the payment process. This includes dual or multi-user approval controls for executing, reviewing, and approving payments. Other standard security components, such as the use of encrypted Wi-Fi networks or VPNs, help restrict access to the enterprise’s digital software to only trusted sources. IP safe-listing tools provide even greater control over who can access these internal systems. As users log in, configuring multifactor authentication (MFA) tokens to be used in conjunction with standard usernames and passwords is another effective technique that prevents unauthorized users or personnel from accessing payment systems via stolen credentials. Biometric versions of these MFA tokens, such as fingerprint or retinal scanners, may be leveraged for even greater security. And finally, user auditing software is often adopted by companies to help monitor the activity of various personnel within their payment systems in order to detect suspicious activity, such as a login attempt from an unknown IP address, at an odd time of day, or from an obscure world region.

Treasury Payments Security

When all combined together with regular employee testing and training, these various security techniques have proven very effective for combating most forms of digital treasury and payments fraud in existence today. And in the years ahead, these tactics are expected to remain as core features of most enterprise’s fraud prevention strategies.

However, suppose that the criminals targeting your organization are not launching direct attacks against your internal payment systems or architecture, but instead decide to infiltrate the operations of your suppliers and partners.

Their reasoning?

Although your enterprise might have the appropriate defenses in place for preventing direct hacks and internal breaches, are your controls just as effective at identifying anomalous activity that is perpetrated through the guise of a trusted vendor?

For a surprising number of enterprises today, the simple answer is no.

Successful Fraudsters Learn How to Operate Outside the Purview of Enterprise Visibility

Although many of the fraud attacks that garner widespread media attention are those that result in millions or billions of losses in a single swoop, these are not the only types of attacks that organizations should be worried about.

In reality, many of the attempts perpetrated by criminals are not targeting billions of dollars. Instead, they focus on extracting smaller amounts of funds over time, often by disguising their activity through the lens of normal business operations.

Take, as an example, fake invoices submitted by criminals that are designed to mimic one of the thousands of vendor or supplier payments that a global enterprise makes every month.

Usually, vendors are submitting invoices to enterprises via email, an online e-commerce platform, or via an ERP system. Subsequent payments are then delivered from the enterprise to the various recipients whose invoices have been approved, usually as an account-to-account transaction that goes directly to the bank account listed in the invoice.

However, suppose that a criminal is able to infiltrate the email account, e-commerce platform, or payment system used by one of your vendors. And over time, the criminal monitors the activity and communication that occurs between this vendor and your enterprise and learns how to mimic the workflow, presentation, and delivery of new invoices for payment.

In this scenario, the criminal knows that your company is receiving hundreds, if not thousands, of new invoices from a variety of vendors every day. They also know the average dollar amount of each invoice delivered by particular vendors, as well as the frequency and timing of their submissions. And if an email account or e-commerce platform has been hacked, they have also probably been studying the language and messaging that the vendor uses to correspond with you.

After taking time to evaluate these invoicing and communication processes, the criminal will create a falsified invoice using the same email address or payment platform that you’re familiar with. The invoice will probably be for the same amount and to the same beneficiary that you’re used to paying, but with a slight variation to the underlying bank account details.

The typical result being?

Unless you are actively tracking and inspecting the vendor records, bank account numbers, and beneficiary details for EVERY payment initiated by your enterprise to your global network of partners and vendors, then catching these attempts will be incredibly difficult.

But if your company cannot catch this errant invoice the first time, then what is going to stop the criminal from submitting numerous invoices over and over, or even going on to target other vendors within your network and duplicating the process on a broader scale?

It might sound like an Ocean’s 11 heist on paper, but in reality, these types of attacks occur all the time. In fact, a single instance of invoice fraud cost Amazon nearly $20 million in 2020. Other forms of fraud, such as BEC schemes, cost a combined $12.5 billion for organizations in the same timeframe, and these numbers are not decreasing over time.

Instead, they are continuing to rise.

Introducing a New Way to Quickly Identify Suspicious or Fraudulent Payment Details

Although subversive types of fraud attacks like the invoice example above are difficult for large companies to identify, suppose there were a way to quickly scan all vendor and supplier payments in real-time against a global library of beneficiary and bank account data?

Going a step further, what if you could also scan outbound transactions being delivered to first-time vendors against a community ledger of payments data in order to verify that the underlying account details and remittance info have never been flagged as suspicious or fraudulent by other enterprises?

With this functionality, the threat of fraud being perpetrated through more obscure and subversive channels become much easier to identify, and they go a long way in protecting your enterprise against attacks that spawn through exposures related to your partners, vendors, and suppliers.

This suite of tools is exactly what TIS is now providing enterprise clients with our innovative Payee Community Screening (PCS) solution.

Developed in direct response to a noted increase in invoice and BEC fraud, TIS’ PCS network works by aggregating payments data across our trusted community of global enterprises and bank partners. As new payments are submitted by various enterprises through TIS, this module compares the underlying beneficiary and bank account information against a comprehensive record of all other transactions executed through the system, including those made by other enterprises in the network.

In practice, this validation process effectively protects against four fundamental threats:

  1. If you are making payments to a new beneficiary or bank account for the first time, an alert will be generated by the system warning you that an additional review of the information is recommended.
  2. If you are making payments to a beneficiary which is completely unknown to other members of the PCS network, then the payment is flagged and a review workflow is initiated.
  3. For new vendors that you are paying for the first time, if the invoice and payment details do not match what other enterprises in the network have used to pay the vendor (i.e. a different bank account number was provided to your enterprise than what was provided to other enterprises in the network), then the payment is flagged and a review workflow is initiated.
  4. If the beneficiary or bank account details provided in an invoice ever match with a known criminal, sanctioned, or otherwise fraudulent party, the payment is automatically flagged and a review workflow is initiated.

In this way, by inspecting every outbound payment initiated by your enterprise in real-time against a global library of payments information, enterprises can strengthen their security controls by accessing a much broader pool of data and information than what is available in-house. To date, TIS’ network has managed over 11 billion payments globally across 11,000+ banks and 15 million+ distinct beneficiaries, which makes our library of payments information virtually unparalleled in the market. And now with the addition of PCS to our solution suite, we can better protect our enterprise clients from fraud by confirming the validity of every outbound transaction they are attempting to make.

TIS Payee Community Screening

In an environment where subterfuge and deception are a criminal’s main assets, these community screening techniques are essential for ensuring that fraudsters cannot bypass your controls simply by infiltrating those of a different company within your network. They also ensure that as soon as fraudulent or suspicious payment info is identified by one enterprise, the data can be quickly shared across all other enterprises in the network for purposes of quickly halting subsequent payments to that account or beneficiary.

For TIS’ enterprise clients, these tools are already becoming a pivotal component of their core security structure, and we are excited to continue deploying the solution across more global enterprises in the months and years ahead.

Learn More About How PCS Can Bolster Your Treasury & Payments Security

Although no single tool should ever be relied upon to defend against all forms of fraud, it is strongly recommended that enterprises making hundreds or thousands of vendor payments every day undergo a thorough evaluation of their payment controls. More specifically, treasury and AP teams should take time to analyze whether the threat of invoice or BEC fraud leaves them exposed, especially if a vendor or supplier within their network is compromised.

For enterprises that identify gaps, we invite you to learn more about how TIS can help.

For more information about TIS’ PCS tool, the associated benefits, and the technical aspects associated with its architecture, download our latest factsheet. You can also request a meeting with one of our payment experts or learn more about the other security-related components of our solution suite.

Stay vigilant, stay safe, and as always, thank you for reading.

About TIS

TIS is reimagining the world of enterprise payments through a cloud-based platform uniquely designed to help global organizations optimize outbound payments. Corporations, banks and business vendors leverage TIS to transform how they connect global accounts, collaborate on payment processes, execute outbound payments, analyze cash flow and compliance data, and improve critical outbound payment functions. The TIS corporate payments technology platform helps businesses improve operational efficiency, lower risk, manage liquidity, gain strategic advantage – and ultimately achieve enterprise payment optimization.

Visit tis.biz to reimagine your approach to payments.

 

Kyriba Webinar: How Connectivity-as-a-Service Can Help In ERP Migration

25-02-2021 | treasuryXL | Kyriba |

4th March • 2pm GMT • 3pm CET

In this webinar Kyriba and Deloitte will discuss some of the challenges and time constraints faced in bank connectivity and outline how Kyriba’s Connectivity-As-A-Service can accelerate global banking connectivity projects by more than 80%.

The agenda will follow:

  • The Connectivity-as-a-Service challenges
  • The Kyriba Connectivity Network
  • A case study on implementation with Deloitte

REGISTER NOW to understand more of the issues related to cost-control, deployment, security and bank connectivity when embarking on large-scale ERP cloud migration projects.


Date:

March 4, 2pm GMT/ 3pm CET

Contact:

How does the FATF help fight financial crime?

01-12-2020 | treasuryXL | Refinitiv |

The Financial Action Task Force (FATF) plays a crucial role in the global fight against crime, corruption and terrorism through its Mutual Evaluation assessment. How has the FATF evolved since its birth 31 years ago, and what role does it play in anti-money laundering (AML) and countering the financing of terrorism (CFT)?

  1. The FATF is an intergovernmental body that oversees global efforts to combat money laundering and the financing of terrorism.
  2. To become part of the FATF group, a country must undergo a ‘Mutual Peer Review’ to determine its levels of compliance with FATF’s Recommendations.
  3. The FATF’s methodology change, introducing the Effectiveness Assessment, is yielding more accurate results of a jurisdiction’s levels of compliance with its AML/CFT global standard.

The FATF is an inter-governmental body that was established in 1989 by the G7 nations to combat money laundering. For the first 12 years, of its existence it was a little-known organization. However, it came to prominence after 9/11 when its mandate was expanded to include additional Recommendations to combat the financing of terrorism and the financing of the proliferation of weapons of mass destruction. Since then, the FATF mandate and Recommendations have been endorsed by different UN resolutions, and it has been transformed to adapt to different emerging threats. In 2008, after the global financial crisis, FATF’s role as an international standard policy-making body in AML and CFT was expanded by the G20. It was given the ‘soft power’ to generate the necessary political will to bring about legislative and regulatory reforms in countries.

The FATF Mutual Peer Review

Countries wishing to become members of the FATF group must commit to a ‘Mutual Peer Review’ system. This will determine the country’s levels of deployment and compliance with the FATF Recommendations, which have been set as the international AML/CFT standard. The FATF oversees these reviews in conjunction with different international members and observers such as the IMF, the World Bank, the OECD, and the European Commission.                                                                                       
In addition to the information received from the assessment team performing the review, the FATF Mutual Evaluation’s Effectiveness Assessment also considers information from the FATF team that visits the country being evaluated. The Mutual Evaluation team comprises highly trained experts drawn from FATF member countries and international bodies.

 

Recommendations focus on effectiveness

Until 2013, the results of the FATF review were largely focused on the technical implementation of the Recommendations into the local legislations. However, because of the high levels of money laundering (ML) and financing of terrorism (FT) globally, the FATF decided to enhance its methodology to focus more on effectiveness rather than just technical compliance. This revised methodology helped to produce the expected tangible results in the fight against AML/CFT. It shed light on many countries that had previously been evaluated, but who under the new methodology began to show serious weaknesses in the fight against ML and FT. This resulted in the number of countries and jurisdictions on the FATF Grey List — those who were placed under increased monitoring — to start growing.

The FATF Mutual Evaluation employs peer pressure from other countries, as well as bodies such as the IMF and the World Bank, which impels the assessed countries to act. Negative mutual evaluation outcomes not only seriously damage the reputation of the assessed countries and embarrass its governments, but might also generate replicated systemic risks of coercion by other international institutions such as the European Commission. And the new methodology is working. In recent years, the Effectiveness Assessment is yielding more accurate results of a jurisdiction’s levels of compliance with FATF’s AML/CFT global standard. Many jurisdictions are now finally realizing the coercive power of the Mutual Assessment.

New evaluation methodology

The fourth round of Mutual Evaluations from FATF continued the shift towards concentrating on how effectively regulations are deployed rather than mainly focusing on technical compliance and whether country laws and regulations are in place in accordance with the FATF Recommendations.

This can be very challenging for a number of countries in many sectors, including some that have previously been assessed to be complying with the standards before the introduction of this new evaluation methodology.

The pressure to ensure that legislation was changed and that industry sectors complied with the Recommendations was achieved by targeting the industry sectors that posed the highest AML/CFT risk. At least this was the case in the Middle East and Africa. The early years concentrated on the banking and financial sectors, including the capital markets. This focus was later broadened to non-banking remittances and payments organizations and money exchanges. This was followed by the insurance sector and so on.

Non-financial sectors under the spotlight

The last few years has seen Mutual Evaluation reports focus on the designated non-financial business and professions (DNFBPs) sectors — real estate, lawyers, accountants, gold and precious stone dealers, for example — that had been previously overlooked area by past evaluations. For example, the EU Fifth Anti-Money Laundering Directive, which came into effect in January 2020, further strengthened its AML/CFT legislation to fall in line with the FATF, when it included a number of new sectors.

The non-financial sector often has the misconception that AML/CFT regulations are solely for the banking and financial sectors. A key shortcoming identified by FATF across many jurisdictions in emerging markets is that DNFBPs are falling short of FATF expectations. Recent evaluation reports from several countries show that DNFBPs have less comprehensive, and sometimes limited or no understanding, of AML/CFT regulations and the risks that they are facing.

However, the new approach of measuring effectiveness rather than technical compliance might keep many countries’ institutions and companies to consider: “Are our sanctions and transactions screening just a checklist process, or do they show the real effectiveness of our AML/CFT risk process as defined by FATF?”

Identity fraud, COVID-19 and the Pivotal role of Digital Identity

16-11-2020 | treasuryXL | Refinitiv |

Financial crime, including identity fraud, is growing as sophisticated criminals exploit the ever-expanding capabilities of emerging technology. The COVID-19 crisis has only served to increase opportunities for criminals to benefit from fear, uncertainty and desperation, but digital identity solutions offer banks and financial institutions (FIs) a chance to fight back.


Financial crime and identity fraud: fueled by the digital revolution

As digital connectivity continues to redefine every aspect of our lives, quick, seamless digital experiences have come to embody our new normal. This digital revolution is being driven by a host of interconnected factors, including a changing regulatory landscape and emerging technology that creates an environment with low barriers to entry. Other factors are also at play, including ever-increasing connectivity between entities, increased cross-border activity, and tech-savvy consumers who demand choice, fairness, flexibility, and an omnichannel experience across all areas of their lives. Consumers accustomed to digital retail experiences expect the same 24/7/365 digital experience in other areas of their lives, such as banking and wealth management. Moreover, they increasingly expect tailored, highly personalized experiences.

The result of enhanced connectivity, convenience and increased consumer engagement is a real need to protect against highly sophisticated financial criminals who are harnessing the same digital capabilities to defraud both organizations and individuals. Put simply, the technological advancements that make our lives easier can also benefit criminals, making it easier for them to commit financial crime. According to the World Economic Forum, fraud and financial crime constitute a trillion-dollar industry, and private companies spent approximately US$8.2 billion on anti-money laundering (AML) controls alone in 2017.

Refinitiv’s own research, presented in our 2019 report, Innovation and the fight against financial crime, confirms that financial crime is indeed pervasive and costly. Our findings were collated from a survey of more than 3000 managers with compliance-related responsibilities at large global organizations. We found that nearly three-quarters (72%) of respondents were aware of financial crime taking place in their global operations during the 12 months preceding the survey, even though the same companies spent an average of 4% of turnover on customer and third-party due diligence checks. Looking specifically at identity fraud, the Federal Bureau of Investigation (FBI) has revealed that synthetic identity fraud – where criminals manufacture a new identity using both legitimate and false information – is the fastest growing crime in the U.S.2

COVID-19 has upped the ant

Following the rapid spread of the epidemic , financial crime has accelerated as criminals have found new opportunities to exploit fear, uncertainty and desperation. The FBI provides various innovative examples relating to how criminals are using COVID-19 to defraud individuals, including government impersonators who aim to extract personal information for illegal purposes. And work-from-home fraud, in which victims are asked to send or move money, effectively becoming money mules and enabling criminals.

Forward-thinking banks and FIs are already beginning to accelerate their existing digital transformation programs to mitigate the higher levels of risk anticipated during and after the pandemic. In particular, we expect a significant uptick in the use of digital onboarding and digital identity solutions as more consumers are forced to transact online as a result of lockdown and social distancing requirements; choose to do so for fear of contracting or spreading the virus; and/or are seeking better security when asked to prove their identity.

Even before the pandemic, many firms were increasingly using digital innovation to fight financial crime, including digital identity solutions in the client identification space. Digital identity solutions offer fast, reliable digital identity verification and screening; transcend geographies; boost operational efficiency; and remove the human error factor. Moreover, digital identity helps financial institutions optimize compliance models, improve risk mitigation and protect customers from identity fraud. As the world grapples with the effects of the pandemic, banks and FIs have a real and immediate opportunity to review their systems and controls, while simultaneously accelerating digital transformation and moving away from old-school manual Know Your Customer (KYC) processes.

The far-reaching effects of identity theft

Organizations across the financial services industry are facing a range of common challenges, including rising competition, tightening margins, strict regulatory expectations, the need for greater operational efficiency, and pressure to reduce costs. There is the added fundamental requirement to ensure that the client experience is positive. Customer abandonment levels remain unacceptably high, with over half (56%) of consumers in the UK abandoning bank applications in 2018. Our research suggests that traditional KYC and due diligence processes – which can be time-consuming, inefficient and costly – have contributed to this.

While firms are increasingly aware of the need to ensure better experiences for clients, they also need to consider the ever-growing security threats such as large-scale data breaches, phishing and social engineering attacks. These crimes have made it easier for fraudsters to assume the identities of legitimate account owners via account takeover fraud. The impact of identity fraud is far-reaching, with victims experiencing both financial and psychological damage that can severely impact their behavior and future brand loyalty.

There is therefore an urgent need for banks and FIs to prioritize customer identity protection alongside the accepted need to ensure a positive experience. Many banks and FIs are not moving fast enough to address this issue – and need to become more aware of the wider social risks of identity fraud.

On a more positive note, a highly encouraging finding from our survey was that technology, including digital identity solutions, is increasingly able to help organizations fight back against financial crime while improving client relationships. A significant 94% of survey respondents agreed that the technology they use to detect financial crime is also enhancing customer engagement.

Digital identity: who can benefit?

Digital identity solutions continue to grow in popularity and offer numerous benefits to different industry participants, including retail banks and wealth managers.

Retail Banking

Retail banks, for example, can benefit from enhanced speed, efficiency and security when using digital onboarding and digital identity solutions during customer account opening, where it is necessary to verify and prove the identity of new customers who apply for new bank products and services. Digital identity is also invaluable for customer re-verification and authentication in instances where existing customers seek to make changes to their personal information.

Wealth management

Turning specifically to the wealth industry, the benefits are equally clear. The wealth arena is operating against a backdrop of unprecedented uncertainty as wealth transfer from baby boomers to millennials brings far-reaching changes to business models, in line with the expectation that a new generation requires new strategies and alternative data.

We commissioned research from global research and advisory firm Aite Group, which collated the findings from executive interviews with leading wealth management firms around the globe. The research found that 100% of respondents consider wealth transfer to be one of their top-three concerns. This report also revealed that financial advisors are becoming less product-focused and more relationship-oriented. As the wealth industry continues to shift away from products and towards services, the role of financial planning is taking center stage in the client/advisor relationship. Advisors are increasingly shifting focus from administrative duties and investment selection to client service. Digital identities can enable the shift of work from financial advisor to less expensive parts of the value chain, enabling them to concentrate on areas of added value.

A strong belief in technology

Our research shows that firms overwhelmingly believe in the power of technology in the fight against corruption: 97% of all respondents in our innovation survey said that technology can significantly help with financial crime prevention. There are of course still challenges in adopting digital solutions – nearly three-quarters (73%) reported concerns or obstacles when harnessing technological advancements to reduce risks and costs.

Respondents revealed that only about half (51%) of the data and legal documentation needed to carry out due diligence is obtained, but creating more difficulties, only 54% of this is in a digitized format. While remedies will take time, the digitization outlook is positive with 60% of organizations prioritizing automation and digitization for investment. Respondents indicated that spending on customer and third-party due diligence checks was expected to increase by 51% in the year following the survey, with technology being the biggest investment area. This data was gathered prior to the onset of COVID-19 and is expected to accelerate further as a result.

Digital identity solutions deliver diverse benefits

Digital identity solutions tick many boxes, including:

  • Faster turnaround times. Using digital identity accelerates the pace of business, benefits all stakeholders, and means that banks and FIs can onboard and service more customers, more efficiently.
  • Improved accuracy. Human error is unavoidable in manual identity procedures, but digital equivalents reduce manual keying errors, ultimately leading to better compliance.
  • Better security. Old school security features, including passwords and knowledge-based authentication (KBA), not only cause high levels of frustration among clients, but are also often unsecure.
  • More streamlined operational costs. Digital identity solutions boost efficiency levels, leading to more optimal deployment of resources and cost savings.
  • A more favorable customer experience. Faster turnaround times, fewer touch points and a seamless digital experience all contribute to higher levels of customer satisfaction.

Refinitiv’s digital identification and verification solution, Qual-ID delivers in each of these areas. Built specifically for FIs, Qual-ID enables secure, digital identity verification and screening to boost compliance team efficiency. The solution focuses exclusively on consumer identity. Qual-ID helps with identity verification, document verification, enables anti-impersonation checks to be performed in a variety of robust yet consumer friendly ways.Qual-ID also leverages our market-leading World-Check Risk Intelligence Database to enable screening for financial crime risk within the same solution.

World-Check delivers accurate and reliable information compiled by hundreds of specialist researchers and analysts across the globe, adhering to the most stringent research guidelines as they collate information from reliable and reputable sources, including watch lists, government records and media searches. Incorporating World-Check capabilities into Qual-ID means that customers can verify identity against trusted sources, proof legal documents and screen for regulatory and financial risk – all in one transaction, via one API.
This unique combination of elements delivers a holistic digital identity and screening solution that assists our clients to comply with their legal and regulatory requirements at the time of onboarding.

Technology’s significant and tangible impact

Only 53% of respondents in our innovation survey confirmed that they conduct KYC checks on client identity during onboarding but worse still, only 46% of these checks are considered successful. While these figures are alarmingly low, our research did reveal that those organizations that use technology are almost twice as successful at performing KYC checks on client identity (47%) as their counterparts who don’t use technology (28%). These findings are a clear indication of the significant, tangible impact that the right technology can have in the client identity space, and ultimately in thwarting financial crime.

What is certain is that the digital transformation will continue to gather momentum – digital commerce is expected to grow globally at more than a 20% CAGR by 2022, reaching nearly US5.8 trillion in value. Alongside this growth, another certainty is that sophisticated criminals will continue to exploit emerging technology to advance their illicit activity, both now and after the COVID-19 pandemic. Forward-thinking banks and FIs must therefore harness the power of the best available technology and solutions to prevent financial crime and protect their customers – and digital identity solutions offer an immediate opportunity for success in this critical area.

Kyriba Webinar: Modernising Global Corporate Payments to Prevent Fraud

04-11-2020 | treasuryXL | Kyriba |

These last few months have highlighted that Payments Fraud continues to be a major problem, with fraudsters quick to leverage the global pandemic, with the amounts involved considerable.

In this session Kyriba’s Paul Simpson will be joined by Helen Alexander from SWIFT and James Bushby from MasterCard, to explain what institutional payment fraud is, with a specific focus on the technology and processes that treasury and finance teams can employ to minimise risk.

In particular, the agenda will follow:

  • What institutional payment fraud is and the internal processes and technology to consider, with SWIFT
  • How a payment hub mitigates against Fraud for Corporates, with Kyriba
  • Introduction to how MasterCard is helping fight Financial Crime

Register your place by filling in the form to your right and we will be in touch!

Date:

November 12th, 09:30- 10:30 (CET)

Contact: