Fraud prevention checklist

May 07, 2024

Learn how to help protect your organization against fraud with various procedures. U.S. Bank can provide you with fraud prevention solutions to keep your data and information safe. Help protect your organization against fraud.

Protect your organization through established controls and scheduled periodic reviews. 

Use the checklist below to help maintain a strong fraud prevention program. View a PDF version.

 

Internal procedures and controls

Establish fraud prevention best practices and responsibilities

  • Educate personnel regularly on the importance of safeguarding sensitive information, following established procedures and preventing fraud losses
  • Ensure your staff understands they have the most important role in preventing fraud losses
  • Refresh training regularly
     

Establish clear division of duties and access 

  • Separate account receivables and account payables functions and processes
  • Limit financial data access only to employees if there's a business need; follow the need-to-know principle 
     

Ensure procedures are being followed

  • Conduct surprise audits 
  • Review transactions before they leave the company
  • Verify out-of-pattern payment instructions from internal employees
  • Review downstream processes for cyber security and fraud mitigation
     

Use a second communication channel to validate payment related requests, including:

  • Payment requests from customers and company personnel, including senior officials
  • Requests from vendors to change payment instructions 
     

Update signing authority

  • Review and update bank signature cards routinely
  • Remove executive signatures from your annual report to prevent illegal scanning and use

Limit the number of users for each type of transaction, but train everyone

Even if some of your employees are multifaceted in their skillsets, it’s best practice to allow as few hands as possible on a transaction. Just from a security standpoint, a large user base increases the chance of human error and adds more touch points for scammers to target.

This doesn’t mean that the rest of your team should be kept in the dark. Effective fraud protection rests largely on an educated and informed workforce. Here are a few lessons that you’ll need to solidify among your payments management team:

  • Segregate duties between payment types (check, wire, ACH, etc.)
  • Reinforce Business Email Compromise risk best practices, which can include how employees open emails, click on links and reply to emails
     

While no single control or set of controls will prevent your organization from being a target, we suggest these five tips to prevent your organization from falling victim to BEC:

  1. Confirm and verify email requests for fund transfers
  2. Use dual control for money movement activities
  3. Use multi-factor authentication for web-based email accounts
  4. Communicate quickly when fraud or security events occur
  5. Evaluate staff compliance with internal controls by using real-world security awareness testing

Online fraud protection and controls

Protect your workstations

  • Update operating system, software, anti-virus, and malware protection
  • Limit personal email and Internet use on computers used for online banking activities
  • Back up data on separate servers regularly as this helps mitigate ransomware attacks

Prevent malware infection

  • Use caution when downloading applications, documents, installing software, opening email attachments
  • Beware of download requests from pop-ups or advertisements
  • Consider using an anti-malware application, as well as a firewall
  • If you believe that your cyber environment was compromised, engage an outside cyber forensics firm to complete a comprehensive review

Safeguard your communications and confidential data

  • Avoid using email to send confidential information but if you must, consider using encryption software
  • Truncate all but last four digits of account numbers in communications

Establish separate controls for your business online banking application

  • Require approvals to authorize ACH, wires, remote deposits and adding users or changing user profiles
  • Ensure initiators and approvers use different workstations and require DUAL approvals
  • Require use of security tokens, with strong authentication, for payment applications
  • Review employee access privileges and limit system administrative rights
  • Remove privileges for terminated employees
  • Ensure user access and entitlements are up to date and accurate
  • Ensure users know their system webpages and functionality, so suspicious content is easier to spot and is reported quickly to the bank

Monitor account balances and activity daily

  • Report any suspicious activity immediately to your bank and alert your users
  • Activate notification features in online banking applications

Review your tech infrastructure and security patches

Even the best-laid plans won’t succeed if your IT infrastructure falls behind on security updates. As new real-time payment options arise, those back-end systems must adjust to handle new venues for malware and spyware to infiltrate.

Consider the following short-term steps to shore up your back-end security:

  • Ensure all systems are current with security updates and anti-virus software
  • Review password policies for best practices in security
  • Expand multi-factor authentication processes, including the use of security tokens and biometric authentication
  • Validate any request to add or update customer information

Combating these risks may require your organization to refresh more traditional fraud prevention infrastructure and practices.

Paper check controls

Check approval practices

  • Preauthorize high dollar value checks before the checks are written
  • Do not sign checks without the recipient and amount information completed

Review your check stock controls

  • Select a highly qualified, established check vendor
  • Use a different style of checks for each account for easy recognition
  • Incorporate security features into check design
  • Store blank checks and check printing equipment securely
  • Limit the working supply of checks removed from the secure area

Check processing controls

  • Monitor check orders to ensure receipt of exact quantity

 

U.S. Bank fraud prevention solutions

Ensure dual approval verification practices

No matter which solutions you choose, you must be confident that the people on the other end of your transactions are the rightful recipients. Fraud — both external and internal — can occur in any transaction, but the increased speed of modern payment solutions often means less time to catch fraudulent requests.

Fraud risk affects both payers and payees, in financial and non-financial terms. Even if payments are revocable (with some modern payment options), fraudsters might empty the recipient accounts before a revocation attempt. Reputational risks can also arise in these cases.

Banking partners and modern payment providers have measures in place to prevent and mitigate losses, but the burden to build verification best practices falls to organizations that choose to use the payments method. And most of the platform-specific fraud risks trace back to the goal of ensuring payer/payee account authenticity.

 

For SinglePoint® online access

  • Install IBM® Trusteer Rapport® to detect and eliminate malware (free to SinglePoint users)
  • Receive payment service alerts by email, text, or fax: SinglePoint Alerts & Notifications

For paper check disbursements

  • Review exceptions daily and make payment decisions: SinglePoint Positive Pay
  • Review payee exceptions daily, make payment decisions: SinglePoint Positive Pay - Payee Option
  • View check images online, eliminate storing cancelled paper checks: SinglePoint Image Access and SinglePoint Image File Delivery
  • Reconcile accounts daily or monthly: U.S. Bank Account Reconciliation (ARP)
  • Outsource check processing to eliminate the storage of check supplies: SinglePoint Check Payables

For deposit-only

  • Place blocks on accounts to prevent unauthorized debits: U.S. Bank Check Filter Service
  • Reconcile deposits weekly or monthly: U.S. Bank Deposit Reconciliation Service

For ACH transactions

  • Use Account Validation to ensure the account you are being asked to send a payment is open and owned by the intended payee.
  • Ensure dual authorization is required: SinglePoint ACH Origination
  • Ensure approvers are vigilant in their final review and approval of all outbound monetary transfers
  • Set appropriate transaction limits for each initiator and approver of monetary transfers
  • Review exceptions online for incoming ACH (debits): SinglePoint ACH Positive Pay
  • Track ACH Positive Pay authorization status: ACH Filter Rejected Item report, ACH Filter Authorizations report: SinglePoint Information Reporting
  • Prevent ACH originators from debiting your account: ACH Block, Business Check Block
  • Control access to your account by customer ID and dollar amounts: ACH Filter

For wire transfers

  • Ensure dual authorization is required, especially for non-repetitive transfers: SinglePoint Wire Transfer 

For regular review of your account information

  • Review your accounts online, at any time: SinglePoint Information Reporting.

 

U.S. Bank is committed to helping you meet your treasury management needs including fraud prevention. To learn more, contact your U.S. Bank Relationship Manager or Treasury Management Consultant. To find a consultant near you, email a request to TreasuryManagementSolutions@usbank.com.

Related content

Is your employer long term disability insurance enough?

Risk management strategies for foreign exchange hedging

30-day adulting challenge: Financial wellness tasks to complete in a month

The latest on cybersecurity: Mobile fraud and privacy concerns

Liquidity management: A renewed focus for European funds

What is a CLO?

3 tips to maintain flexibility in supply chain management

5 questions you should ask your custodian about outsourcing

10 ways a global custodian can support your growth

The benefits of a full-service warehouse custodian

Hospitals face cybersecurity risks in surprising new ways

Authenticating cardholder data reduce e-commerce fraud

Post-pandemic fraud prevention lessons for local governments

Webinar: Robotic process automation

Proactive ways to fight vendor fraud

Avoiding the pitfalls of warehouse lending

Fight the battle against payments fraud

Fraud prevention checklist

Why Know Your Customer (KYC) — for organizations

The password: Enhancing security and usability

How to improve your business network security

Cybersecurity – Protecting client data through industry best practices

BEC: Recognize a scam

Webinar: Approaching international payment strategies in today’s unpredictable markets.

White Castle optimizes payment transactions

Increase working capital with Commercial Card Optimization

Automate accounts payable to optimize revenue and payments

Understanding and preparing for the new payment experience

The surprising truth about corporate cards

Protecting cash balances with sweep vehicles

Alternative investments: How to track returns and meet your goals

Manufacturing: 6 supply chain optimization strategies

Webinar: CRE Digital Transformation – Balancing Digitization with cybersecurity risk

Small business growth: 6 strategies for scaling your business

Reviewing your beneficiaries: A 5-step guide

How to keep your assets safe

Learn to spot and protect yourself from common student scams

7 ways to teach your children to be scam-savvy

Keep your finances safe and secure: Essential tips for preventing check fraud

Protecting elderly parents’ finances: 6 steps to follow when managing their money

4 ways to outsmart your smart device

How to spot an online scam

Money muling 101: Recognizing and avoiding this increasingly common scam

What you need to know about identity theft

What is financial fraud?

From LLC to S-corp: Choosing a small business entity

Recognize. React. Report. Don't fall victim to financial exploitation

Recognize. React. Report. Caregivers can help protect against financial exploitation

Webinar: U.S. Bank asks: Are you safe from fraud?

Is online banking safe?

How-to guide: What to do if your identity is stolen

How you can prevent identity theft

8 tips and tricks for creating and remembering your PIN

Why a mobile banking app is a ‘must have’ for your next vacation

Mobile banking tips for smarter and safer online banking

Disclosures

U.S. Bank and SinglePoint are registered trademarks of U.S. Bank National Association. IBM® and Trusteer Rapport™ are registered trademarks of the International Business Machines Corporation registered in many jurisdictions worldwide. U.S. Bank makes no warranty of any kind as to the effectiveness of the Trusteer Rapport software. U.S. Bank is not responsible for and does not guarantee the products, services, or performance of third parties.

Start of disclosure content

Loan approval is subject to credit approval and program guidelines. Not all loan programs are available in all states for all loan amounts. Interest rate and program terms are subject to change without notice. Mortgage, Home Equity and Credit products are offered through U.S. Bank National Association. Deposit products are offered through U.S. Bank National Association. Member FDIC.