Story image

Three ways organisations can prevent fraud and enforce policy compliance

07 May 2018

Business insiders are the most common perpetrators of business fraud, making up 36% of all fraud attributed to business management, a 2017 survey from KPMG says.

But how can Australian organisations safeguard against the threat of inside jobs? SAP Concur says it requires proper controls to catch fraud before it happens.

As employees spend more money across different categories and use more payment methods, this leaves organisations vulnerable to fraud and compliance risks – unless they look at solutions that keep pace with employee spending.

SAP Concur’s managing director for Australia and New Zealand, Matt Goss, explains:

“Many organisations think their policies and processes are good enough because they either haven’t had a major issue to rectify, or trust their employees to be honest about their spending. However, there are many things to consider including visibility, security, and compliance. Businesses need the right tools, policies, and procedures in place to bring risks under control.”

The company says there are three ways organisations can prevent fraud and enforce policy compliance.

1. Update policies  When spending is less structured and centralised, businesses experience gaps in spend data and lose oversight. This is why policies need to be current, have realistic boundaries, and be clearly understood by all employees.

It’s also important to adjust policies to meet spending patterns or needs that may have changed. For example, an increased reliance on mobile devices may result in higher phone bills. Employees should be informed about appropriate expenditures, and procedures if a policy is violated.  2. Plug any leaks  Organisations should take some time to review receipts to see if expense reports are matching up. The best way to get a tighter control on expense management is to introduce a corporate card.

This lets businesses monitor employee spending behaviours, eliminate costly mistakes, audit expenses efficiently, and improve compliance.  3. Automate routine tasks  Comprehensive, easy-to-understand policy is as important as technology. Manual data entry can account for many issues, including typos, counting receipts twice, or calculation mistakes, which can be mistaken for fraud.

An automated solution that integrates travel, expense, and invoice data creates a centralised information source that brings risks under control. It also gives finance leaders greater visibility into spend. 

 “Adopting a zero-tolerance policy and shining a light on fraudulent behaviour are the most effective ways organisations can deter further fraud,” Goss says.

“Organisations should ensure their processes follow industry best-practices, resulting in time and money savings, and an overall improved experience for employees.” 

Aerohive launches guide to cloud-managed network access control
NAC for Dummies teaches the key aspects of network access control within enterprise IT networks and how you can secure all devices on the network.
Sungard AS named DRaaS leader by Forrester
It was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
emt Distribution adds risk intelligence vendor
Flashpoint has signed emt Distribution to provide channel partners in Oceania and South East Asia a solution for illicit threat actor communities.
CrowdStrike: Improving network security with cloud computing solutions
Australian spending on public cloud services is expected to reach $6.5 billion this year according to Gartner
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.