Safeguarding Your Business From External Fraud - First Utah Bank
eZCard

Business Credit Card

Login
Merchant Services

Hub Access

Login

Safeguarding Your Business From External Fraud

Key Takeaways

What is modern fraud?

As technology evolves, so does fraud. In today’s world, criminals can target your business through sophisticated means, like through your email or ACH payments. In some cases, they may even impersonate you or one of your customers.

What can you do?
  • Preventative controls: Use multi-factor authentication, restrict access to specific locations/hours, require dual authorization for high-risk transactions, and train employees on verification procedures.
  • Detective controls: Regularly reconcile your accounts, get automated Positive Pay alerts for unusual activities, and establish clear reporting protocols for your staff.
  • Corrective controls: Review and strengthen your security after any fraud attempt, and provide ongoing employee education about new and emerging patterns or threats.

Imagine arriving at your office on an ordinary Tuesday to discover your business account has been drained overnight. Your trusted vendor relationships are suddenly in jeopardy because payments can’t be processed. Payroll is due in three days. The bank is sympathetic but explains that the fraudulent wire transfers initiated from your account followed all security protocols and appeared legitimate.

Someone had been monitoring your email communications for weeks, learning your payment patterns, vendor relationships, and even mimicking your writing style. It wasn’t a random attack — it was a meticulously planned operation targeting your specific business. This scenario unfolds for countless small business owners every year, often with devastating consequences.

Understanding modern fraud

Understanding modern fraudToday’s fraudsters aren’t just opportunistic thieves, they’re strategic professionals who view your business as a potential target. They research thoroughly, craft elaborate schemes, and exploit both technological vulnerabilities and human psychology. It’s common for these fraudsters to target small businesses, especially if they lack the kind of robust security infrastructure commonly seen among larger organizations.

What makes modern fraud especially troubling is how personal it can feel. Fraudsters take time to understand your business relationships, communication patterns and operational procedures. When they strike, they often do so by exploiting the trust you’ve built with employees, vendors and financial institutions.

Email fraud

Email fraudBusiness Email Compromise (BEC) represents one of the biggest threats to small businesses today. It begins when fraudsters gain access to your email system, either through phishing attacks or compromised passwords. They silently monitor communications for weeks or even months, studying your relationships with vendors, financial institutions and internal processes. They learn how you communicate, who you trust, and the patterns of your financial transactions.

Once they’ve gathered sufficient intelligence, fraudsters might pose as you to contact your financial institution, requesting changes to account access or attempting to add new users with transaction capabilities. They often provide convincing documentation by repurposing materials found in your email history.

Typically, their end goal is to initiate unauthorized financial transactions, like wire transfers, ACH payments, or other rapid fund movements. Without proper controls like dual authorization requirements, these transactions can drain your accounts before anyone realizes what has happened.

Impersonation Fraud

Impersonation FraudImpersonation fraud takes the threat beyond your computer and involves physically impersonating people connected to your business. Criminals will assume the identity of business owners, key employees, vendors, or even regulators.

What makes impersonation fraud particularly effective is the way it exploits service culture. Financial institutions and service providers train their staff to be helpful and accommodating, creating an environment where challenging someone’s identity might seem like poor customer service. Fraudsters deliberately establish rapport with staff, often engaging in extended conversation to build credibility. They may also create false urgency or emotional appeals to bypass security procedures.

Payment Fraud

payment fraudDespite the shift toward electronic payments, check fraud remains surprisingly common. Fraudsters will steal checks from the mail, alter legitimate checks, create counterfeits using information from stolen checks, or use information gleaned from checks for other criminal activities.

What many business owners don’t realize is that checks contain a wealth of sensitive information, including account numbers, routing numbers, business addresses, signatures and sometimes even the opening date of the account. A single compromised check can lead to multiple fraud attempts across different channels, creating a cascading set of problems for your business.

How to protect yourself

How to protect yourselfIt might seem as if fraud is getting more and more complex, and almost impossible to catch. But, you can still protect yourself with thoughtful preventative measures. By creating barriers between fraudsters and your assets, you can keep your business safe.

For instance, simple password protection is no longer sufficient in today’s threat environment. Instead, try implementing strong multi-factor authentication that goes beyond security questions (which can often be researched on social media). Authentication apps, hardware tokens, or biometric verification for sensitive systems create stronger protection.

Consider your physical work environment when designing security measures. If your accounting staff works from a consistent location, you can restrict system access to specific IP addresses. While this creates some inconvenience for mobile access, it significantly reduces risk by preventing access from unauthorized locations. Think of it as locking your digital doors just as you would your physical ones.

Time restrictions can also add meaningful protection. If your financial activities typically occur during specific business hours, restricting access to those hours prevents fraudsters from attempting access. Fraudsters often prefer to operate outside normal business hours precisely because they know monitoring may be reduced.

Perhaps the most powerful preventative measure is dual control for high-risk transactions like wire transfers or ACH payments. Some systems can even support multiple approvers for particularly sensitive transactions. While this creates an extra step in your process, the protection it provides far outweighs the minor inconvenience.

Detecting problems quickly

Detecting problems quicklyEven with strong preventative measures, determined fraudsters may still find a way to break through your defenses. The key to minimizing damage is quick detection. Regular account reconciliation helps identify unauthorized transactions quickly. The sooner fraud is detected, the better the chances of recovery.

Configuring your banking and accounting systems to flag activities outside normal patterns can add another layer of protection. These alerts might include transactions above certain thresholds, payments to new vendors, or unusual timing of activities. The goal here is to create awareness of potential issues before they become major problems.

Establish clear procedures for reporting suspected fraud, so that everyone knows what to do if something seems amiss. Minutes matter, especially with electronic payments where funds can be quickly transferred multiple times to obscure the trail.

Learning and adapting after an incident

After any fraud attempt, successful or not, it’s important to review and strengthen your internal security. Regularly educate your employees about emerging fraud techniques and prevention, so that your team is informed.

While technological controls are essential, many successful fraud schemes exploit human psychology. Training your employees to verify requests for payments or sensitive information through secondary channels creates a culture of healthy skepticism. Most importantly, help your staff understand that excellent customer service doesn’t necessarily mean bypassing security protocols.

Prevention is key

Prevention is keyMany business owners hesitate to put robust controls in place, due to perceived costs or inconvenience. But it’s important to remember that the financial impact of fraud isn’t limited to the initial loss. There might be additional costs to investigate, legal expenses, reputational damage, lost productivity, and other complications that arise as a result of fraud.

Fraud prevention isn’t just risk management, it’s a sound business investment that protects everything you’ve worked so hard to build. The peace of mind that comes from knowing you’ve taken reasonable steps to protect your business is valuable in itself, allowing you to focus on growth and opportunity rather than worry about threats.