Purchase order cyberattacks: 7 due-diligence steps to take with all vendor emails to A/P
Increasingly clever cybercriminals are out to take your company’s money. They’d even stoop so low as hacking you with a purchase order that looks real.
For example, emails with an attachment disguised as a purchase order can contain links to a bogus site that looks real enough to trick users into sharing sensitive account information.
Because of the volume of email your team handles, and because sometimes these emails can slip though both spam filters and your external sender email warning filter, you could be vulnerable to an attack (or a fraudulent billing scheme) that’ll cost a lot of money to mitigate.
Purchase order attachment best practices
Some important security reminders to pass along to finance staffers:
- Remember that malicious links can easily be hidden in Word documents and PDFs. The only truly safe attachment format is a .txt file.
- Double-check email sender details. If the sender is unfamiliar or if something seems off about the address, it could be suspicious.
- Remember that organizations like Microsoft, your company’s energy suppliers, IRS, the U.S. Postal Service and many more, generally don’t send emails to ask you to open a website to restore some setting or open a purchase order or an invoice.
- If an email attachment comes from someone you know, but normally doesn’t send purchase orders, hold off on opening it and call the sender to verify that it came from them.
- Be suspicious of any email that asks you to open an attachment, or click on a link, to specifically avoid a negative consequence (e.g., a late fee) or to gain something of value (e.g., an early payment discount).
- Be suspicious of any attachment that asks you to open an embedded link because scripting or editing is disabled.
- Don’t open personal emails on company-owned devices and vice-versa.
Finance also needs to watch for these
Speaking of links to malicious sites, your team needs to take extra care with their Google searches. The FBI’s Internet Crime Complaint Center has issued a warning about cybercriminals taking advantage of search engine advertising to impersonate brands and fool unsuspecting users into clicking on links that host ransomware and steal login credentials and other financial information.
Also, a purchase order warrants a closer look if any of these are involved:
- Unexpected changes in pricing
- Staffers processing on behalf of vendors outside of their normal job duties
- Vaguely defined services
- It’s been amended after the invoice has been submitted (An after-the-fact purchase order might just be a requisitioner, buyer or vendor that’s out of policy, and not necessarily committing fraud.)
- Identical items purchased in different amounts simultaneously, or within short periods of time, or
- Recurring purchases that fall just under your review/authorization thresholds.
Free Training & Resources
Webinars
Provided by Yooz
White Papers
Provided by Anaplan
White Papers
Provided by UJET
Further Reading
If a poll of attendees of a recent IOFM webinar is any indication, it’s going to be a very busy Form 1099 reporting season in 2024 fo...
Did you hear about the Snowflake hack? Snowflake is a cloud computing company that got blasted by a series of attacks earlier this spring. ...
Ever feel like you can’t get out from under the work on your desk? Or is it more like the minute you cross off one thing on the to-do...
Companies are having more trouble than ever finding good candidates to fill open positions. The last thing employers want to do is waste ti...
It’s not too late to get tax relief in the form of the Employee Retention Credit that was created as part of the CARES Act in 2020, t...
Now that you have a feel for what positions at your firm should be hybrid, you might be considering giving employees the ultimate work sche...