- Membership
- Certification
- Events
- Community
- About
- Help
Fraud is an ever present threat for AP and AR practitioners. The pages in this section will help you take appropriate steps to prevent fraud - or, understand what to do if you think you are the victim.
As a foundational corporate transactional function, accounts payable establishes the integrity of the supplier master file within the Procure to Pay (P2P) process and ensures accuracy of this
… Read MoreSecurity directors already have a full plate of concerns related to international security risks, but you need to add another, warns James Clapper Jr., Director of National Intelligence. Clapper told
… Read MoreContrary to conventional wisdom, the great majority of cyber attacks do not have a large impact on corporations, according to Dr. Gordon and Dr. Loeb, authors of Managing Cybersecurity Resources: A
… Read MorePhysical security failures are at least partly to blame for why federal officials are ramping up enforcement of current regulations and proposing to strengthen existing medical privacy and security
… Read MoreFew security programs have become as universally implemented as employment screening. In a new survey of employers of all sizes and industries, 94 percent says they have a background investigations
… Read MoreCompanies are overlooking the very real vulnerability of cell phone call interceptions, according to a survey released in December. And it’s not the only security hole that companies often neglect
… Read MoreIn today’s “hyperconnected” global business environment, cybersecurity has emerged as a major compliance challenge for controllers and other corporate leaders. Whether it’s the risk of a data
… Read MoreCyber and breach insurance coverage has become a critical security best practice for many companies. The good news is that the cost of such coverage—not long ago an exotic specialty product—has
… Read MoreCyber thieves are growing ever more sophisticated in breaching company defenses, including by exploiting employees' legitimate use of social media in today's wired business world. For controllers, a
… Read MoreOf 300 security executives included in a SDR survey, only about half said their organizations have specifically addressed social media in computer use policies (see the figure below). But there are
… Read MoreWhat are you waiting for?