eGuide - 3-Step Vendor Setup & Maintenance Process

Copy of 3 Step Vendor Setup & Maintenance Process
Course Content Thumbnail.jpg
Copy of Authentication Matrix
Thumbnail - Vendor Validation Reference List.jpg
Copy of 3 Step Vendor Setup & Maintenance Process
Course Content Thumbnail.jpg
Copy of Authentication Matrix
Thumbnail - Vendor Validation Reference List.jpg

eGuide - 3-Step Vendor Setup & Maintenance Process

99.99

Revitalize your Vendor Maintenance processes to protect your company against regulatory fines and prepare your team for today’s cybercriminals.  Implement internal controls and best practices to prevent occupational fraud and other unnecessary expenditures.

  1. Authentication  - Techniques to confirm the data you received for the Vendor Master File is not fraudulent. 

  2. Validation - Confirmation that the vendors entered into your Vendor Master File are real.

  3. Management - To maintain your clean Vendor Master File by performing periodic maintenance on existing vendors.

Authentication Techniques, Internal Controls and Best Practices.

Includes:

  • Vendor Validation Resource with Links

  • Authentication Matrix Template

74 Pages

Add To Cart
  • Your company’s IT resources have controls in place to protect your systems, but who trains your vendor team to authenticate requests and spot fraud attempts? Today’s fraudsters are targeting your vendor team to release vendor sensitive data using phishing and other social engineering schemes through voice and email.

  • Fill the gap by providing training for you and your team members to reduce the potential for fraud.

  • Implement internal controls and authentication techniques to protect you and your team members from adding fraudulent vendors or updating existing vendors with fraudulent data in your vendor master file.

  • Apply a vendor setup and maintenance process that authenticates, validates and manages your vendor master file for valid active vendors.

  • Supplement vendor portal solutions with these internal controls, validations and authentication techniques where needed. 

  • Nothing is 100% fraud proof, but authentication techniques, internal controls and best practices applied as needed can assist in reducing the potential for fraud in the vendor master file.