Training

Phishing Awareness + Internal Controls and Processes = More Effective.

Use authentication techniques, internal controls and processes that will stop phishing attempts from being processed.


 
Authentication. Validation. Management.jpg
 

Vendor Master files have always been the base of the Procure to Pay process, but in today's reality of cyber-attacks and fraud, it is now getting the attention it deserves.  Whether you have no clearly defined process, a paper/electronic form or a  vendor self-registration portal, vendor setup and maintenance processes can be improved to reduce the potential for fraud in the vendor master file. Real Vendors.

  • AP System/ERP Agnostic

  • Authentication Techniques, Internal Controls & Best Practices

  • From Manual Process to Self-Registration Portal and Every Level in Between

  • Online Training for You and Each Team Member in 90 Minutes

  • Get the eGuide and Implement Processes Today

  • Get the Toolkit to ReDesign Your Vendor Setup & Maintence Process

  • OnSite Training & Implementation Services Available


IOFM Member? Check Out Their eLearning

iofm15_4c_horiz
IOFM Master Class.jpg

Vendor Master File

Use Discount Code HAPPY19 for 10% Off