Story image

Three ways organisations can prevent fraud and enforce policy compliance

07 May 18

Business insiders are the most common perpetrators of business fraud, making up 36% of all fraud attributed to business management, a 2017 survey from KPMG says.

But how can Australian organisations safeguard against the threat of inside jobs? SAP Concur says it requires proper controls to catch fraud before it happens.

As employees spend more money across different categories and use more payment methods, this leaves organisations vulnerable to fraud and compliance risks – unless they look at solutions that keep pace with employee spending.

SAP Concur’s managing director for Australia and New Zealand, Matt Goss, explains:

“Many organisations think their policies and processes are good enough because they either haven’t had a major issue to rectify, or trust their employees to be honest about their spending. However, there are many things to consider including visibility, security, and compliance. Businesses need the right tools, policies, and procedures in place to bring risks under control.”

The company says there are three ways organisations can prevent fraud and enforce policy compliance.

1. Update policies 
When spending is less structured and centralised, businesses experience gaps in spend data and lose oversight. This is why policies need to be current, have realistic boundaries, and be clearly understood by all employees.

It’s also important to adjust policies to meet spending patterns or needs that may have changed. For example, an increased reliance on mobile devices may result in higher phone bills. Employees should be informed about appropriate expenditures, and procedures if a policy is violated. 

2. Plug any leaks 
Organisations should take some time to review receipts to see if expense reports are matching up. The best way to get a tighter control on expense management is to introduce a corporate card.

This lets businesses monitor employee spending behaviours, eliminate costly mistakes, audit expenses efficiently, and improve compliance. 

3. Automate routine tasks 
Comprehensive, easy-to-understand policy is as important as technology. Manual data entry can account for many issues, including typos, counting receipts twice, or calculation mistakes, which can be mistaken for fraud.

An automated solution that integrates travel, expense, and invoice data creates a centralised information source that brings risks under control. It also gives finance leaders greater visibility into spend. 

 “Adopting a zero-tolerance policy and shining a light on fraudulent behaviour are the most effective ways organisations can deter further fraud,” Goss says.

“Organisations should ensure their processes follow industry best-practices, resulting in time and money savings, and an overall improved experience for employees.” 

5G will propel RAN market to $160b in near future
5G growth is expected to advance at a faster pace than LTE, particularly within the APAC region.
LG takes home over 140 awards at CES
Including Engadget Best of CES Award in TV category for fifth consecutive year for the LG Signature OLED TV R.
Expert comment: Google fined US$57mil for GDPR breaches
The committee examining the breaches found two types of breaches of the GDPR.
McAfee customer choice for Cloud Access Security
“This is the second time that McAfee has been named... and we believe this demonstrates our ability to stay ahead of the pack.”
The message behind the Apple/Samsung iTunes partnership
Futuresource has released its perspective on what Samsung Smart TV’s new iTunes Movies and TV Show app means for Apple as a company.
Cybercrime could cost companies US$5.2tril over next five years – survey
New research from Accenture found that only 30% of organisations are very confident in internet security.
How healthcare can prepare for My Health Record roll-out - Proofpoint
Australia’s healthcare sector is the continent’s biggest cybercrime target, according to a July report from the Australian Information Commissioner.
Achieving cyber resilience in the telco industry - Accenture
Whether hackers are motivated by greed, or a curiosity to assess a telco’s weaknesses; the interconnected nature of the industry places it in a position of increased threat