MP3•Episode home
Manage episode 494940087 series 2796924
Content provided by Debra R Richardson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debra R Richardson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Are you performing security audits, so you know who has access to your systems? Listen to today’s episode to for 4 scenarios when employees or contractors used their system access for fraudulent purposes. Then see how you can get a 5-step plan to perform a system audit.
Keep listening.
Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.
Links mentioned in the podcast + other helpful resources:
- Webinars:
- Collusion Cases
- TD Bank Employee's Bribery Scheme: A $37,000 Fraud That Cost the Bank $72,000
- Postal Service says many checks stolen through the mail are done by its own employees
- Brazilian police arrest IT worker over $100 million cyber theft
- Former Banker Arrested for Allegedly Obtaining $2.7 Million in COVID Business-Relief Funds Using Stolen IDs of Disabled Persons
- Vendor Process Training Center - https://training.debrarrichardson.com
- Customized Fraud Training: https://training.debrarrichardson.com/customized-fraud-training
- Vendor Master File Clean-Up: https://www.debrarrichardson.com/cleanup
- YouTube Channel: https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw
- More Podcasts/Blogs/Webinars www.debrarrichardson.com
- More ideas? Email me at [email protected]
- Music Credit: www.purple-planet.com
362 episodes