It’s Monday morning at a busy healthcare supplier. The accounts payable (AP) crew is knee-deep in invoices from medical provide distributors, payroll approvals, and pressing requests from division heads. Amid the flood of emails, one message stands out: a trusted provider is updating their checking account particulars and desires the change made earlier than the subsequent cost run. The request seems to be fully professional – the provider’s brand is there, the e-mail deal with seems to be proper, and the message mentions an ongoing order for lab gear. Pressed for time, the AP specialist enters the brand new checking account particulars and strikes on.
Two weeks later, the provider calls asking why funds have stopped. Solely then does the crew notice that they’ve been sending 1000’s of unrecoverable {dollars} to a fraudster. What appeared like a easy “to-do” has become a disaster that would have been averted with stronger practices for verifying checking account change requests.
Why phony checking account change requests are tougher to detect
At first look, checking account change requests don’t appear to be a serious danger – in spite of everything, suppliers replace their particulars on a regular basis. However fraudsters have discovered that AP departments, particularly in healthcare, are sometimes stretched skinny, with restricted bandwidth to double-check updates. This makes checking account change requests a primary assault vector. They’re routine sufficient to keep away from elevating suspicion, but when profitable, can reroute funds straight right into a prison’s account.
Fraudsters are extra subtle than ever. Their requests:
- Mimic actual communications. Attackers use spoofed e mail addresses or compromise professional ones, making messages almost indistinguishable from precise provider correspondence. These fraudulent emails typically include the suitable logos, formatting, and even writing fashion, which may idiot even skilled AP employees. As cybercriminals refine their techniques, conventional strategies of recognizing typos or uncommon phrasing are now not dependable.
- Exploit urgency and belief. Requests typically include a decent deadline or reference senior executives, pushing AP groups to behave rapidly with out scrutiny. Fraudsters know that healthcare organizations prioritize affected person care and provider relationships, so that they create stress to make the request really feel professional. This tactic performs on human habits, creating an atmosphere the place AP and finance employees really feel they can not delay or query the change.
- Leverage complexity. With 1000’s of distributors, employees battle to know each contact, making fraudulent requests simpler to slide by way of. Fraudsters exploit this complexity by focusing on suppliers who’re much less regularly engaged, assuming employees received’t acknowledge the distinction. The bigger and extra decentralized the group, the upper the chance of a pretend request being neglected.
- Bypass conventional checks. Easy callbacks aren’t sufficient when fraudsters spoof cellphone numbers or impersonate recognized contacts. In some instances, they even acquire entry to professional e mail accounts, that means a callback to the “standard” contact nonetheless leads to the fraudster’s fingers. This creates a false sense of safety, leaving AP groups uncovered to fraud danger.
Greatest practices that make the distinction
The excellent news is that healthcare organizations don’t have to remain susceptible. By adopting stronger, extra constant greatest practices, AP and finance leaders could make it tougher for fraudsters to succeed. These aren’t simply “nice-to-have” safeguards – they’re key defenses in a world the place cybercriminals are actively focusing on healthcare suppliers for his or her excessive transaction volumes.
Listed here are greatest practices that may assist safeguard a company from phony account change requests:
- At all times validate outdoors the request channel. By no means belief emails or types alone. Confirm modifications by way of a separate, trusted contact methodology. If a request comes by e mail, use the cellphone and name a recognized, verified contact quantity, not the one on the request. This step can really feel small but it surely’s typically the distinction between stopping fraud and shedding funds.
- Use multi-level approvals. Require a second set of eyes for all checking account modifications, particularly for big or delicate suppliers. Second reviewers typically catch particulars the primary particular person neglected, particularly when stress or urgency is being utilized. This added management creates accountability and reduces the possibility of a single error resulting in main losses.
- Keep centralized provider data. Maintain present, verified contact particulars in a safe system so employees all the time know the suitable particular person to name. A centralized database reduces reliance on reminiscence, sticky notes, or outdated spreadsheets, that are prime sources of error. By protecting provider information present, you make it far tougher for fraudulent particulars to sneak by way of.
- Educate AP and finance employees. Common coaching ensures staff acknowledge crimson flags and resist urgency techniques. Coaching ought to embody real-world examples of fraudulent requests to assist employees develop instincts for recognizing suspicious habits. Empowered staff usually tend to query uncommon requests and escalate them for correct assessment.
- Undertake automated checking account verification instruments. Know-how can take away human error from the equation and scale safety as a company’s provider base grows. Automated instruments cross-check requests in actual time in opposition to authoritative information sources, providing a layer of protection that handbook processes can not persistently match. This offers finance leaders confidence that each request has been rigorously verified earlier than funds are altered.
How automation helps cease fraud on the supply
Whereas greatest practices construct a robust basis, automated checking account verification is what takes fraud prevention from reactive to proactive. Healthcare AP and finance departments are managing lots of and even 1000’s of transactions weekly, and it’s not practical to anticipate human employees to manually confirm each checking account change request with the identical rigor. Automation provides pace, scale, and consistency to the method, making certain no fraudulent request slips by way of the cracks.
Automated checking account verification offers a stronger, sooner, and extra dependable safeguard by:
- Immediately validating possession. Automation cross-checks checking account particulars in opposition to authoritative information sources to substantiate the provider actually owns the account. This eliminates guesswork and removes reliance on supplier-provided paperwork that may be simply falsified. The result’s speedy readability on whether or not the change request is secure or fraudulent.
- Decreasing AP and finance workload. Automation eliminates the necessity for handbook callbacks or back-and-forth communication. As an alternative, AP employees can give attention to higher-value duties like evaluation and reporting. The time financial savings alone could make automated checking account verification pay for itself in weeks.
- Making certain consistency. Automated checking account verification applies the identical requirements to each request, with out counting on particular person judgment or reminiscence. Guide checking account verification leaves an excessive amount of room for human error, significantly when employees are busy or below stress. Automation enforces uniformity, ensuring no shortcuts or oversights happen.
- Creating an audit path. Automation offers documentation that proves verification occurred, important for compliance and audits in closely regulated healthcare environments. This document is invaluable when demonstrating due diligence to regulators or auditors. It additionally helps defend your group’s repute by displaying a robust dedication to safety.
A safer state of affairs with greatest practices in place
Distinction the sooner “day within the life” with one the place greatest practices and automation are commonplace working process. A phony request arrives, however this time the system robotically flags the request for verification, cross-checks possession, and fails the fraudster’s try. The AP crew is alerted, funds stay secure, and the group avoids a expensive mistake. As an alternative of reacting to fraud after the very fact, this healthcare supplier stays forward of it – safeguarding its suppliers, defending its funds, and strengthening AP’s position.
Closing thought
Phony checking account change requests aren’t simply one other examine field on a fraud prevention listing – they’re one of the speedy and harmful threats dealing with healthcare AP groups at this time. A single lapse can have devastating monetary and reputational penalties. By combining employees vigilance with automated checking account possession verification, finance leaders can remodel AP from a susceptible goal into a robust first line of protection, protecting the group targeted on affected person care.
Photograph: kentoh, Getty Photos
Phil Binkow is CEO of Monetary Operations Networks (FON), developer of VendorInfo, InvoiceInfo and the Vendor Data Administration Heart of Excellence, a number one suite of software-as-a-service platforms that enable finance groups to onboard, confirm and handle suppliers with confidence, scale back price and danger and strengthen compliance.
Previous to beginning Monetary Operations Networks, Phil based and served as CEO of PayTECH, a number one digital bill processing, disbursements and spend analytics platform serving corporations corresponding to Oracle, Cisco, the Hole, Charles Schwab, JP Morgan Chase and NCR. Below Phil PayTECH grew to course of and pay over 100 million invoices yearly. In 2002 FON based The Accounts Payable Community (TAPN), which grew to turn into the world’s largest accounts payable coaching and certification group.
This put up seems by way of the MedCity Influencers program. Anybody can publish their perspective on enterprise and innovation in healthcare on MedCity Information by way of MedCity Influencers. Click here to find out how.


