Artwork

Content provided by Debra R Richardson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debra R Richardson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Episode 293: In 5 Steps: A Security Audit to Protect Vendor Data and Avoid Fraud

33:10
 
Share
 

Manage episode 423373149 series 2796924
Content provided by Debra R Richardson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debra R Richardson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

When was the last time you reviewed your security roles and what access is included? Reduce the potential for fraud by restricting who has access to your vendor data. Why? Because the less non-vendor team members that have access to sensitive data, the less potential for them to be social engineered into giving it away - resulting in fraud. Discover how the vendor team can implement a security audit with minimal IT input - in 5 steps.

Keep Listening.

Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.

Links mentioned in the podcast + other helpful resources:

  continue reading

294 episodes

Artwork
iconShare
 
Manage episode 423373149 series 2796924
Content provided by Debra R Richardson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debra R Richardson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

When was the last time you reviewed your security roles and what access is included? Reduce the potential for fraud by restricting who has access to your vendor data. Why? Because the less non-vendor team members that have access to sensitive data, the less potential for them to be social engineered into giving it away - resulting in fraud. Discover how the vendor team can implement a security audit with minimal IT input - in 5 steps.

Keep Listening.

Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.

Links mentioned in the podcast + other helpful resources:

  continue reading

294 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide