Scam Type | How it Works | Protect Yourself |
Business Email Compromise | Fraudsters impersonate an executive, a vendor, or a client via email to trick an employee into sending money or sensitive data. | Implement a verbal confirmation policy. Call the requester using a known, trusted number before authorizing any payment or transfer. Train staff to recognize emails stressing urgency or confidentiality. |
Fake Invoices & Vendor Fraud | A criminal spoofs a trusted vendor's email and sends a realistic-looking invoice with new, fraudulent bank account details. | Require Multi-Factor Authentication (MFA) for all wire/ACH approvals. Cross-reference all payment details against existing vendor records. Do not rely solely on the email. Use a bank service like Positive Pay for check transactions. |
Payroll Diversion Fraud | Attackers compromise an employee's email or target HR/Payroll to request that the employee's direct deposit information be switched to a bank account controlled by the hacker. | Mandate in-person or verified phone confirmation for all direct deposit changes. Require a physical form or encrypted portal upload, not just an email request. Audit access privileges for HR/payroll systems regularly. |
Check Fraud | Criminals physically intercept paper checks, alter the payee name or amount ("washing" the check), or create entirely counterfeit versions for deposit. | Stop using paper checks where possible; switch to secure digital payments (ACH/Wires with MFA). Use Positive Pay to automatically flag altered or unauthorized checks. Store check stock securely and reconcile accounts daily. |