In our debut episode, Nvoicepay President Josh Cyphers shares insight about how automation influences the economic picture for companies across all industries.
A particular faction of fraudulent activity—‘BEC’, or Business Email Compromise—has gained notoriety over the years and is such a large operation that it’s become more of an umbrella term for various attacks. Among these subsets comes the newer term, ‘VEC’, or Vendor Email Compromise.
If there’s one thing payment companies of any caliber are familiar with watching out for, it’s Business Email Compromise. Here are some of the most common BEC techniques that fraudsters take advantage of.
Our subject matter experts show you how Viewpoint ePayments enable you to meet the challenge of crisis-era payment fraud with a holistic solution that also boosts efficiency and reduces costs.
Learn how modern protective measures, which use a combination of technology and customer service, can defend your business from bad actors.
When updating security processes, companies may forsake nimble fintechs in favor of familiar powerhouse banks. However, betting on the slow and steady horse may not win you this security race.
Hear directly from Wilson Malone of Slurry Pavers how Nvoicepay helped his team streamline the payments process while mitigating risk for the company in this recorded webcast.
Exceptions and payment errors in processing invoices and payments can cost your company and accounts payable team money and time. Automated payments can help your AP team manage the mistakes.
Companies in all sectors of the chemical industry can alleviate some of the pressures of regulatory compliance by incorporating software technology to keep compliance risk and costs relatively low.
P-card and invoice fraud happens. It's inevitable in any department that handles large sums of money. But you can limit your risk with these internal controls.
Today's organizations are on the hook for compliance screening. Here’s a list of regulatory organizations and the specific department in their crosshairs.
Need to establish a new customer-supplier relationship screening process? Combining regulatory and compliance screening programs can help. Here's how to do it.
When and why to apply the Know Your Customer (KYC) laws are complicated. Here are 4 ways to reduce the complexity of applying KYC controls.
From real estate to retailer, money laundering affects many industries. Instead of allocating an ever-growing part of the budget for AML efforts, take these steps to ensure your company is...
With the increased use of technology in our lives, cyber criminals have more chances to steal. A list of common cyber attacks and tips for fraud prevention.
With penalties levied in amounts surpassing a small country’s GDP, the FCPA seeks justice for companies that break the law. Here are 2016’s top offenders.
Can you reduce risk through automation? Yes! This list contains 10 P2P automation solutions that procurement managers can use to reduce risk.
Best practices for supplier management should be established from the top down. Learn how compliance with GRC standards can safeguard your management process.
The internet has made paper check fraud through forgery easier. Payment automation software not only helps reduce the risk of cyberfraud but saves time in AP.
Arguably the most common form of AP fraud is check forgery, but how can you safeguard your company against other types of fraud? You can react to the perils of paper checks, or you can get...
As cloud technology takes hold, some companies are quick to adopt new processes, but many others are hesitant. Can the cloud meet compliance requirements?