Artwork

Innhold levert av Debra R Richardson. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Debra R Richardson eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

Episode 293: In 5 Steps: A Security Audit to Protect Vendor Data and Avoid Fraud

33:10
 
Del
 

Manage episode 423373149 series 2796924
Innhold levert av Debra R Richardson. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Debra R Richardson eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

When was the last time you reviewed your security roles and what access is included? Reduce the potential for fraud by restricting who has access to your vendor data. Why? Because the less non-vendor team members that have access to sensitive data, the less potential for them to be social engineered into giving it away - resulting in fraud. Discover how the vendor team can implement a security audit with minimal IT input - in 5 steps.

Keep Listening.

Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.

Links mentioned in the podcast + other helpful resources:

  continue reading

295 episoder

Artwork
iconDel
 
Manage episode 423373149 series 2796924
Innhold levert av Debra R Richardson. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Debra R Richardson eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

When was the last time you reviewed your security roles and what access is included? Reduce the potential for fraud by restricting who has access to your vendor data. Why? Because the less non-vendor team members that have access to sensitive data, the less potential for them to be social engineered into giving it away - resulting in fraud. Discover how the vendor team can implement a security audit with minimal IT input - in 5 steps.

Keep Listening.

Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.

Links mentioned in the podcast + other helpful resources:

  continue reading

295 episoder

Alle episoder

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett