Media and Technology

Loading...

Discover how business identity theft threatens B2B firms and learn effective strategies to protect your business and clients. Stay informed and secure.

Published: July 23, 2024 by Nathalie Stecko

Supplier risk management has become a top priority for procurement and supply chain professionals. With rising regulatory and compliance fines and the global market disruptions caused by trade wars and the pandemic, a robust supplier risk management program is crucial. Gerard Smith, President and Co-founder of Global Risk Management Solutions, shares insights on creating a world-class supplier risk management program. In this interview, discover the essential components and strategies to effectively manage supplier risk and ensure compliance and stability in your supply chain. Evolution of Supplier Risk Management Practices Twenty years ago, when I was in procurement, many organizations self-performed everything. In other words, they collected documents and validated them as best as they could. The issue today is with COVID. With COVID, many companies are concerned. The two things we keep hearing about is the financial stability of the suppliers. Are they financially stable? Not only today, but in the foreseeable future, and secondarily, do they have insurance to protect the client company if there are any errors. So, it's the financials currently, and the insurance companies are most concerned about monitoring. Increasing Complexity in Supplier Risk Management Companies are starting to source globally, and more and more companies are concerned about the supply chain and if there are issues, whether geopolitical or whatever the case may be. So the idea here is to manage supplier risk proactively, and so there are three components of that. First, based on a client's requirements - the ability to do the risk assessment based on specific risk components. Second, having a help desk to try and troubleshoot where there are issues with the suppliers to help them to get into compliance. And third, most importantly, being able to monitor those suppliers for changes in status and getting actual push alerts, to be able to act on those. So, in other words, getting in front of the problem versus finding out that a supplier perhaps filed bankruptcy or showed up on a government watch list or something like that. Key Components of a World-Class Supplier Risk Management Program If a company wishes to have a world-class supplier risk management program, there are five crucial components that you would want to see, they are: Customized Risk Program A Customized Risk Program is tailored to address specific risk components relevant to a company's unique needs. This customization can take various forms: Geographical Considerations: Different regions, such as EMEA (Europe, Middle East, and Africa) and APAC (Asia-Pacific), have distinct regulatory requirements and market conditions. A Customized Risk Program can adapt to these regional differences, ensuring compliance and appropriate risk management practices in each area. Spending Levels: Companies often have both strategic and non-strategic suppliers. Strategic suppliers, with whom the company spends more, may require a more thorough and detailed risk assessment compared to non-strategic suppliers. Customizing the risk program based on spending levels ensures that critical suppliers are monitored more closely. Specific Risk Factors: Different industries and companies face unique risks. Whether it's financial stability, compliance with specific regulations, or reputational risks, a Customized Risk Program can focus on the most relevant risk factors for the company. The key objective of a Customized Risk Program is flexibility. It must be able to adapt to various factors such as geography, spending, and specific risk elements, ensuring it is not a one-size-fits-all solution but rather a bespoke approach to managing supplier risk effectively. Adjudicating Information This involves the critical process of verifying and clarifying data to ensure accuracy. This means systematically identifying and eliminating false positives, which occur when incorrect or irrelevant information is selected. For instance, if you input "Bob's Plumbing" into a database, you might receive numerous results for companies with similar names. The challenge is to determine which "Bob's Plumbing" is the correct one that your company works with. Adjudicating information requires sophisticated methods to accurately select the correct entity and cross-verify the details, ensuring that the data is precise and applicable to your specific supplier. This process is essential for maintaining the integrity and reliability of your supplier risk management program. Reporting In a supplier risk management program, reporting capability is vital for maintaining consistent and measurable compliance standards. This involves generating real-time, standardized reports that provide current risk ratings for all suppliers. With these reports, management can quickly identify which suppliers are in compliance with set standards and which are not, along with the reasons for non-compliance. Additionally, the reports highlight any ongoing issues within the supply chain, enabling management to address problems promptly. Effective reporting ensures transparency, accountability, and the ability to make informed decisions based on up-to-date risk assessments. Document Verification and Monitoring In a supplier risk management program, Document Verification and Monitoring is crucial for ensuring the authenticity and accuracy of the documents submitted by suppliers. While collecting and managing documents can be straightforward, the challenge lies in verifying their validity. Many procure-to-pay, source-to-pay, and ERP platforms face this issue, as they often rely on suppliers to upload documents without proper verification. This can result in the acceptance of invalid or even blank documents. To address this, a robust system or process must be in place to validate key documents such as certificates of insurance, W9 forms, and other critical documentation. This system should not only collect documents but also authenticate them, ensuring they meet the required standards and are current. Continuous monitoring of these documents is essential to maintain compliance and mitigate risks associated with outdated or fraudulent information. By implementing thorough document verification and monitoring, companies can ensure the integrity of their supplier risk management program. Continuous Monitoring Continuous Monitoring refers to the ongoing, real-time oversight of supplier activities and conditions to promptly identify and address potential risks. A primary focus of continuous monitoring is assessing the financial stability of suppliers. This means regularly evaluating their financial health to detect any signs of trouble. If a supplier shows indications of financial distress, such as declining financial metrics or negative market signals, the company can take proactive measures, such as halting purchase orders, to prevent potential disruptions in the supply chain. Continuous monitoring ensures that companies can swiftly respond to changes in a supplier's status, maintaining the reliability and integrity of their supply chain operations. Critical Risk Components for Effective Supplier Risk Management There are eight different risk categories. The risk components that companies should at least address within their program. Financial Stability Financial stability is monitoring financial stability in real-time and be able to identify if there are issues whether they are getting in worse financial shape or perhaps getting in better financial shape. Digital Insurance Verification The best practice right now is what's called digital insurance verification. We're able to manage insurance coverage electronically. We don't even have to collect a certificate of insurance anymore. We can do it digitally in North America. That means that we can monitor a supplier to ensure that they continue to have the insurance requirements daily, which is a unique situation. So you want to make sure, at a minimum, you collect the certificate of insurance. If you want the best practice, you do digital insurance verification. Reputational Protection We do global adverse media monitoring. So as an example, we manage over 25,000 media sources around the globe looking for negative stories because you want to know if your supplier is caught with child labor, or if they've closed a facility somewhere in the world that you're reliant upon. So adverse media is very big at this point because things are evolving very quickly. Regulatory Compliance Regulatory compliance is basically anything that's government regulation. So, it could be the various sanctions lists. Most people don't recognize there are over 1500 watch and sanctions lists around the globe including the U.S OFAC list. That's a big one. It can be a Conflict Minerals Declaration, U.K. Modern Slavery Act, Reach ROHS, the California Transparency Act, anything that's a government regulation falls into that category. Cyber Security Cyber Security would be anything that's involved with data and document verification. It has to be able to collect and validate not only the documents such as a code of conduct, but documents with an expiration date such as an NDA or a diversity certificate. Any standardized documents should be part of the program so suppliers don't get continuously contacted for more documents. Social Responsibility Social responsibility could be anything from diversity verification, child labor, those types of things. Document Management Validate key documents such as certificates of insurance, W9 forms, and other critical documentation. This system should not only collect documents but also authenticate them, ensuring they meet the required standards and are current. Continuous monitoring of these documents is essential to maintain compliance and mitigate risks associated with outdated or fraudulent information. Health and Safety Finally, health and safety could include an HSC questionnaire,  EMR ratings, or OSHA statistics. Those are eight areas that companies should at least consider looking into as far as potential risk components. Obviously, there are different parts of each, one of those where those are the broad categories. Global Supplier Risk Assessments: Reliability and Challenges Dependingon what country we're speaking of. Is the information available? Yes, there are varying degrees of information. You can get more information in North American and EMEA than you can say in APAC or South America. Is it available? Absolutely. We can do a supply risk assessment in over 120 countries. So, it is possible to get information. There is standardized information in terms of the adverse media I spoke about. The watch and sanctions list, those are all global. There's a variety of things that can be managed globally. Some of it, in terms of the financial, for instance, it depends on which country we're talking about and how much information can be obtained within that country, and secondarily, whether it can be monitored on an ongoing basis. Again, it depends on which country we're speaking about. In summary Establishing a world-class supplier risk management program involves understanding the evolution of risk management practices, addressing increasing complexities, and incorporating critical components such as financial stability, digital insurance verification, and continuous monitoring. By proactively managing supplier risk, companies can safeguard their supply chain and ensure compliance. Want to go deeper? Watch our on-demand webinar with GRMS If you would like to hear more about GRMS, watch our on-demand webinar Mitigating Supplier Risk in A Changing World." Gerard goes into greater detail on best practices and how you can proactively manage supplier risk management while staying resilient and the new normal.

Published: September 28, 2020 by Gary Stockton

As business delinquencies rise in response to COVID-19, credit departments are becoming increasingly challenged.  In our August 13th Sip and Solve webinar, John Krickus and Andrew Moore will be on hand to share some strategies for maximizing receivables amid rising delinquencies. Managing receivables has never been more important or more challenging. Traditional approaches may no longer apply. In this 15-minute Sip and Solve session, we discuss some solutions for effectively and efficiently handling the increase in receivables many companies are facing. After watching this talk you will learn three key takeaways: Prioritizing receivable management in today's environment Analytic tools for managing receivables Flexing receivables strategies to meet your company's priorities Click to view full slides and transcripts from this session.

Published: July 28, 2020 by Gary Stockton

In a favorable economic climate, business resilience is often treated as an afterthought. Success is measured in rapid growth and leaps of progress, while failure is little more than a tempering of that expansion. It’s only when things slow down - like during a global pandemic - that companies are forced to take stock of the ground they stand on. As the economy slows to a crawl and entire industries feel the squeeze, business resilience will determine which organizations make it through to the other side. Whether you’re on the supply side or the demand side, chances are your organization is being tested right now. Here are some practical strategies to stay resilient in the time of Covid-19. Gerard Smith, President of Global Risk Management Solutions (GRMS), works with companies who are either on-boarding new suppliers or evaluating current suppliers. When the Covid-19 pandemic disrupted supply chains in most industries, many of these companies started scrambling to find replacement suppliers. Finding a reliable supplier is always a challenge, but it’s even more difficult during a global pandemic and economic crisis.     The best practice here is still to vet new suppliers carefully. Smith’s company creates a risk assessment program for Experian clients that analyzes 50 different financial and legal components, including the following: If they’re on the OFAC sanctions list If they’re financially stable If they actually have the certifications they claim to have If they have insurance If they’ve received negative press Many companies fail to do their due diligence when it comes to suppliers, especially if they’re trying to fulfill orders quickly. More often than not, this leads to bigger problems down the line. If you hire a supplier that’s hemorrhaging money, for instance, they may file for bankruptcy right after you pay them for a major shipment. Companies that use GRMS will be notified regularly if a supplier’s financial or legal status changes. If a supplier cancels their insurance coverage, for example, that could indicate financial struggles. Staying abreast of information like this allows businesses to be proactive with suppliers and avoid being blindsided. Make Sure Clients Are Financially Healthy On the flip side of the buyer-supplier relationship, suppliers are now being asked to extend due dates. Deciding how to comply with these requests can be tricky. Most want to be understanding and reasonable, but there is often legitimate concern over whether they’ll receive payment. Brodie Oldham, Senior Director of Analytic Consultancy for Experian, said Experian offers several services for suppliers who need to gauge how reliable their customers are in this moment. Experian has a special Covid-19 risk index that suppliers can overlay on top of existing credit models. This tool can help determine whether or not a client is in an unstable financial position. If the company operates in a highly impacted part of the country or industry, the supplier can use that information to change the terms. For example, they can sell fewer items to minimize the risk of an unpaid invoice. Experian also monitors credit utilization for business credit cards and other lines of credit. If a company’s credit utilization surpasses a certain threshold, they can alert the supplier who can halt future shipments until the utilization decreases. Find Faster Ways to Evaluate Creditworthiness Many suppliers depend on a company’s credit information to determine its reliability as a buyer. Likewise, credit bureaus are being forced to reevaluate their models in response to the changing business landscape brought on by Covid-19. Enter the agile credit function. The term agile has traditionally been used in the context of software development to describe an iterative approach where requirements and solutions evolve through collaboration between cross-functional teams. It allows companies to adapt to new requests quickly and improve time-to-market. Agile is all about being nimble and responsive - something credit bureaus are prioritizing in today’s uncertain economy.   Agile credit means finding new, faster ways of evaluating customers and determining their ability to pay, in a time when that information can change daily. “When everything shut down in March, credit people got thrown for a loop,” said Dan Meder, Vice President of Consulting, Product Marketing and Alliances for Experian Business Information Services. “They needed a way to manage that change very quickly.” That’s where having an agile credit approach comes in. “It’s about using agile principles in your credit function to respond more quickly to changing market needs,” Meder said. Using an agile credit system helps suppliers decide what kind of terms to offer their customers. Many companies are asking suppliers to extend their terms and due dates, often switching from net-30 to net-60. Suppliers then have to decide if they can trust these companies to repay them within that longer time frame, Meder said. If companies in this position use an agile credit function, they can be more responsive and confident in the terms they set out because they’re basing their credit policies on the current state of their customer environment. This requires operating with the latest possible information on how current economic conditions are affecting their customers. Meder said that making credit function more agile requires direction from the head of the credit department and other members of that department. They can also utilize software programmers if the automatic process needs to be updated or any outside consultants for specific analytical expertise. “The idea is to bring together a team of people with direct involvement in managing the credit function to assess how best to manage the customer experience given the current state of the customer environment,” he said. “This includes setting policies around risk assessment as well as credit terms and collection processes.” Meder said companies should have technology that allows them to tinker with their credit function so they can make changes quickly. “This is especially true in a fast-changing or uncertain environment such as what we are seeing with COVID-19 and the uncertain effect it is having on our economy’s future,” he said. “In fact, it is turbulent times such as these where being “agile” is most important since the credit department needs to be able to alter course quickly if the customer environment changes for better or for worse.” Consider Being Flexible With Clients While delayed payments from clients is upsetting, avoid taking your current client relationships for granted. While a more stringent approach from suppliers is understandable right now, Meder cautions companies to remember that the pandemic will end at some point. At that time, companies will remember which suppliers were flexible about payments, due dates and terms - and which companies weren’t. “If you weren’t good to them while they were struggling, they’re going to forget about you when things turn around,” Meder said. To find out how fine-tuning your company’s credit function can help it weather the current economic crisis, reach out to your Experian representative.

Published: July 20, 2020 by Gary Stockton

Experian Business Information Services recently introduced a powerful new marketing platform called Business TargetIQ. Product Manager, Kelly DeBoer answered a few questions about the product and described use cases that promote greater collaboration between credit and marketing departments. What does Business TargetIQ do? Business TargetIQ is our new marketing platform so it's a B2B marketing platform where clients can access data for marketing applications. How is it different from other business marketing platforms? It is unique in that it not only includes your standard or core firmagraphic information but also includes Experian's credit attributes. Does it have credit data? What does that mean to marketing or collaboration? Typically marketing data and credit data are housed in separate silos of information. With this tool the information will be combined together which will allow the tool not only to be used in traditional marketing applications for targeting but can also be in that risk factor which applies to different divisions within our client's applications or use cases of the data. Who would most benefit from Business TargetIQ? The thing about Business TargetIQ is it truly applies to all different verticals, as well as all different contacts within the company. So whether it's a financial vertical or a trade vertical, retail, just across the board all clients can utilize this. Anybody that's doing marketing can utilize this platform. What core problems does Business TargetIQ solve? It solves a lot of different problems, so, the most common client issues that are brought to our attention are gaps in data, as well as in the marketing initiatives. So they may have data in-house but they have holes within the data. Our tool will allow them to not only upload their client records and fill in a lot of those gaps that they may have, whether it be contact information, or firmagraphics or address information. It will standardize that data and fill in those gaps. But will also provide the means to again use that data. Our business database which has over 16 million records. They can then utilize that information for prospecting, for data append, for analytics, for research applications, so it solves a lot of problems with regard to marketing and data concerns. How does credit data help with prospecting? So what we find is clients come to us and they may say you know I have an idea of what our clients look like, they're in this SIC or in this industry code, or they have this sales volume or employee size, but what they may not know is on the back end which really helps identify and target those businesses is the credit attributes, so the risk factors around those. So do they have delinquencies in their payments? Have they filed bankruptcies? Do they have UCC filings? So it allows them to take it that next step and not only really define what their clients look like, but identify clients that look like that. Learn More About Business TargetIQ

Published: November 5, 2018 by Gary Stockton

When a new customer wants to establish credit terms with you, the first thing they’re asked to do is fill out your credit application. When you hand over a paper application, did you know you could be negatively impacting your revenue or creating a poor customer experience? Some companies don’t. More than likely, your customer has filled out at least one digital application in the past. The initial perception your application says about your company is that you’re out of step with technology — which may lead them to wonder where else you may be lagging behind. Digital applications provide a simplicity factor, and by not offering one, your credit approval process is perceived to be more difficult, leaving the customer with more work to do —spending extra time writing their information by hand and returning the application — either by email, fax, or in person. Because many companies have already moved to a digital application, your pen-and-paper process sticks out to the customer — and not in a good way. Not to mention, manually processing a paper application takes longer — often much longer — than a digital application. This means customers leave without a credit approval, giving them time to change their mind about their purchase or find a better deal — meaning you just lost a new sale. And even if they still choose to work with you, their relationship with your company starts out with a less-than-amazing customer experience. After the paper application is completed, the workflow process is often time-consuming, error-prone, and cumbersome. The time involved also means that your company waits longer to receive revenue from the sale. By using a manual process, your team spends hours on processing and decisions that could be better spent directly servicing customers or working on other initiatives to grow business. DecisionIQ from Experian automates consistent real-time decisions, streamlining your entire process from applications to onboarding.

Published: July 24, 2018 by Erikk Kropp

You likely go to great lengths to protect your own identity from fraud and theft. But are you actively protecting your business’s identity as well? Even more importantly, do you make sure you are not doing business with fraudulent companies that have been victims of identity theft themselves? In many ways it’s harder to protect your business identity than your consumer identity. Information about most businesses is publicly available – and as easy to find as a simple Google search. Because businesses self-report much of their own information, it’s easy for a thief to add their name or address to a company. To make it even easier, many businesses do not protect their EIN the same way as they secure their SSN – which they should. At first glance, you may think having your personal identity stolen to be more damaging than a business identity. But in fact, the opposite is often true. Business owners often personally guarantee loans, even if the loan turns out to be fraudulent. And then if a business must close its doors due to the losses from the theft, the business owner now has no income and must repay the loan. How Business Identity Theft Happens Some thieves steal business identities by purchasing a shell corporation. Others take over a company’s data. But regardless of how the left happens, the criminals often go to great lengths to mirror the company. Some even rent space in the same building as the original company and using the same suppliers. At this point, the fraudulent company can start physically intercepting deliveries as well as applying for loans and credit, posing as the original company. Criminals start with one piece of information that is real, such as an address or EIN number. And then start operating as if they are the company and changing the data. Criminals often wait patiently while building up their reputation and credit history, then “bust out” with a large amount of fraudulent activity in a short period of time, and then walk away before they are discovered. Protect Your Own Business Identity Business owners must constantly monitor their business information to spot red flags that criminals have taken over. The earlier the theft is discovered, the less damage that occurs. Here are three things to look for to spot business identity theft of your own business: Look for new addresses added. Check your credit reports and government filings to verify the address. One of the first signs of theft is often a new address added to your business information. Verify that new registered owners have not been added. Thieves will often add a new principal — CEO, owner or partner — to the list of owners. The criminals can then conduct business as if they are an owner. Check business accounts daily. Use online banking — which also reduces the risk of stolen paper statements — to look for any transactions that you or your employees did not make. Consider setting mobile alerts for suspicious transactions to spot issues even faster. Verify Your Customers are Not Fraudulent Companies Before doing business with a company, do a business verification by making sure the company is who they say they are and not a and not a fraudulent company. Since verifications cost time and money, take each customer on a case-by-case basis regarding how deep to dig. If a customer orders $100,000 worth of computer equipment, you should do a more thorough investigation than for a business ordering a single $500 laptop. However, anytime you are extending a line of credit to a company, you should deep dive into a companies' history and data because you are taking on a high risk. Stacking loans is a common tactic – meaning companies take loans from multiple companies at the same time. Because many companies often verify customers by looking at their relationship with the business, they are verifying in a vacuum instead of seeing the entire picture. By using databases and tools that provide a holistic view of all activity, it becomes much easier to find the fraud. Here are five things to look for when verifying a company: Verify the EIN number. One scheme is to use a different EIN number and have all other pieces of information the same. Make sure the company you are doing business with is using the same EIN number as the legitimate company. Consider the number of open lines of credit. Because fraudulent companies often open multiple lines of credit at the same time, determine the current amount of open credit. Multiple large lines opened around the same time can be a red flag. Look at the number of sub-companies and activity between the companies. Criminals often set up a fraud ring by operating as sub companies underneath a single company. The “companies” then loan money to each other to boost credit scores and credibility. Note for periods of dormancy. When a business identity is first stolen, the criminals set up the company and then go dormant to build credibility through age. The company will then “bust out” by making a lot of transactions very quickly with multiple companies. Look for additional addresses. Check to see if the address you have been given is the same as the company’s headquarters. Multiple similar addresses can be a red flag. As business identity theft continues to rise, you must keep your eyes open for signs of theft — both with customers and your own business. A single credit check or google search simply isn’t enough. You owe it to your business and your future.

Published: June 5, 2018 by Gary Stockton

Your company is dependent on many different people — customers to buy products, employees to provide excellent customer service, and vendors to provide services. However, it can be challenging to have an accurate picture of all aspects of vendor relationships. By having clean and connected vendor data, you can more quickly deploy Enterprise Resource Planning (ERP) software. Challenges of Knowing Your Dependency on a Single Vendor Because departments often make their own vendor contracts — hardware, services, office supplies — the relationships are typically not stored in one place and often are in siloed databases. Human resources, marketing and product development could all have independent contracts with the same cloud-software provider for file sharing, and not be aware of the other relationships. It becomes even more confusing because vendor contracts for the same company may have different addresses for satellite locations. Human error also comes into play with typos in addresses and company name spelling mistakes. Companies may merge with each other. Or an office may move to a new location. This makes it challenging, if not impossible, to see a clear picture of your entire relationship with each vendor. Why Vendor Dependency Matters When you know your dependency on a vendor, you can understand your risk and better negotiate volume discounts. If a vendor that provides 45 percent of the materials needed to manufacture a specific product runs into supply issues or is facing serious financial issues, your company knows the impact from the start and can make alternate plans. You can also contact the cloud-software provider used by three departments and ask for preferred pricing based on an accurate number of users.  If a vendor is also a customer, knowing your dependency lets you assess the balance of trade between the two companies, meaning how much you buy from the company compared to how much the company purchases from you. Correct vendor profiles are also essential for successfully using ERP. If the vendors are not connected or inaccurate data is imported, the ERP cannot show all relevant data for an organization in one place. You must start the ERP process with clean and connected data for ERP to improve the efficiency of your business and its resources. Otherwise, the deployment process takes longer, and you won’t get all the available benefits an ERP provides. Three steps to preparing vendor data for ERP deployment: 1) Clean your data. You must first clean your data for a consistent view of vendors across all files. Manually going through vendor files would be exceptionally time consuming and error-prone. By using Experian data and technology, you can quickly use databases of company information to correct errors and other issues in the data. 2) Enrich data for an accurate view of relationships. The next step is linking the businesses together across files and departments using a single unique Identifier. Experian’s Business Identification Number (BIN) product, makes this process accurate and quick. Your company can then see a real-time view of current and past orders with each supplier. You can also add additional data, such as credit scores and other supplier-related data. 3) Create a company hierarchy. Even though all the contracts are technically with a single company, departments may be working with a specific division or location for their services. This becomes important if divisions are sold or reorganized. By using a tool, such as Experian’s Corporate Linkage product, you can link the companies into a corporate hierarchy to provide an even clearer view of the relationships. Start getting ready for using ERP software by cleaning, enriching and linking vendor data. The next time you see a vendor mentioned on the news — data breach, bankruptcy, scandal — you don’t have to wonder what it means for your company. With a few clicks, you’ll know your dependency and can start planning. To learn how Experian can help you clean, enhance and link vendor data to speed up ERP deployment, visit www.experian.com.  

Published: April 24, 2018 by Gary Stockton

The lease for the $50,000 office equipment seemed like any other order at first glance. The customer passed the credit check without issues. But when the multinational corporation was unable to collect payment, it dug deeper and realized that the ship-to address was a residence. With more research, the business discovered that its “customer” had used stolen identity information to pass the credit check. Because the company did not use systems to check for fraudulent ship-to addresses, the fraudulent order was unnoticed and the company fell victim to ship-to fraud. Although only a handful of the company’s customer accounts were fraudulent, the company lost a significant amount of money last year because each account included large six-figure deals. What is ship-to fraud? In a ship-to fraud scheme, a criminal poses as a customer and presents a verifiable billing record, address and credit history. Companies often deem these criminals as credit worthy because their records are up to date and they have a good credit history. Often, the first few orders placed are for smaller items and the bills are paid on time, which increases the criminal’s credit limit. The criminal then places a significantly larger item and never pays the bill. Because the shipping address is a location unrelated to the actual business, the criminal can easily pick up the order and sell the goods. While ship-to fraud happens with consumer goods, the impact is typically more significant in the B2B world because the cost of the goods is higher. Also, most consumer goods are paid for before the items ship. However, B2B companies often extend lines of credit to customers or bill at set intervals, which means products are often shipped before payment. Keys to reducing risk Here are five ways you can help prevent B2B ship-to fraud at your company: Review your business application process. Most companies ask for headquarter information when determining the creditworthiness of a new business customer. However, many companies have products shipped to locations other than the headquarters. During the application process, capture all operating locations on the application. This makes it easier to determine which shipments are going to legitimate addresses and those that may be potentially fraudulent. Compare ship-to addresses with all operating location addresses. If a product is being sent to a location that was not listed on the business application as an operating address, there is a risk the purchase is fraudulent. The risk is even higher if there is large physical distance between the ship-to address and the customer’s operating and billing locations. Determine if the ship-to address is a freight forwarder or consolidator. If the ship-to address includes a container number, it is possible that the purchase is fraudulent. Criminals often use freight forwarders and consolidators to receive fraudulent purchases because it creates more anonymity for the fraudster. Check to see if the ship-to address is a P.O. box. Because most businesses don’t use a P.O box for product orders, a P.O. box used as a ship-to address should be a red flag for potential fraud. P.O. boxes are another way criminals anonymously receive purchases. Look up the address on Google. Put the address into Google and see if the business placing the order shows up in the search results. If not, look for these red flags: - A residence – Consider if a home-based business is likely to order the product. - A forwarding or consolidating business – Some of these types of businesses do not use container numbers in the address, which means physical verification is your best protection. - Property for sale – While shipments to properties on the market can be legitimate, this raises concerns because criminals often use vacant buildings as ship-to addresses. View the location on Google Maps. By viewing the photos online, you can get further verification that the address is an actual business. You can often get a feel for the area and see if there are a lot of vacant buildings or other red flags. Be sure to check the data on the photo to see if it was taken relatively recently. Empower employees to escalate potential fraud. Your employees are your first line of defense against ship-to fraud. They are the ones processing the orders, printing the shipping labels and packing the boxes. Train your employees on potential red flags and have a process to handle concerns. Encourage employees to pick up the phone and speak with customers to clarify any concerns about the address. If they aren’t convinced it’s a legitimate order, have a process for the employee to stop the shipment and escalate the issue up the chain of command. Many legitimate businesses and shipments may have a single red flag for ship-to fraud. However, when an order has multiple red flags, you should be especially cautious and delay the shipment until the shipment is proven legitimate. Because manually confirming all ship-to addresses can be time consuming, many businesses are now using automated solutions to flag suspicious orders. Your B2B company can save money and time by using a system to help eliminate ship-to fraud. By waiting to develop a process to prevent this type of fraud, your company risks becoming the next cautionary tale.  

Published: March 13, 2018 by Gary Stockton

Commercial Insights Hub

Follow Us!

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

About this blog

The latest insight, tips, and trends on all things related to commercial risk by the team at Experian Business Information Services. Please follow us on social media.

Stay informed by subscribing to this blog

Sign up for email notifications when new content has been published by Experian Business Information Services.
Sign Up