
Sign up to save your podcasts
Or


Are you performing security audits, so you know who has access to your systems? Listen to today’s episode to for 4 scenarios when employees or contractors used their system access for fraudulent purposes. Then see how you can get a 5-step plan to perform a system audit.
Keep listening.
Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.
Links mentioned in the podcast + other helpful resources:
By Debra R Richardson5
66 ratings
Are you performing security audits, so you know who has access to your systems? Listen to today’s episode to for 4 scenarios when employees or contractors used their system access for fraudulent purposes. Then see how you can get a 5-step plan to perform a system audit.
Keep listening.
Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out the Vendor Process Training Center for 116+ hours of weekly live and on-demand training for the Vendor team.
Links mentioned in the podcast + other helpful resources: