Always Beyond White Icon Logo Small
Is Your Business Secure?
Take our FREE 2-minute IT Security Scorecard and get instant insights—no strings attached.
👉 Start Assessment
Insights & Guides
Cybersecurity & Risk

How to Prevent Wire Transfer and Payment Fraud: Finance Controls Every Canadian Business Needs in 2026

Fraudsters are hacking your vendors' email — not yours. Learn the internal controls, callback verification systems, and AP procedures that stop wire fraud before it hits your bank account.
Mar 30, 2026
8min read

The call comes in on a Tuesday morning. A vendor you have worked with for years emails your accounts payable team to let them know their banking details have changed. The email looks right. The name is right. The tone is right. Your AP team processes the next payment to the new account — and within hours, the money is gone.

This is not a hypothetical. It is happening to businesses of every size, across every industry, every single day. The FBI reports that Business Email Compromise has become a $55 billion USD scam over the past decade — Canadian businesses are not insulated from these losses, with the Canadian Anti-Fraud Centre reporting payment fraud as one of the top financial crimes affecting Canadian organizations, and 2024 saw it account for 73% of all reported cyber incidents — up from 44% just a year earlier. The average fraudulent wire transfer request is approximately $24,000–$25,000 USD — Canadian businesses are equally targeted, with losses reported to the Canadian Anti-Fraud Centre growing year over year. And in most cases, once the funds leave your account, recovery is extremely difficult or impossible.

The most dangerous version of this fraud — Vendor Email Compromise — does not even require your systems to be hacked. It requires your vendor's email to be compromised. And you have no control over that. What you do have control over is whether your finance team has the procedures, habits, and internal controls in place to catch it before a dollar moves.

This guide walks through exactly what those controls look like — and why the phone call that takes two minutes may be the most important thing standing between your business and a significant financial loss.

Understanding the Threat: BEC vs. VEC — Two Attacks, One Outcome

Business Email Compromise (BEC) — The Classic Attack

In a BEC attack, a fraudster impersonates someone your employees trust — typically a company executive, a known colleague, or an internal finance manager — to request an urgent wire transfer or payment. The email may come from a spoofed address that looks almost identical to the real one, or in more sophisticated cases, from an actual compromised account.

Common BEC scenarios your team needs to recognize include:

  • An email appearing to be from your CEO asks the finance team to process an urgent wire transfer quietly, stressing confidentiality and time pressure.
  • An email from your CFO or a senior manager requests an immediate change to payroll deposit information.
  • A message that looks like it is from a trusted internal account asks staff to purchase gift cards and email the serial numbers.
  • A request from what appears to be your lawyer or accountant asks for a wire transfer related to a pending deal or closing.
🚨  BEC attacks accounted for 73% of all reported cyber incidents in 2024, up from 44% in 2023. The FBI's Internet Crime Complaint Center reports losses exceeding $2.77 billion from BEC in 2024 alone — and those are only the incidents that were reported.

Vendor Email Compromise (VEC) — The Harder-to-Catch Attack

VEC is more dangerous and significantly harder to detect than standard BEC. Here, the fraudster does not impersonate anyone — they actually compromise a legitimate vendor's email account. They spend weeks or months reading that vendor's emails, learning invoice formats, billing cycles, communication tone, and which contacts at your company handle payments. Then, at precisely the right moment in your payment cycle, they send an email from the vendor's real account — with one change: the banking details have been updated.

Because the email comes from a real, authenticated account, standard email security tools do not flag it. Your AP team recognizes the sender. The language sounds like the vendor. And nothing looks wrong — until your vendor calls asking why their payment has not arrived.

⚠️  Vendor Email Compromise attacks rose 66% in the first half of 2024 and 137% in 2023. Your vendor's email security is not your responsibility to manage — but protecting your payments from their compromised account absolutely is.

The Critical Mindset Shift Your Finance Team Needs

The most important thing to understand about both BEC and VEC is this: you cannot rely on the email alone. A message that looks exactly like it came from your trusted vendor may have come from a fraudster who has been sitting in that vendor's inbox for two months. No amount of scrutinizing email headers or checking for typos will catch a message sent from the vendor's actual, legitimate email account.

The only reliable defense is out-of-band verification — confirming payment changes through a separate communication channel, using contact information you already have on file. Not a number in the email. Not a number you googled. A number from your own records.

📋  The Golden Rule of Payment Security: Never process a change to banking information or payment instructions based on an email alone — regardless of who it appears to be from. Always call. Always use a number you already have.

Control #1: Build and Maintain a Trusted Vendor Phone Directory

This is the most actionable and most overlooked control in accounts payable. Your team needs a verified, maintained, out-of-band contact list for every vendor you pay — and that list needs to be built before you ever need to use it.

Why You Need to Build This List Before You Need It

When a suspicious payment request arrives, your AP team should be reaching for a phone number they already trust — not searching for a contact in the email, not Googling the vendor's website (which could also be compromised or spoofed), and not calling back the number provided in the request itself. The moment of a suspected fraud is the wrong time to start establishing verified contacts.

Fraudsters know this. A common VEC tactic is to include a new or "updated" phone number in the fraudulent email — so when your team calls to verify, they reach the fraudster, who confirms the fake account change.

How to Build Your Trusted Vendor Contact Registry

  1. For every active vendor in your AP system, collect a verified direct phone number for the person who handles your account — not a general main line, but a specific contact who knows your relationship.
  2. Collect this information through a secure, documented vendor onboarding process — not over email. Use a vendor portal, a phone call, or in-person at the time the vendor relationship is established.
  3. Store the contact registry in a location separate from your email system and your accounting software — a secured spreadsheet accessible only to AP supervisors, a dedicated vendor management system, or your IT-managed password vault.
  4. Review and re-verify contact information annually or whenever your vendor relationship changes (new account manager, company acquisition, address change).
  5. For your highest-value vendors — those you pay the most frequently or in the largest amounts — consider having two verified contacts on file so you always have a backup.
✅  Create a simple Vendor Verification Card for each active vendor: legal business name, verified phone number, the name of your contact there, and the date that contact was last verified. This card should be accessible to anyone in your AP team who might need to place a verification call.

When to Make the Call

Your team should be required to call the trusted number on file any time they receive:

  • A request to change banking details, routing numbers, or payment methods
  • A request to change a mailing address associated with a payment
  • A first-time payment request to an account not previously used
  • Any invoice that is unusually large, unusually small, or timed differently than normal
  • Any payment request accompanied by language creating urgency, confidentiality, or pressure to act quickly
  • Any request that arrives via a slightly different email address than normal — even one character off

Control #2: Dual Authorization on All Wire Transfers and High-Value Payments

No single employee should have the ability to initiate and approve a wire transfer or high-value payment on their own. This is one of the most fundamental internal controls in finance and accounting — and one of the most frequently absent in small and mid-sized businesses.

How Dual Authorization Works

Dual authorization (also called dual approval or segregation of duties) requires that two separate, authorized individuals review and approve any payment before it is processed. The person who initiates the payment cannot be the same person who approves it. In practice, this means:

  • An AP team member receives an invoice, verifies it against a purchase order or contract, and enters the payment into the system.
  • A second, senior employee — the AP manager, CFO, or business owner — reviews the payment details independently and approves the release of funds.
  • Only after both steps are complete does the payment actually leave the account.

This process creates a mandatory pause in every payment cycle. That pause is where fraud gets caught — because the second reviewer brings fresh eyes, asks questions, and is not operating under whatever urgency or pressure may have been applied to the first employee.

⚠️  The average fraudulent BEC payment request is approximately $24,000–$25,000 USD — a number that falls within the signing authority of many individual AP staff members. Fraudsters research your org chart and target the threshold below which payments typically do not require a second review. Set your dual authorization threshold deliberately and low.

Setting Your Approval Thresholds

As a general framework:

  • All wire transfers, regardless of amount, should require dual authorization.
  • EFT/PAD payments above a defined threshold (commonly $2,500–$5,000 for smaller businesses, $10,000+ for larger ones) should require a second approval.
  • Any first-time payment to a new vendor or a new bank account should require authorization at the ownership or CFO level, regardless of amount.
  • Any change to existing vendor banking information should require CFO or ownership authorization before being entered into the system, separately from the payment approval itself.

What Dual Authorization Does Not Solve

Dual authorization slows down fraud — it does not eliminate it. If both the initiating employee and the approver are deceived by the same highly convincing VEC email, dual authorization may be bypassed. This is why it must be paired with the verification call protocol described in Control #1. The combination of a mandatory verification call plus dual authorization creates two independent checkpoints that a fraudster must beat simultaneously.

Control #3: A Written Payment Change Policy — Enforced Without Exceptions

One of the most effective fraud prevention tools your business has is a simple, written policy that your entire finance team has read, signed, and is trained on regularly. A policy does several things that informal habits cannot: it removes individual judgment from high-stakes moments, it gives employees permission to push back on urgent requests, and it provides a documented record that your organization exercised reasonable care.

What Your Payment Change Policy Must Cover

  • No changes to vendor banking information will be accepted by email alone. All banking changes require a callback to a verified number on file.
  • All wire transfers require dual authorization. No exceptions for any amount, including small test transfers.
  • Any first-time payment or first-time use of a new account requires authorization at the ownership or CFO level before processing.
  • Urgency is never a sufficient reason to skip verification steps. If a vendor claims urgency, that is a reason to be more careful, not less.
  • Employees who receive a suspicious email should not reply to it. They should forward it to IT and their manager, then contact the vendor using their verified phone number.
  • If an employee is unsure whether a payment request is legitimate, they have both the right and the obligation to pause and verify before processing.

The Urgency Problem

Urgency is the most powerful tool in a fraudster's toolkit. BEC and VEC attacks are specifically engineered to create time pressure — an overdue invoice, a deal closing today, a penalty if payment does not arrive by end of day, a CEO who needs this done immediately and quietly. The pressure is designed to make verification feel like an obstacle rather than a procedure.

Your policy must explicitly address this: urgency does not override verification. A legitimate vendor who needs a payment quickly can wait the five minutes it takes to make a phone call. A fraudster who created an artificial deadline cannot survive that call.

📋  Train your team on this phrase: 'Our policy requires a phone verification before we can process any change to banking details. I will call your office line to confirm — I have your number on file.' A legitimate vendor will welcome this. A fraudster will try to redirect you.

Control #4: Treat Every Vendor as Potentially Compromised

This is the hardest mindset shift for many finance teams — but it is the most important one in the current threat environment. The trust your team has built with a vendor over months or years of working together is real. But that trust is in the vendor, not in their email account. And their email account may be actively monitored by someone who has spent weeks learning how to impersonate them convincingly.

The Anatomy of a Vendor Email Compromise Attack

Here is how a typical VEC attack actually unfolds:

  1. A fraudster compromises the email account of one of your vendors — usually through a phishing attack targeting the vendor's staff, not yours.
  2. The attacker does not immediately do anything. They read. For weeks, they monitor every email, learning your company's payment patterns, invoice formats, amounts, timing, and the names of your AP staff.
  3. They identify an upcoming invoice or payment and choose their moment.
  4. They send a message — from the vendor's real email address — explaining that banking details have changed due to a bank switch, accounting system upgrade, or similar plausible reason.
  5. Your team processes the payment to the new account. The money leaves. The vendor does not receive it.
  6. The vendor contacts you weeks later asking about the unpaid invoice. By then, the funds have been moved through multiple accounts and are likely unrecoverable.
🚨  Because VEC attacks originate from a real, authenticated vendor email account, they bypass email filters, spam detection, and DMARC/SPF/DKIM authentication entirely. No email security tool on your side will catch this. Only human process and out-of-band verification will.

Red Flags That Should Trigger Immediate Verification

Train your AP team to treat any of the following as an automatic trigger for a verification call — not a judgment call:

  • Any request to update, change, or confirm banking details, routing numbers, or payment methods
  • Any email arriving from a slightly different address than normal — even one additional character, a hyphen, or a different domain extension
  • Any invoice that is slightly higher or lower than the normal amount for that vendor
  • A message creating unusual urgency or explaining why normal procedures should be skipped
  • A request that asks you to confirm once payment has been sent
  • Any email mentioning a new bank, a bank switch, an accounting system migration, or an update to their payment processing
  • Any request arriving outside your vendor's normal billing cycle or from a contact you have not heard from befor

What to Do When You Suspect VEC

  1. Do not reply to the email. Do not click any links. Do not call any number provided in the email.
  2. Pull up your trusted vendor contact registry and call the verified number on file.
  3. Ask the vendor directly whether they have sent any banking change requests and whether their email account may have been compromised.
  4. If the vendor confirms they did not send the request — their email has been compromised. Notify IT immediately. Alert the vendor. Do not process the payment.
  5. Forward the suspicious email to your IT provider for analysis.

Control #5: New Vendor Onboarding and Vendor Master File Security

The vendor master file — your system's record of vendor names, addresses, and banking details — is one of the highest-value targets in your organization for both external fraudsters and internal bad actors. A change to a single line in that file can redirect every payment to a specific vendor indefinitely.

New Vendor Onboarding Controls

  • New vendors should be added to your system only by a designated, authorized employee — not the person who initiated the vendor relationship.
  • Before being added, new vendors should be verified through an independent source: call the company's main line (found independently, not from the email introducing the vendor), confirm the banking details, and document the verification.
  • Use a formal vendor onboarding form that captures legal business name, address, banking details, and a verified contact. Require the vendor to complete this form through a secure channel.
  • For all new vendors, require the first payment to be approved at the ownership or CFO level regardless of amount.

Vendor Master File Change Controls

  • No change to existing vendor banking information should be made based on an email request alone, regardless of who the email appears to be from.
  • All changes to the vendor master file should be logged with a timestamp and the name of the employee who made the change.
  • A supervisor or second authorized employee should review and approve all banking detail changes before they take effect.
  • After a banking detail change is entered, have the approver send a confirmation letter or email to the vendor's verified address — separately from the email that requested the change — confirming what was updated.
✅  Set up an automated alert in your accounting system that notifies the AP manager and CFO any time a vendor's banking details are changed. This creates an immediate audit trigger and ensures no change goes unnoticed, even during busy periods.

Your Payment Verification Quick Reference

Use this table as a training aid and post it in your AP workspace. Every scenario that triggers a required callback is listed here.

Control #6: Email Security, Technology, and Supporting Technical Controls

Process and policy are your strongest defenses against payment fraud — but technology plays an important supporting role. The following technical controls should be in place for every business handling wire transfers and electronic payments.

Multi-Factor Authentication on All Email Accounts

This is non-negotiable. Your email accounts are the entry point for virtually every BEC and executive impersonation attack. If an attacker can gain access to a single email account — yours or your vendor's — they can cause significant financial damage. MFA on all email accounts means that even if a password is compromised, the attacker cannot access the account without a second factor.

This applies to every employee account in your organization, not just executives and finance staff. A compromised receptionist's email can be used to learn billing cycles and names that enable attacks on your AP team.

DMARC, DKIM, and SPF — Email Authentication That Stops Spoofing

DMARC, DKIM, and SPF are email authentication protocols that verify that emails claiming to come from your domain actually originated there. When properly configured, they prevent fraudsters from spoofing your domain and sending emails that appear to come from your company's addresses. They do not prevent VEC attacks from a vendor's compromised account, but they do prevent attackers from impersonating your own organization's email.

💡  PCI DSS v4.0 requires organizations processing payment cards to implement DMARC email authentication — this applies to Canadian businesses operating under PCI DSS as well. Even if you are not subject to PCI DSS, implementing DMARC is a best practice for any Canadian organization that sends email. Ask your IT provider to verify your DMARC configuration.

Email Filtering and External Sender Flagging

Configure your email system to automatically flag or banner any email arriving from outside your organization. This simple, low-cost control creates a visual reminder for your team that an email they are reading came from an external source — which matters when a fraudster is impersonating an internal executive or a known vendor.

Modern email security tools can also flag domain lookalikes — email addresses that are very similar to known vendor or internal domains but not identical. These tools will not catch VEC attacks from a truly compromised account, but they catch many lower-sophistication BEC attempts.

Positive Pay and Pre-Authorized Debit Controls for Electronic Payments

Positive Pay is a fraud prevention service offered by many Canadian business banks — ask your bank whether it is available under this or a similar name such as Payments Canada fraud controls. For check payments, it works by having your bank compare each check presented for payment against a file of checks you have authorized. Any check that does not match is flagged for your review before it clears. For electronic payments, pre-authorized debit (PAD) controls allow you to specify which organizations can pull funds from your account.

Ask your bank whether these services are available and enabled on your business accounts. They add a meaningful layer of protection against both external fraud and internal misuse.

The Deepfake Threat: Never Trust an Incoming Call or Meeting Invite

This is the most rapidly evolving and least understood area of payment fraud — and it fundamentally changes what your finance team can trust. AI tools can now clone a person’s voice from a short audio sample and generate a real-time phone call that sounds exactly like your CEO, your CFO, or a trusted vendor contact. They can generate deepfake video of an executive in a live video call — convincing enough that employees have approved large wire transfers while looking at what appeared to be their own boss on screen. In 2024, a finance employee transferred $25 million USD after a video call featuring deepfake versions of multiple colleagues. Incidents like this are accelerating globally as the technology becomes cheaper and easier to access.

The implication for your finance team requires a specific mindset shift: an incoming call — even from a number that looks familiar — is not verification. A video meeting with someone who looks and sounds exactly like your executive is not verification. Caller ID can be spoofed. Phone numbers can be spoofed. Deepfake audio and video can be generated in real time with no special equipment. None of these signals constitute reliable proof that you are speaking with who you think you are.

🚨  Critical rule: Do not act on any payment request based on an incoming phone call or video meeting — even if the caller ID looks correct, the voice sounds right, and the video looks real. Caller ID is spoofable. Deepfake audio and video are indistinguishable in real time. The only safe response is to hang up or end the meeting, then call outbound to the trusted number you have on file.

The only verification that reliably defeats deepfake fraud is one you initiate yourself — outbound, to a number in your own records. If someone calls requesting a wire transfer, hang up and call them back on the number you have on file. If a meeting invite arrives with an urgent request to approve a large payment, end the call and dial the person directly. Never use a number provided in the request itself. This outbound-only rule applies equally to vendors, executives, lawyers, your bank, and anyone else requesting payment action over the phone or in a meeting.

A legitimate executive, vendor, or colleague will understand a two-minute delay while you call them back. A fraudster running a deepfake call cannot survive that callback — because when you dial the real person’s trusted number, you will find they never contacted you.

📋  The Outbound-Only Rule: For any payment action triggered by a phone call or meeting, verification must flow outbound — hang up or end the meeting, then call back on the trusted number in your records. Never act on an inbound call regardless of caller ID, voice quality, or video. This single rule defeats both deepfake attacks and standard caller-ID spoofing simultaneously.

Beyond the outbound-only rule, establish a pre-agreed code word with your executives and key internal contacts — a word or phrase set up in person or through a separate secure channel, changed periodically, and spoken in any payment-related conversation to confirm the person is genuine. This adds a second layer of protection for high-value transfers even after you have called back on a trusted number. If the person cannot provide the code word, do not proceed.

⚠️  By mid-2024, an estimated 40% of BEC phishing emails were AI-generated. Real-time deepfake voice and video are now being actively deployed in direct calls to finance teams. A finance employee was deceived into transferring $25 million USD by a video call featuring AI-generated versions of multiple colleagues. This is no longer a future risk — it is happening now, and it is growing.

If You Have Already Been Hit: Incident Response and Recovery

Speed matters more than anything else in payment fraud recovery. Once funds leave your account, they typically move through multiple accounts within hours and are often converted to cryptocurrency or wired overseas. Your window to recover funds is measured in hours, not days.

What to Do in the First 72 Hours

  1. Call your bank immediately — the same day, the same hour if possible. Ask them to initiate a wire recall and contact the receiving bank. Most banks have a fraud hotline for exactly this situation.
  2. Call the receiving bank directly if your bank provides the account information. Explain that a fraudulent wire transfer was received in that account and request a hold.
  3. Report the fraud to the Canadian Anti-Fraud Centre (CAFC) at antifraudcentre-centreantifraude.ca and your local police. For international wire transfers, also contact the FBI's Internet Crime Complaint Center (IC3) at ic3.gov if U.S. banks are involved — their Financial Fraud Kill Chain (FFKC) process may be available for transfers over $50,000 USD but must be initiated within 72 hours. For domestic Canadian wire fraud, your bank will coordinate with Payments Canada fraud recovery processes.
  4. Notify local law enforcement and request a case number, which you will need for insurance claims and bank escalations.
  5. Preserve all evidence: do not delete any emails, do not change any passwords until IT has captured a forensic image, and document every step you take.
  6. Contact your IT provider to investigate the compromise and determine whether your systems or your vendor's systems were the entry point.

🚨  Do not try to contact the fraudster or negotiate with them. Do not send additional funds as a 'recovery fee' — this is a common secondary scam targeting businesses that have already been defrauded. Contact law enforcement and your bank only.

Insurance Considerations

Standard commercial property or general liability policies typically do not cover wire fraud losses. Cyber liability insurance and crime insurance policies may provide coverage for social engineering fraud, including BEC. Review your coverage with your Canadian broker or insurer specifically for:

  • Social engineering fraud coverage (covers losses resulting from fraudulent instructions, including BEC/VEC)
  • Funds transfer fraud coverage (covers losses from fraudulent instructions to transfer funds)
  • Computer crime coverage (may cover losses from unauthorized system access)

Note that many Canadian policies have specific requirements around controls that must be in place for coverage to apply. Implementing the controls in this guide — dual authorization, callback verification, written payment policies — may be required by your insurer and can reduce your premium. Ask your broker about the Canadian Crime Insurance Market's standard coverage for social engineering fraud.

Control #7: Handling Internal Payment Requests — Your Colleagues Could Be Phished Too

Most payment fraud guidance focuses on external threats — vendor impersonation, executive spoofing from outside the organization. But one of the most overlooked risks in accounts payable is an internal one: what happens when the person requesting a payment or a banking change appears to be a colleague inside your own company?

Internal accounts can be compromised. An employee’s email account that has been hacked looks identical to the real thing. A phishing attack that captures a colleague’s Microsoft 365 credentials gives a fraudster full access to that person’s email, calendar, and Teams account — and the ability to send messages that appear completely legitimate from inside your organization. Fraudsters specifically target internal accounts at companies with active payment operations because a message from an internal address carries far more trust and urgency than one from an external vendor.

🚨  An urgent payment request from your CFO’s email, a Microsoft Teams message from your controller asking you to process a wire, or an email from a colleague saying “I’ll explain later, just send it” — these are all scenarios where a fraudster using a compromised internal account has caused real financial losses at real businesses. Internal does not mean safe.

How to Verify Internal Payment Requests Safely

The verification approach for internal requests mirrors what you would do for an external vendor — you simply cannot rely on the message channel alone. Apply the following steps any time you receive an unexpected or unusual payment request that appears to come from inside your organization:

  • Verify through a second channel — Do not reply to the email or message to confirm. Use a separate communication channel to verify the request. If the request came by email, verify by phone or in person. If it came via Teams or chat, call the person directly on their verified extension or mobile number.
  • Use Microsoft Teams — but check the label — Microsoft Teams can be a reliable secondary verification channel for internal requests — but only when used carefully. Before acting on a Teams message requesting payment, check whether the sender is labelled as “External” in the Teams interface. Any account labelled External is not part of your organization’s Microsoft 365 tenant and must be treated with the same skepticism as an email from an outside party. A message from a genuinely internal account will show no External label and will display your organization’s verified profile information.
  • Call the verified number — Even for a Teams message from what appears to be a verified internal account, any request involving a payment, a banking change, or an unusual instruction should trigger a direct phone call to the person’s known number — from your directory, not from the message. A two-minute call is all it takes. If the person confirms the request, proceed normally. If they have no idea what you are talking about, their account has been compromised.
  • Require a second approver — No single employee should be able to authorize a payment based on an internal message alone, regardless of the seniority of the person making the request. Your dual authorization policy applies here too: the person who receives the request cannot be the only person who approves it. If the CFO asks the AP coordinator to process a wire, a second designated approver — the controller, the CEO, or the business owner — must independently confirm before the funds move.

A Practical Script for Your Team

Your AP team should feel empowered to push back on any payment request — internal or external — that skips verification. This should never feel like questioning a colleague’s integrity. It is a standard control that exists to protect the business and protect the employee from being implicated in a fraud they processed unknowingly. Give your team language they can use confidently:

📋  Suggested script: “I want to make sure I process this correctly — our policy requires a quick phone confirmation and a second approval before any payment goes out. I’ll call you on your direct line to confirm, and then get [name of second approver] to sign off. I just need two minutes. This is standard procedure for any payment request, even internal ones.”

What Triggers Verification for Internal Requests

Automatic verification and second approval are required any time an internal request includes any of the following:

  • Any wire transfer or EFT/PAD payment, regardless of amount or who is requesting it
  • A request to add or change a vendor in the payment system
  • A request to change payroll deposit details for any employee, including the person sending the request
  • Any message asking a staff member to skip normal approval steps — “just process it, I’ll explain later,” “this is confidential, don’t mention it to anyone,” or “we need this done before end of day today”
  • Any request from a Teams account that is labelled “External” — treat this exactly as you would an email from an outside party, even if the display name matches a colleague’s
  • Any payment request that arrives outside normal working hours, from a different device, or with writing style or tone that feels slightly different than usual
✅  Good culture note: Make it clear to your entire team that following verification procedures is never an insult to a colleague — it is a protection for them too. If a colleague’s account is compromised, your verification call gives them the chance to catch it and protect themselves. No reasonable person objects to being asked “I just want to confirm it’s really you — can I call you on your direct line?”

Frequently Asked Questions About Payment Fraud Prevention

What is the difference between BEC and Vendor Email Compromise?

Business Email Compromise (BEC) is a broad category of fraud where attackers impersonate a trusted person — an executive, a colleague, or a vendor — to get your team to send money or sensitive information. Vendor Email Compromise (VEC) is a specific and more dangerous subset where the attacker actually hacks your vendor's real email account and sends fraudulent payment instructions from it. With VEC, standard email security tools do not flag the message because it comes from a legitimate, authenticated account. Only a phone verification to a number you already have on file can reliably catch it.

What should we never do when we receive a request to change vendor banking information?

Never update banking information based on an email request alone — not even if the email comes from the vendor's real address, not even if you have a long-standing relationship with that vendor. Their email may be compromised. Always call a verified number that you have on file from before the change request arrived. Never call a number provided in the email requesting the change. Treat every banking change request as potentially fraudulent until a voice confirmation with a trusted contact says otherwise.

How quickly do we need to act if a fraudulent wire transfer is processed?

Immediately. Call your bank the same day — the same hour if possible. Wire fraud recovery has a narrow window: funds can move through multiple accounts within hours and become unrecoverable. For any international transfer involving U.S. accounts, the FBI's Financial Fraud Kill Chain must be initiated within 72 hours. For domestic Canadian transfers, your bank's fraud team will initiate a wire recall — time is still critical. Do not wait until you have a complete investigation — contact your bank first, then law enforcement, then IT. Speed is everything.

Are these attacks only a problem for large businesses?

No — small and mid-sized businesses are frequently targeted precisely because they are more likely to have informal payment processes, less training on fraud detection, and lower approval thresholds that a single employee can act on alone. Fraudsters research their targets. They know the name of your AP manager, who signs off on payments, and what your typical invoice amounts look like. Organizations of all sizes are at risk, and the controls described in this guide are specifically designed to be practical for smaller finance teams.

Should we have a code word system with our executives?

Yes — and the code word system works alongside a more fundamental rule your team must internalize: never act on a payment request based on an inbound call or video meeting alone. Caller ID is spoofable. Deepfake audio and video can impersonate your executives and vendors in real time with no visible tells. The safe response to any inbound payment request by phone or video is to hang up or end the meeting, then call back outbound on the trusted number you already have on file. If that outbound call confirms the request is genuine, a code word provides a second layer of assurance that you are speaking with the real person and not an AI-generated impersonation. The code word should be agreed on in person or through a separate secure channel, changed periodically, and required for any payment conversation involving a wire transfer or large EFT or PAD. If the person cannot provide it, do not proceed.

The Bottom Line: Process Is Your Best Protection

No technology will fully protect your business from wire transfer and payment fraud. Email security tools, spam filters, and DMARC authentication all help — but every single one of them can be bypassed by a fraudster who is operating from your vendor's legitimate, authenticated email account.

What cannot be bypassed is a finance team that has internalized one non-negotiable habit: pick up the phone. Call the verified number. Wait for confirmation before processing. Two minutes of friction on every banking change request is a small price for the certainty that your payment is going where you intend it to go.

The organizations that consistently avoid wire fraud losses are not those with the most sophisticated technology — they are those with the clearest procedures, the best-trained finance teams, and a culture where pausing to verify is the expected behavior, not the exception.

Want help building these controls into your business? Always Beyond Corp. works with businesses to implement the email security, authentication controls, and IT policies that support a strong payment fraud prevention posture. Contact us to discuss how we can help your team stay protected.
On this page

Ready to Make IT One Less Thing to Worry About?

Book a no-pressure consultation to see how Always Beyond can help you simplify, secure, and future-proof your IT.

See exactly how your current IT setup measures up to our Hack Free standards. Enter your business email to receive:

  • Free 10-point security scorecard for your business
  • Complete Hack Free Guarantee eligibility checklist
  • Exclusive case studies from our protected clients