Fraud Protection
There are many ways in which the bad guys out there will try to compromise your accounts or identity. While Viewpost employs layered security measures of fraud protection for your accounts and payments, there are simple things you can do every day to help keep your Viewpost® account secure.
Learn the Basics
During any given day, there are hackers and cybercriminals trying to compromise your computer, company and sensitive information by using malware (short for “malicious software”) and other tactics designed to trick you into disclosing your private information. Keep these tips in mind to help protect against fraud:
DO
- Enable two-step verification on your Viewpost account
- Discuss Viewpost business connections offline with your buyers and vendors
- Carefully confirm the company you’re connecting with is the correct one
- Accept invitations from entities you’re familiar with
- Review invoices against goods and services rendered
- Verify “https” and the lock icon are present when accessing your Viewpost account
DON’T
- Share user accounts or your password
- Remain logged into your session after you’re finished
- Include sensitive information, such as social security numbers and medical information, on invoices
- Open attachments or click on links from entities you do not recognize or suspect are not who they say they are
- Assume that invoice details are accurate
- Provide username or password if the lock icon is not present
Protect Your Business
At times, fraud occurs within your own company. Viewpost gives you options for taking control of user permissions to protect confidential information. Carefully use and assign Viewpost permissions to support accounting controls, like separating duties:
- Set group and user permissions to match each employee’s job function
- Require dual approval for sending a digital payment
- Periodically review Viewpost permissions to ensure they’re current and accurately align with user roles within the company
- Deactivate users as part of your company’s employee exit procedure
- Monitor user activity by reviewing recent activity and email notifications
- Regularly review your bank accounts and immediately report unauthorized activity
Strong passwords help reduce fraud.
Learn how to create, store, and use passwords effectively.