Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Beware online fraud threat to farm businesses

Many banks  run specific fraud and theft seminars to raise awareness of the issues.
Many banks run specific fraud and theft seminars to raise awareness of the issues.

As businesses increase their digital presence and undertake more activity online, the risk of fraud and theft should be carefully considered with sufficient controls put in place to help minimise the risks posed.

Fraud and theft within the agricultural sector continues to be a significant issue and can cause businesses both financial and emotional stress which can be hard to recover from. We have seen several sophisticated scams target the sector with significant losses as a result.

Technology is increasing at an ever-faster pace and when used properly can provide valuable efficiencies. However it also comes with inherent risks which should be assessed and managed.

Many of the major banks now run specific fraud and theft seminars to raise awareness of the issues and how best to protect against them. We have also seen many insurance companies offer specific online fraud policies as generally these are not covered in a standard combined agricultural policy.

A large proportion of the fraud we have seen stems from paying suppliers online. Care should always be taken when paying online, especially if it is a new supplier or there has been a change of bank details. Internal controls such as confirming bank details on the phone via a trusted number or sending a small payment (1p) prior to the balance to ensure it arrives at the correct destination. There has also been a significant increase in email accounts being hacked and email chains intercepted. Fraudsters then continue the email chain and provide fraudulent bank account details for payment. It can sometimes be very hard to distinguish between the two, leading to payments being made in error under the guise of a genuine transaction.

Time should be taken to read over all correspondence prior to payment as the language used by the fraudsters may differ from the genuine supplier helping to identify the issue before payment is made. Generally, they may use more aggressive and high-pressure language to secure the payment prior to being discovered.

If you are in any doubt over the validity of an email or invoice you should also contact the business directly for confirmation from a trusted source.

A “take five” approach to online payments is advisable, whereby before any payment is sent, you step back to review all the details of the transaction to satisfy yourself before making payment.

All hardware used within the business should be protected from online threats via up-to-date antivirus and malware software. Firewalls should also be set up to help protect against attacks. Professional advice should be sought if you are unsure if there is adequate protection in place. It is now very common for a lot of business to be done via smartphones as mobile banking overtakes online banking.

As such, business owners and employees should ensure they have adequate protection on their phones such as pin numbers, fingerprint and face recognition and antivirus software.

This article was prepared by Scott Greig, principal manager in EQ Accountants’ Cupar office.