Business Fraud Mitigation
Fraud is evolving. Payments scams, ransomware and social engineering are becoming increasingly targeted and sophisticated in both commercial and small business environments. This page brings together common fraud schemes, what they might look like in your business, and practical controls that can help reduce your risk. You’ll also find guidance and resources to help your team respond quickly if an incident does occur.
You don’t have to navigate it alone. Your Commerce team is here to help.
Common fraud schemes businesses face today.
Business email compromise (BEC)
- Business email compromise occurs when a fraudster impersonates internal executives or gains access to email accounts to request unauthorized payments or sensitive information.
What this can look like in your business
- Urgent requests for same-day wire transfers
- Vendor emails with “updated” ACH instructions
- Last-minute payment redirections
Controls to consider
- Require dual approval for outgoing payments
- Use verbal callback verification for payment changes
- Train employees to independently verify urgent requests
ACH fraud
- ACH fraud occurs when unauthorized electronic transfers are initiated from your account, often after login credentials are compromised or vendor information is altered.
What this can look like in your business
- Unexpected ACH debits
- New payees added without proper approval
- Payment amounts that differ from established patterns
Controls to consider
- Use ACH blocks and filters
- Set transaction alerts
- Reconcile accounts daily
Wire fraud
- Wire fraud involves fraudulent instructions directing funds to unauthorized accounts.
What this can look like in your business
- Requests to wire funds to new accounts, including international
- Pressure to bypass standard approval steps
- Changes to wiring instructions shortly before closing
Controls to consider
- Require dual approval for all wires
- Verify wiring instructions verbally using known contact information
- Establish clear cutoff procedures
Account takeover
- Account takeover occurs when a fraudster gains unauthorized access to online banking, treasury management or email accounts, often through stolen credentials, phishing or malware.
What this can look like in your business
- Login attempts from unfamiliar devices or locations
- Changes to user permissions or contact details
- Payments initiated outside normal activity
Controls to consider
- Require multifactor authentication for all users
- Limit user permissions based on job role
- Review login and transaction activity regularly
Vendor impersonation fraud
- Vendor impersonation fraud occurs when someone posing as a vendor or supplier requests changes to payments instructions.
What this can look like in your business
- Emails requesting updated ACH or wire details
- Slightly altered email domains
- Urgent requests tied to pending invoices
Controls to consider
- Require independent callback verification
- Confirm changes using previously established contact information
- Document and track all payments instruction changes
Check fraud
- Check fraud includes altered, forged or counterfeit checks drawn against your account.
What this can look like in your business
- Checks cleared with altered amounts
- Duplicate check numbers
- Missing checks from mailed payments
Controls to consider
- Use Positive Pay
- Secure check stock and limit access
- Review paid check images regularly
Gift card fraud
- Gift card fraud often appears in social engineering schemes where fraudsters ask employees to purchase gift cards on behalf of executives or clients and then send the codes electronically.
What this can look like in your business
- An urgent email requesting gift card purchases
- Instructions to send codes by text or email
- Requests framed as confidential or time-sensitive
Controls to consider
- Prohibit gift card purchases based on an email request
- Require verbal verification from leadership
- Train employees to recognize this common tactic
Payroll fraud
- Payroll fraud involves redirecting employee pay through unauthorized direct deposit changes or falsified employee records.
What this can look like in your business
- Requests to update direct deposit information made through email
- Multiple employees listed with the same bank account
- Reports of missing or incorrect pay
Controls to consider
- Require secure portals for payroll changes
- Implement dual review of direct deposit updates
- Monitor payroll change reports regularly
Credit card fraud
- Credit card fraud affects businesses that accept card payments or use corporate cards. It can involve stolen card data, counterfeit cards or unauthorized internal use.
What this can look like in your business
- Chargebacks for transactions believed to be valid
- Unusual corporate card spending patterns
- Customers reporting unauthorized charges
Controls to consider
- Maintain PCI compliance
- Monitor transactions for anomalies
- Set internal spending limits and review statements promptly
Social engineering
- Social engineering relies on psychological manipulation rather than system breaches. Fraudsters exploit trust, urgency or authority to pressure employees into fast action.
What this can look like in your business
- A caller posing as the IT department and asking for login credentials
- A “bank representative” requesting account information
- Text messages linking to fake payment portals
Controls to consider
- Provide ongoing employee fraud awareness training
- Establish clear escalation procedures
- Encourage employees to pause and verify requests
Ransomware
- Ransomware is malicious software that encrypts business systems and demands payment for restoration. It often begins with phishing emails or compromised login credentials.
What this can look like in your business
- Employees locked out of systems
- A ransom message requesting cryptocurrency
- Sudden disruption to operations
Controls to consider
- Maintain regular, offline data backups and keep systems updated with security patches
- Use multifactor authentication
- Provide phishing awareness training
Domain spoofing and domain name fraud
- Domain spoofing uses look-alike web addresses, often altered by only one letter or character, to impersonate legitimate businesses.
What this can look like in your business
- Emails from domains that closely resemble a known vendor
- Slight misspellings in web addresses
- Fake payment portals mimicking real sites
Controls to consider
- Train employees to carefully review full email addresses
- Use email filtering and domain monitoring tools
- Verify payments requests through established channels
Ways to strengthen your internal controls
- Protect your credentials: Commerce Bank will never request your password, answers to security questions, or ask you to perform multifactor authentication for your account on its behalf
- Require dual approvals for outgoing payments
- Separate payments initiation and approval responsibilities
- Verify vendor changes using callback verification
- Maintain documented vendor onboarding procedures
- Be cautious with caller ID, as phone numbers can be spoofed
What to do if you suspect fraud
- Contact Commerce Bank immediately at 800-207-0886 click to call on mobile phone
- Notify your internal finance and leadership teams
- Secure affected systems and reset credentials
- Preserve all related emails, messages and documentation
- File appropriate reports with authorities if necessary
Learn more
Fraud mitigation is not one-size-fits-all. Regularly reviewing your processes and identifying potential exposure points can help you implement controls that help strengthen your overall risk management strategy.
View our solutions
