Mr. Goldmann

Security & Safety

Hotel Financial Security: Are Your Vendors Real?

By Peter Goldmann, President, FraudAware Hospitality

Despite the constant barrage of news about corporate theft and fraud, there are still far too many situations in which hospitality companies unknowingly pay criminally-minded individuals or phony companies posing as legitimate vendors.

How is it possible that "legitimate" companies have a private mailbox at the local UPS Store, a private residence, or even a prison address? Or that invoices a month apart with consecutive numbers both get paid? Or "invoices from a "vendor" whose address happens to match that of a company employee get paid?

To avoid such frauds your company must have in place tight controls for the...

Vendor Master Set-Up

The Vendor Master set-up process requires appropriate-and continuously enforced-segregation of duties.

Details: The individual or department authorizing a vendor should be in a department other than that of the team processing invoices and generating disbursements.

When establishing segregation of duties for the Vendor Master set-up, Christine Doxey, Vice President of Account Management at Apex analytix, a leading recovery audit consulting firm urges companies to include employees who are responsible for the business process and those who are provided with systems access.

Caution: Even where it may appear that segregation of duties exists, ensure that system access is controlled to allow use only by individuals authorized to process specific transactions.

In addition to the red flags of fraud mentioned above, says Doxey, any of the following details appearing in your payables process could indicate that your Vendor Master set-up process is vulnerable to financial abuse...

Additional controls to consider for the Vendor Master set-up process include:

Essential final step: Require vendors to complete a vendor profile form that provides information that further increases your ability to verify their legitimacy.

With a vendor profile, the vendor is required to provide certain documents that include sales tax certificate, city business license, names of key officers (to screen for conflict of interest), physical business address, daytime phone number, and other confirmable data. Example of a vendor profile form...

Continuous Monitoring

The process of continuously monitoring vendor transactions includes a review of the controls as noted above for the Vendor Master set-up process. The review should include selecting a sample of vendors as well as reviewing the supporting documentation for the validation of new vendors or changes of address.

All system-generated audit reports must be reviewed - not only for segregation of duties, but to determine if a vendor address has been fraudulently altered and then immediately changed back to the original address.

Important: Review invoice attributes throughout the process to determine if specific vendors may be perpetrating fraudulent activities. Common suspicious attributes...

Critical added control: Vendor Master clean-up. As part of its continuous monitoring process, the company should periodically review all duplicate vendors and initiate a vendor master clean-up procedure.

The clean-up process will alleviate duplicate vendors that have been set-up for the same vendor at the same address.

Example: There could be a slight difference in spelling or the use of abbreviation.

Key: It is much easier to control a smaller vendor master than a large one.

The Power of Real-Time Continuous Monitoring

Continuous monitoring on a real time basis quickly identifies potentially fraudulent vendors and determines whether your Vendor Master set-up controls are working properly. If there is a concern about a specific vendor, raise the issue with your internal controls or internal audit department after performing an evaluation of internal controls within the procure-to-pay process. If a control weakness is identified, immediately adjust the control and increase the sample size of the test. To choose the right continuous monitoring software vendor:

Peter Goldmann is the Developer of FraudAware/Hospitality, the first on-line fraud awareness training course for hospitality managers, supervisors and line employees. He is is the publisher of the monthly newsletters, White-Collar Crime Fighter and Cyber-Crime Fighter. His company, White-Collar Crime 101 LLC also is the developer of FraudAware/Hospitality, a customizable Web-based fraud awareness training course for managers, supervisors and line employees. He is a member of the Association of Certified Fraud Examiners, and The International Association of Financial Crimes Investigators. Mr. Goldmann can be contacted at 203-431-7657 or pgoldmann@wccfighter.com Extended Bio...

HotelExecutive.com retains the copyright to the articles published in the Hotel Business Review. Articles cannot be republished without prior written consent by HotelExecutive.com.

Receive our daily newsletter with the latest breaking news and hotel management best practices.
Hotel Business Review on Facebook
RESOURCE CENTER - SEARCH ARCHIVES
General Search:

JANUARY: Mobile Technology: A Permanent Sense of Immediacy

Alastair Cush

A growing number of properties are implementing mobile access guest room locking systems and the apps that support them. Many chain standards mandate mobile access and independents are joining the trend. What few operators understand is that mobile access implementation has changed not only every aspect of hotel door locks but also many other areas of hospitality operations. More people are actively involved in the decision making process for hotel locks than before. Mobile access has integrated the lock process with numerous property and chain departments from sales to guest loyalty and brand marketing. The original purpose of improving guest door locks was exclusively loss prevention and security. READ MORE

Jim Vandevender

Meeting data and technology have evolved considerably since the days of the bulky ,expensive mail ordered meeting planner guides and hotel catalogues. The ways in which hotels find and book groups is far different than the antiquated methods of not so long ago. As better technology surrounding meetings and events becomes available , hotels appetites for group business seems to also increase at a parallel pace making the need to keep the related technology evolving even more paramount. The companies that provide hotels with this meeting intelligence are continually developing new and more advanced methods of gathering this sought after data to keep up pace with the demand. READ MORE

Dave Weinstein

As with so many industries, the smartphone has transformed how organizations interact with their customers. Look at the automotive industry, the airline industry, and of course, the hospitality industry. You start your car’s engine and set the climate control to the desired temperature, buy airline tickets and check-in on your flight and do the same with your hotel room, all from your phone. There is a slew of services that traditionally are offered by hotels via the “book” on the desk. The book is still there, but some hotels allow you to order via the television while others offer integrated tablets. READ MORE

Kacey Butcher

Can you imagine your bank choosing not to provide a way to check account status and transactions outside of your monthly paper statement? Can you further imagine a popular franchise restaurant only having paper take-out menus? You would be forced to contemplate what other aspects internally within the organization would make doing business with them complicated and archaic. There you find your own personal underlying immediate expectation of baseline service and operational procedures, where a decision is often made instantly to move onto the next provider. A decision to choose another provider that seemingly knows how to service customers with the utmost up-to-date standards. READ MORE

Coming Up In The February Online Hotel Business Review




Feature Focus
Social Media: Interacting with the Hotel Customer
Consider these astonishing numbers: 1.49 billion active monthly Facebook users. 1.1 billion active monthly YouTube users. 320 million active monthly Twitter users and nearly 400 million registered users on LinkedIn. 400 million active monthly Instagram users and 200 million active Google+ users. The power and reach of social media is an awesome force and it has transformed how hotels interact with their customers. In the past year, social media advertising spending increased 33.5% to nearly $24 billion dollars. Social networks are being utilized by hotels to reach more visitors, expand brand awareness, enhance brand reputation and to establish more direct and personal communication with their customers. Savvy hotel operators are adopting a comprehensive social media strategy, and there are several emerging trends to note. Video continues to be a powerful and influential element in social media marketing, with 70% of companies saying that it is their most effective marketing tool. Video generates a 62% higher engagement rate than photographs alone, and with new social sites like Meerkat and Periscope which offer live video streaming, those numbers will only increase. Sponsored content is another growing trend. Though advertorials have been around for decades, hotels are finding new ways to maximize the visibility of their content. Some are placing sponsored content on Facebook, or on influencer blogs. Another trend is the integration of a “Buy Now” button into social media websites. Customers will be able to make purchases without ever having to leave their favorite social sites. This development is a major convenience for customers and should also be an additional revenue source for hotels. The February Hotel Business Review will explore these issues and examine how some hotels are successfully integrating social media into their operations.