10 Ways that P2P Automation Can Mitigate Fraud Risk

10 Ways that P2P Automation Can Mitigate Fraud Risk

How can today’s savvy procure to pay (P2P) leader manage the risk of fraud? In this blog, we’ll explore which ten P2P automation solutions can address pain points found by a risk assessment.

Supplier portals

Supplier portals can be used by accounts receivable departments to not only determine the payment status of an invoice, but to gather key information pertaining to the supplier such as W9s, W8s, insurance information, certificates of incorporation, and payment information. Intelligent supplier portals can be utilized in the supplier onboarding process as a means to help validate the supplier before a new record is entered into the master file.

Risks Mitigated

  • Supplier validation can occur before the payment process with pre-established automated business rules.
  • Supplier portals can be used not only in the onboarding process but throughout the P2P process to periodically screen supplier master data.
  • A sound upfront supplier validation process reduces paying “phony” suppliers or even employee posing as suppliers.


An eProcurement solution can be integrated with an ERP system to automatically generate a requisition, purchase order (PO), and even an invoice. To take things a step further, an advanced purchase to pay system supports the three-way matching process with embedded general ledger (GL) coding which can pave the way for a PO flip process.

Risks Mitigated

  • Requisitions and purchase order are created totally electronically using ERP data with no manual processes. This alleviates the risk of duplication, collusion with suppliers, and eliminates price manipulation.
  • Integration with ERP system supports the three-way matching process and removes the risk of any clearing account reconciliation issues since purchase orders and invoices can be matched electronically.


E-invoicing is the foundation of automation within the accounts payable function since manual invoices are removed from the process.

Risks Mitigated

  • Einvoicing eliminates the risk of processing a duplicate invoice, paying an incorrect amount, or paying the invoice to an incorrect supplier. E-invoicing can also ensure that p-card payments are not paid on invoices.
  • Moves the accounts payable focus to controls, process improvements and analytics since manual invoicing is no longer a “core business process.”
  • Reduces the risk of fraud and builds in Segregation of Duties (SoD) controls.

PO to invoice conversion

This solution allows the supplier to convert a purchase order directly to an e-invoice. Pricing and terms are automatically converted in a seamless fashion which can eliminate possible invoicing disputes.

Risks Mitigated

  • Speeds up the approval time since there should be minimal invoice disputes.
  • Improves supplier satisfaction. Specifically when establishing relationships with strategic suppliers.

Document management, invoice scan and data capture

Storing paper documents in file cabinets should be no longer a challenge for today’s P2P departments. Today’s document management solutions that provide invoice scan and data capture options can pave the way in the e-invoicing journey. Some companies utilize this data by solutions such as SharePoint and others.

Risks Mitigated

  • Eliminates the risk of processing a duplicate invoice, paying an incorrect amount, or paying the invoice to an incorrect supplier.
  • Alleviates the risk of manual processing and can set the foundation for eInvoicing and the three-way matching process.

Automated matching

Automating the three-way matching process is big step in improving controls in the procure to pay process. Matching errors can cause clearing account reconciliation problems which may lead to financial closing issues and possible misstatements.

Risks Mitigated

  • Automated matching performs the three-way matching process—reducing the risk of paying an erroneous or duplicate invoice to a supplier.
  • Improves the time it takes to get an invoice paid—resulting in improved cycle time.

Automated workflow approvals

In an automated workflow approval process, the process is linked to your company’s delegation of authority (DoA) policy. Approvals are generated via email to the designated levels of approval as reflected in the DoA policy. The levels of approval are usually defined in a table by levels of employee.

Risks Mitigated

  • An automated workflow can be linked to the company’s employee master file which reduces the risk of fraud since approvals levels cannot be manipulated.
  • Escalation processes can be built into the workflow to link to the DoA policy and tables. Additionally, “out of office” notifications can be built into this process.


The ePayment process includes all electronic payment processes along with the use of ACH supplier remittances.

Risks Mitigated

  • The use of ePayment reduces check fraud, check reconciliation issues, and escheatment reconciliation issues.
  • The use of ACH remittance in the P2P process ensures that that the invoice details are properly applied in the cash application process.

System access verification tools

System access verification tools confirm that there are no system access issues within ERP systems and only authorized users for the defined roles are the system. Such tools include real-time monitoring and reporting.

Risks Mitigated

  • System Access Verification tools can prevent a fraudulent transaction from being processed within the P2P process. As an example, an individual cannot set up a supplier in the supplier master file, pay that supplier, and void the transaction with proper system access controls in place. These are referred to “intra” SoD controls.
  • These tools can also catch an “extra” SoD conflict in which an employee from another department may attempt to process an unrelated transaction. An employee in accounts receivable may try to process a fraudulent accounts payable transaction.

Accounts payable self-audit tools

Some companies consider third-party or external audit firms to identify control weaknesses by reviewing historical databases. But many companies have worked with a solution provider to implement a self-audit process that identifies a possible duplicate payment before the payment is initiated. Self-audit tools consider “fuzzy” logic algorithms that flag a potential erroneous payment, often a sign of money laundering.

Risks Mitigated

  • A self-audit tool can often be included in a company’s internal control program as a continuous control monitoring (CCM) initiative.
  • Duplicate and erroneous payments are prevented before the payment is made.
  • Process improvements can be immediately made to stop duplicate payments in their tracks.
  • Previous Article
    Weekly Ledger 34: Top Stories in Accounting and Finance
    Weekly Ledger 34: Top Stories in Accounting and Finance
  • Next Article
    Weekly Ledger 33: Top Stories in Accounting and Finance
    Weekly Ledger 33: Top Stories in Accounting and Finance

Most Recent Articles