Accounts Payable need to be protected from spreadsheet frauds. Some of these frauds and spreadsheet errors would have been easily prevented should some basic controls and checking have been incorporated prior to implementation. The Recovery process for AP fraud can be pretty tedious especially in the procure-to-pay area where financial services are involved.
1) We should be aware by now that computer-centric fraud often shows that the person responsible for the fraud may be the very person who established the system or spreadsheet and is controlling its operations and modifications. Periodic Internal audits needs to be carried out on Accounting data/spreadsheets/logic to ensure no hanky-panky actions behind the screen.
2) Segregation of duties is the fundamental concept of internal control to reduce and avoid frauds in companies. Unfortunately, most of the companies have failed to pinpoint this gap, by having the same person assigned with full responsibility in terms of spreadsheets control or modification within the disbursement process
3) Untested spreadsheets and desktop applications with design flaws often result in miscalculations, mechanical and/or logic errors, lack of audit trails, balancing and reconciliation anomalies.
4) Everyone need to support the desktop spreadsheet/application with a written desk procedures. This is one of the key item of internal control. Many times, written procedure on this have been found to be incomplete and vague. Internal control and close surveillance need to be enforced here.
5) Companies should utilize their existing desktop AP spreadsheet and applications to strengthen their internal controls. Excel and Access are two good applications to start with. Verifications can be carried out using data management tasks with essential statistical and analytical tests to identify possible fraud. Top management should ensure that a more formal and structured top-down approach is taken effect for all functional areas in the company, especially the Accounting field.
6) To furbish detail written procedures and policies for any new applications by addressing their layout, documentation, internal controls, testing, modification, security, and staff activities. Once these are ready, these written black and white need to be ready to incorporate in all new desktop applications.
Prior to any new implementation, these actions are necessary,
-Independent application/spreadsheet assessments need to be audit thoroughly
-Necessary internal controls, security, data integrity process need to be established in written procedures
-Close out all the identified deficiencies by validating their necessary proposed corrective actions. And ensuring that these are properly carried out for close-loop.
-Equally important is the monitoring work such as : periodic check on desktop spreadsheets /applications integrity, initiate reviews and assessments from time to time are good check-points to start with.
For more information about computer forensics careers and online computer forensics degree, visit ComputerForensicsBasics.com.