ACA Compliance Group (“ACA”) announced today the availability of its new payment and fraud risk assessment (“PFRA”) offering, which is designed to help firms identify and remediate vulnerabilities within payment flows in order to reduce the risk of costly fraud issues.
About ACA’s PFRA Offering
ACA’s PFRA offering helps your firm better understand payment flow and fraud risk mitigation opportunities. Our solution provides end-to-end policy-aligned reviews of all your firm’s cash movements to identify potential fraud risk throughout the payment lifecycle. We perform evidence-based procedure reviews across your firm to help mitigate risks during subscription, drawdown, redemptions, staff, and vendor payments.
Our tailored service offering is customized for each payment type to provide an accurate assessment of possible risks. Assessments also include identity and access management, payment limits and cash control best practices for your electronic banking channels.
ACA’s team of highly experienced subject matter experts continuously monitor various sources to identify new fraud trends before they impact your firm. Our team includes specialists in payment fraud, cybersecurity, and technology risk from various industries, including investment management, banking, and healthcare.
For more information, or to set up a meeting to discuss how our PFRA offering can help your firm, contact Kassie Canning at firstname.lastname@example.org or your ACA Aponix consultant.
About ACA Aponix
ACA Aponix, a division of ACA Compliance Group, provides cybersecurity and technology risk assessments, vendor and M&A diligence services, network testing, and advisory services. Our team of highly experienced technologists combines expertise across the breadth of cybersecurity and information technology. Our award-winning Technology Risk Assessment is designed to address the latest requirements from regulators and boards. We offer a suite of consulting and advisory services designed to help firms uncover risks and identify deficiencies in their cybersecurity policies, procedures, and controls.