a. This threat could be neutralized by maintaining an approved vendors list. Not only should vendors on the list be carefully reviewed to ensure that there are no special interests involved with the company or any employees, but no purchase order should be approved unless it is through a vendor that has been previously approved.
b. All transfers of inventory should be documented by both receiving and inventory employees, ensuring that stolen inventory will be found to be missing.
c. All received orders should require the existence of approved purchase orders prior to accepting the delivery. No unordered supplies should be excepted.
d. Cash flow budgets, or filing invoices by the due date for discounts, would ensure that the company takes advantage of discounts as well as possible.
e. This re-payment could be avoided if the company made a policy of only issuing payments on original source documents, or by cancelling source documents once the payment is made.
f. A periodical physical count of inventory and bar coding or RFID tags help to ensure that inventory records provide accurate numbers.
g. Electronically accepting an item by scanning a bar code would help to eliminate this problem. Also, data entry controls help to prevent errors in inputs.
h. Appropriate segregation of duties ensure that a check can not be recorded and authorized by the same person. Further, blank checks should not be easily accessible.
i. All supplier invoices should be matched