Best ERP Software for HVAC, Plumbing, Field Service Businesses

How to Protect Your Service Business from Embezzlement

Pocketing company money. Cropped shot of a businessman placing money into his pocket

Do you own or manage an air conditioning, heating (HVAC), plumbing, electrical service, or construction business? Do you prefer to run service calls rather than use your accounting and job costing software? If you said yes to any of these questions, you need to read this article.

How to Prevent Theft and Embezzlement

I would like to offer the air conditioning, heating (HVAC), plumbing, electrical, service service, or construction industries a little advice on controlling theft. Be involved in running your office and understanding accounting functions and your service accounting software. Show as much interest in accounting as the field. You donā€™t have to do the work but you need to know the basics so you can train and review the work of others.

Embezzlement or employee theft is one of the most common ways small businesses go bankrupt every year. There is no easy-to-identify profile for who could potentially embezzle from you. In my years of consulting with service businesses, I have heard literally hundreds of heartbreaking stories about business partners, lifelong friends and seemingly trustworthy coworkers who turned out to be thieves.

The key is to avoid the obvious pitfalls and make sure that you have set up your accounting software in such a way that prevents easy access. In the article that follows, I have outlined some of the common techniques that dishonest people have employed to steal from their employers. Ā I hope that you find this helpful in protecting your company against embezzlement.

Common Security Breeches

The Fake Vendor

A common method of theft involves the bookkeeper creating a vendor with a name that closely resembles a vendor that you do business with. Examples could include Carrier Inc. instead of Carrier. They open an account under that name and pay bogus bills to that fake vendor. Their hope is that you wonā€™t notice the subtle name difference.

The Fake Employee

A fake person is setup as an employee and payroll is issued. This ā€œemployeeā€ may even received bonus and reimbursed expenses. This one is usually pulled off in a larger company where a fake employee could go unnoticed. A proper audit will usually detect this type of fraud but it occasionally goes undetected.

Editing Typewritten Checks

Crooks will sometimes type a check using a typewriter and ask you to sign it. They will then reinsert the check and use the ā€œCorrectionā€ feature of the typewriter to remove the ā€œPay Toā€. They then enter another name into the ā€œPay Toā€ field. Once the check clears, they will change the ā€œPay Toā€ back to what you thought it was when you signed the check

Bookkeeper-Technician Collusion

A bookkeeper and technician join together to steal. Invoices can be destroyed along with any record of the service call. A bank account can be created with a business name that closely resembles yours, allowing them to cash your checks. If your company is called Precision Service, theirs could be called Precision Service Co. They just add ā€œCoā€ to the Pay To field. Discourage your customers from paying in cash. It can be dangerous to carry around and cash is obviously a lot easier to steal.

Cash Back Deposits

An easy technique for a bookkeeper to steal is to deposit checks payable to the company into the companyā€™ bank account and show a ā€œLess Cashā€ amount, which he or she then pockets. Prevention is very simple. A bank receiving a deposit for a corporate account should not allow any ā€œLess Cashā€ deposits but rather should require that checks made out to the company be deposited into the companyā€™ account with ā€œFor Deposit Onlyā€ stamped on them. Then a company check, signed by an authorized signer on the companyā€™ account can be written for the required amount. Of course, any deposit endorsed ā€œFor Deposit Onlyā€ should only be deposited into the account of the payee with no ā€œLess Cashā€ disbursement. This type of fraud is easy to accomplish if the bank operates in a very sloppy manner, but is impossible if the bank follows industry standard banking practices and procedures. Check with your bank to make sure this is the case.

Security Policies and Procedures

Bookkeeping Security

Your bookkeeper should never have check signing privileges. Allow them to make basic banking inquiries, but do not grant them transfer or withdrawal privileges.

  1. Use purchase orders as much as possible. Nothing is purchased without a purchase order being filled out and a PO number being assigned to the purchase.
  2. Have your bookkeeper review all bills, write the checks and present them to you twice each month.
  3. Carefully review each check and bill prior to signing them. Look for bills that might be fraudulent. A common practice is to create fake bills for supplies, repairs and the like. Always match Pos to bills and bills to checks.
  4. When signing checks, use a unique signature style, something different than you use to sign any other documents in your business. You may want to include a subtle mark that only you know about, so you can look for that mark every time you review canceled checks with your bank statement.
  5. Order your bank to send all correspondence to your home address. Nothing is mailed to your office! That may stop most fraud all by itself. Read all letters. Open your own bank statements. Do not have a spouse, child or secretary do this for you. Keep this information sealed and confidential.
  6. Review bank statements and canceled checks. Look for forged signatures (you donā€™t have to cover a forged check) and altered ā€œPay Toā€ entries on each check. Turn the check over and carefully examine the endorsement. Is the endorsement official and consistent with others from that vendor? Does it match the ā€œPay Toā€?
  7. Examine your bank statement for unusual activity such as withdrawals, transfers and drafts.
  8. Reconcile your bank account every single month. Also reconcile the credit card statements. This is for security.
  9. Do not give any single person too much accounting authority. Never allow the same person who does the bookkeeping to reconcile the bank account or credit card statements. When possible, never allow the same person who does bookkeeping to perform payroll.
  10. Make sure your answering service faxes or e-mails you a complete list of all evening and weekend calls. Match those calls against invoices. Match deposits against invoices.
  11. Study your credit card software. Itā€™ not hard to deposit credit card charges into other bank accounts that you do not control. Most of these programs have an audit trail. Turn it on. Be sure that the owner is the only person with administrative rights to the software. This will prevent the audit trail from being deleted and account numbers from being changed.
  12. If you use accounting software, be sure that security is turned on. Use strong passwords and do not reveal them to anyone. Make certain that the audit trail feature (if it has one) is turned on. If you are using Total Office Manager from Aptora, the Audit Trail can never be turned off (not even by the administrator) and each permission can be assigned by employee on a form-by-form basis. Make sure that only the owner of the business has full administrative privileges. Study the audit trail report looking for unusual activity.
  13. Perform background checks on all employees.
  14. Require all key employees to sign a confidentiality agreement (protects you and your clients). Do the world a favor and commit yourself to prosecuting thieves.
  15. If your company has partners, hire a professional outside auditing firm to conduct an audit on your companyā€™ books once per year. This will give all partners peace of mind.
  16. Do not allow anyone on your staff the ability to DELETE anything in your accounting software. With Total Office Manager from Aptora, you can set this preference in your security settings.
  17. Carefully consider to whom you grant Void Transactions authority.
  18. Check your audit trail monthly for items that have been deleted or voided!
  19. A good audit trail cannot be deactivated by anyone (not even the administrator) and should be capable of storing tens of thousands of transactions.

Physical Security

Your database (or company file) should be located on a server. This is necessary for both the speed of the TOM software and security reasons.

  1. Place your server in a locked and fire resistant closet or small room. Lock the computer case to the wall. Be sure the roomā€™ door includes a strong lock. Thieves will certainly steal your server along with your company file if they have the chance. Donā€™t forget that the company file contains private information such as credit card numbers, social security numbers, home addresses and more. You may have some serious legal liability if ā€œreasonableā€ security measures are not taken.
  2. Disgruntled employees could easily place a large magnet on top of the computer. This can destroy your hard drive. This is another reason to keep the server in a locked room.
  3. Set up your server so that backups are made every night. At least once per week, remove one backup from the building and keep it in a fire resistant safe at home. Each year, a backup might be placed in a safety deposit box.
  4. Your backup system might be located in a fire resistant container or safe (within the server room). You may wish to invest in a low cost safe for this purpose. Drill a hole for the cable and place the backup (like an external hard drive) in the safe. The safe must be oversized to prevent overheating situations.

Conclusion

In this tough economy, internal theft and embezzlement is on the rise. Employees have discovered that itā€™s relatively easy to steal from a company whose owner takes a ā€œhands-off and not interestedā€ approach to managing the financial books. Businesses without proper financial controls run the risk of financial disaster.

Managing an air conditioning, heating (HVAC), plumbing, electrical service, or construction business is not easy. Having service technicians or bookkeeper steal from you makes it even worse. Understanding your companyā€™ bookkeeping procedures and accounting software will help you avoid a financial disaster.

Share:

Facebook
Twitter
Pinterest
LinkedIn

Table of Contents

On Key

Related Posts

Image of office worker and employee.

Enterprise Resource Planning (ERP) Software versus Field Service Management (FSM) Software versus Customer Relationship Management (CRM) Software

If you are in the HVAC, plumbing, electrical industry, or another contracting business, you have likely heard terms like ā€œFSM softwareā€, “ERP software” and “CRM software” used to describe software programs you might have heard about. Have you ever wondered what these terms are used for and what they mean? In this article from James R. Leichter, we will unravel the mystery of these terms and tell you what they all mean.

Deferred Revenue Used in Contracting Business Accounting.

Understanding Deferred Revenue in Contracting Business Accounting

Deferred revenue, also known as unearned revenue, is a crucial concept for HVAC and plumbing companies that often receive payments in advance for services. It represents money received for goods or services yet to be delivered, making it a liability on your balance sheet. Understanding and managing deferred revenue ensures accurate financial reporting. This guide will walk you through the definition, accounting treatment, and importance of deferred revenue, complete with an example journal entry. By the end, you’ll be equipped to confidently handle deferred revenue, ensuring your business remains financially sound and trustworthy.

Your Cart Is Empty

Check out our shop to see what's available

Request a Personalized Demo

Fill out the form below, and we will be in touch shortly.
Demo Form 121422
Please enable JavaScript in your browser to complete this form.
Name

What number is equal to 7 plus 4?

By entering your information above and clicking the “Agree and Get Started” button, you agree to our Terms of UseĀ and Privacy Policy that we may contact you, by SMS, at the phone number and email address you provide in this form in accordance with our Terms of Use. Promotion Terms & Conditions apply.