The Most Secure B2B Payment Methods | Versapay (2024)

Cybercrime is on the rise—we won’t skirt around that fact. There were 4.7 million identity theft and fraud reports in the US in 2020 alone, up 45% from the year prior. And card fraud losses are expected to jump to $38.50 billion by 2027.

These numbers aren’t insignificant but choosing not to accept online payment methods will have you at such an arguably greater disadvantage. Your competitors will have surpassed you long before you even consider enacting digital transformation.

Here are some quick statistics that prove why B2B businesses should be accepting digital payment methods:

  • Changing payment habits. 60% of financial professionals are likely to convert most of their payments to suppliers from checks to electronic payments

These numbers hardly tell the entire story. But with the way things are going, businesses who choose not to support digital payments will find themselves on the outside, looking in.

To provide payment experiences that are on par with those in the business-to-consumer (B2C) world—which customers increasingly expect—business-to-business (B2B) sellers need to understand the payment methods at their disposal, and which are most advantageous for themselves and their customers.

We've compiled a list of the most—and the least—secure payment methods. Notice anything? (Hint, hint. The most secure are all digital payment methods.) We’ve also included tips for making digital payments even more secure.

The Most Secure B2B Payment Methods | Versapay (1)

The most secure payment methods

1. ACH

What are ACH payments?

An ACH payment is an electronic transfer of funds run by the National Automated Clearing House Association (NACHA) in the United States. With an ACH payment, funds move electronically from one bank to another through the ACH network. This network connects every single US financial institution. It gives them the ability to transfer money from one bank to another safely, quickly, and securely.

Why are ACH payments secure?

ACH payments are increasingly popular—the total volume of payments made on the ACH network in the third quarter of 2021 was 7.3 billion (totaling $18.1 trillion in value), up 7.7% from the second quarter, which was already up 9.9% over the first quarter.

The reason for this growth (particularly in B2B, which accounted for 1.4 billion of the transactions made in Q3 of 2021) is because ACH is generally considered the most secure payment method between businesses.

ACH payments go through a clearinghouse that keeps account numbers confidential (while enforcing its own rules and regulations). The Electronic Fund Transfer Act, enacted in 1978, serves to protect customers who transfer funds electronically and gives them the same confidence they have (but maybe shouldn’t) in the checking system. Among other things, this Act gives sellers and buyers a 60-day period to recover funds lost to fraud or error.

ACH payments are not exempt from fraud, however, as employees often still have access to sensitive information. But with the other safety measures that exist, buyers and sellers can be more confident in the security of these transactions.

2. Virtual cards

What are virtual cards?

Virtual cards are single-use credit card numbers that are generated for each vendor payment. As the name suggests, they are entirely virtual—no plastic, no chips, no PINs. Buyers typically enjoy using virtual cards as they offer improved security, better control, and complete transaction details. Sellers are increasingly beginning to embrace this payment method, as solutions are cropping up that provide straight-through-processing for virtual cards and integrate with their enterprise resource planning (ERP) systems to input remittance data automatically.

Why are virtual cards secure?

Virtual cards are nearly impossible to defraud. There are a few reasons for this:

  • Virtual cards have a limited shelf-life, meaning they’re only valid for a limited period or for a limited number of transactions—in many cases, just one.
  • Virtual cards ensure that any sensitive credit card details (on the buyer’s primary credit card) are not shared with you when accepting the payment.
  • Even if a virtual card number is compromised, the buyer’s actual account number will be masked.

B2B payments often require some manual lift when facilitating transactions. With this comes the risk of human error. Virtual cards—and their single use nature—can eliminate this risk entirely. B2B buyers can rest assured knowing a virtual card was used for its intended purpose, and account information was not transferred through numerous parties before a payment was completed.

3. Credit cards

What are credit cards?

A credit is an agreement between lenders and borrowers. Borrowers—often the customer or buyer—receive sums of money from lenders to pay for goods or services. That money must be repaid to the lender later—often with interest. This is the biggest difference between payments made with debit cards and credit cards. Payments made with credit cards are not deducted right away, instead going on the buyer's line of credit, indicating that the funds will be paid later.

Why are credit cards secure?

Despite how rampant payment fraud has become—and despite credit cards seemingly being at the center of so many fraudulent attacks—credit cards are still one of the three most secure payment methods. This is especially the case for B2B buyers.

Credit cards aren’t linked to buyers’ bank accounts—instead, the card issuer (Visa, Mastercard, American Express, etc.) will be paying each transaction (that is, until the bill needs paying, of course!). Other alternative digital payment methods—like debit cards or electronic checks—are linked directly to customer accounts. In the event these methods are compromised, fraudsters would gain access to all funds stored in an account.

When using credit cards, buyers can more easily be made aware of fraudulent attacks too. Technology has enabled card issuers to notify cardholders of any suspicious activities or transactions that might be indicative of their card being compromised.

Many card issuers make it so that their cardholders can lock their credit cards—both their physical and virtual varieties—at the tap of a button, ensuring they clamp down on fraud within moments of it being identified. And those fraudulent transactions that make it through? Card issuers have the power to freeze any credit card transactions that are in dispute, meaning the buyer will only need to pay for it once the dispute (also known as a chargeback) is resolved, and if it's ruled in their favor, then not at all.

Lastly—and this is particularly notable in B2B—there are smart corporate credit cards that can introduce further security measures. These cards often come with robust controls that block unapproved spending.

The least secure payment methods

1. Paper checks

What are paper checks?

A paper check is a written, dated, and signed document—prepared by the customer or buyer—that directs their bank to pay a specific amount of money to the supplier. While paper check usage is steadily declining, many B2B businesses are still reliant on the payment method.

Why are paper checks not secure?

Paper checks are not a secure form of payment. Yet, in a recent Versapay survey, 91% of tech leaders in their organization’s finance department said they still receive check payments from customers. And while this survey also found that the volume of digital payments respondents receive have increased over the last 12 months, 49% of finance leaders saw an increase in paper checks.

The reason for this increase stems from buyers’ resistance to change deeply ingrained buying and record-keeping habits. For example, one construction executive was quoted saying, “People like the money-in-hand feeling. They feel they have more control over physical checks. They do not trust electronic payments.”

Another retail executive said, in response to a question about why buyers are hesitant to move away from making payments by check, “I think it’s because that’s what they’re used to. They trust what they always rely on.”

Familiarity and a false sense of security are driving check fraud, and it’s time to put those falsehoods to rest. Paper checks include too much sensitive information that when acquired by fraudsters, can have severe implications. In the wrong hands, account and routing numbers, along with contact details, can compromise buyer security and wreak financial havoc.

Beyond the known concerns associated with paper checks, fraud experts are sounding the alarm on why checks are insecure payment methods. Steve Kenneally, Senior Vice President of Payments and Cybersecurity Policy for the American Bankers Association boils it down to two sentences: “What you’re doing is handing someone a piece of paper with your name, address and bank account information. Electronic payments, by contrast, are safer, faster, and cheaper.”

2. Wire transfers

What are wire transfers?

The term wire transfer is often used interchangeably with ACH. While the two work very similarly, there are some notable differences that make wire transfers less secure. The two payment methods vary in seven major ways, detailed in the chart below:

The Most Secure B2B Payment Methods | Versapay (2)

Why are wire transfers not secure?

While appealing due to their incredible transfer speed (in as little as minutes) and transaction volume capacity (up to multiple million dollars in a single transfer), wire transfers remain an attractive target for fraudulent activity—for the same very reasons.

Tack on the immediate settlement of the payment—wire transfers cannot be refunded or cancelled once initiated—and the lack of internal controls, and you might as well be rolling out the red carpet for fraudsters if you’re still dealing in wire transfers.

Wire transfer fraud is most commonly the Robin to Business Email Compromise’s (BEC) Batman. BEC happens when fraudsters identify a victim’s behavior and poses as someone whom they trust—a legitimate recipient such as a third-party vendor, for example.

The fraudster will then make an urgent—and completely false—request instructing the victim to immediately wire funds to the payment instructions they provide. Because wire transfers cannot be reversed, it's very difficult to re-acquire the funds your AP department might have transferred to the fraudster’s bank account.

According to the Association for Financial Professionals (AFP), 76% of organizations experienced business email compromise in 2020—a slight increase from 75% in 2019—and wire transfers were the highest targeted payment methods of those attacks, accounting for 43% of them.

Wire transfers are also expensive to initiate! So, if you’re not convinced of their security vulnerabilities, maybe the $25 to $50 in bank fees per wire transfer might have you seeing otherwise.

3. Phone-initiated payments (card-not-present)

What are card-not-present transactions?

A card-not-present (CNP) transaction most commonly occurs when the cardholder and credit card are not physically present at the time of the transaction. This payment method is most prevalent when transactions occur over the phone, by fax, internet, or mail.

There are many different types of CNP transactions, some more common than others. These include online purchases, phone-initiated payments, recurring payments, online invoice payments, and card-on-file payments. The least secure of these—and the least secure of all payment methods—are phone-initiated payments.

Why are phone-initiated (card-not present) transactions not secure?

When payment options are limited, some businesses resort to accepting credit card payments for invoices over the phone. This process is highly manual, and for businesses looking to maintain a secure payment environment, is not great for ensuring PCI compliance. The goal of the PCI DSS is to minimize the scope of the cardholder data environment. This means that the people, processes, and technologies that store, process, or transmit credit card information should be pared down to only those most vital to facilitating transactions.

Phone-initiated payments put B2B sellers firmly in PCI DSS scope. What’s more, the actual effort of processing payments over the phone is sluggish, inefficient, and error prone. Credit card information relayed over the phone is not tokenized, forcing humans to interact with and handle sensitive card data. That data must often be destroyed (for instance if it was recorded on a piece of paper) after it was appropriately inputted into your accounting systems.

Complications from phone-initiated payments may also arise before a transaction is even facilitated. When transactions are performed over the phone, it can be difficult for merchants to verify the identity of the buyer, often forcing them to work rigorously to prove it. Common protections to lessen these risks and verify identity—such as signatures and encrypted card chips—simply do not work in dealings over the phone.

How do you make digital payments even more secure?

Many third-party providers are often involved in processing digital payments. You’ve got your payment processors, your payment gateways, your merchant acquirers, your issuing banks, and your ERPs—among many others. The more hands a digital payment passes through, the more vulnerabilities exist. And a fraudster could use any one of those vulnerabilities as an access point.

There are numerous brute force methods merchants and suppliers can implement—such as introducing CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart)—at their online shopping carts to heighten payment security and reduce payment fraud. One of the best ways to make digital payments more secure is to partner an integrated payments solution embedded seamlessly with your ERP. This eliminates many of the vulnerabilities that arise from handoffs between third-party providers.

These integrated payments solutions can allow buyers to securely store their payment information, too. This enables them to more easily store funds, make purchases, and track payment history. They make the B2B buyer’s experience significantly more convenient—and most importantly, more secure.

Remember, fraud is usually carried out by bad actors. They use what’s publicly accessible, such as an ecommerce site or a non-gated web-based payment page. Instances of fraud on integrated payments solutions are exceptionally low as buyers often pay through secure portals where logins are required.

Fraud should not prevent you from accepting digital payment methods. Instead, you should embrace digital payment methods as a means of distancing yourself from the potentially devastating impact of falling victim to fraud from traditional payment methods—namely paper checks, wire transfers, and phone-initiated payments.

The most secure payment methods are digital. Download our ebook—Payment Fraud Explained: How B2B Merchants Can Fight Fraud and Maximize Customer Experience—to learn how you can accept and process digital payments using Versapay and significantly minimize your risk of fraud at the same time.

The Most Secure B2B Payment Methods | Versapay (2024)

FAQs

The Most Secure B2B Payment Methods | Versapay? ›

ACH (Automated Clearing House) payments is a method available in the United States for transferring funds electronically. This is a popular B2B payment method because ACH payments are inexpensive, convenient, and the most secure.

What is the best payment method for B2B? ›

Cash. Cash is always king, and in some cases, it facilitates B2B transactions better than other payment types. The biggest advantage of a business paying cash is that they never have to pay annual fees like a line of credit. Also, if the money is not there, it doesn't get spent, and interest is never incurred.

What is B2B payment solution? ›

The definition of business-to-business payments or B2B payments is the transfer of value denominated in currency from buyer to supplier for good or services supplied. B2B payments can be a one time or recurring transaction depending on the contractual agreement made between the buyer and supplier.

What are the most common B2B payment terms? ›

Common terms for B2B transactions are net 30, net 60, and net 90, which indicates the number of days until payment is due.

What are the 3 types of B2B purchases? ›

B2B Buying Situations

Common types of buying situations include the straight rebuy, the modified rebuy, and the new task.

What is the most effective approach to B2B sales? ›

Solution selling

As the name suggests, this B2B sales strategy focuses more on the needs of the prospect than it does on the actual product sale process. Put more precisely, the salesperson focuses on diagnosing or helping identify the needs of the prospect, their challenges, and their goals.

What is the most preferred payment method? ›

Cards are still the most-used payment method, with American Express, Mastercard, Visa as large global card schemes. Even though they're recognized globally, other payment methods like online banking, direct debit, digital wallets, or Buy Now Pay Later (BNPL) are more common elsewhere.

What is B2B method? ›

In the context of communication, business-to-business refers to methods by which employees from different companies can connect through outlets such as social media. This type of communication between the employees of two or more companies is called B2B communication.

What is the trend in B2B payments? ›

A Shift To Real-Time Payments

One of the most prominent outcomes of digitalizing B2B payments is making real-time payments possible and setting the trend for normalizing it as a standard procedure. Many countries have already implemented their own real-time payment systems.

What is biggest B2B example? ›

1. Microsoft. Microsoft is a well-known name not just for individuals but for businesses too. Whether it's a small local shop or a big international company, Microsoft has something to offer.

What is the rule of 7 in B2B? ›

The rule of seven quite simply states that it takes an average of seven interactions with your brand before a purchase will take place. This makes sense. How many of us would buy a highly priced item from an unfamiliar brand?

What is an example of a B2B transaction? ›

Business-to-Business (B2B) commerce encompasses a broad spectrum of transactions, from raw materials procurement to finished product distribution and everything in between. An example of B2B would be as between a wholesaler and a retailer or as between a manufacturer and a wholesaler.

Which payment method is most successful? ›

Cards are still the most-used payment method, with American Express, Mastercard, Visa as large global card schemes. Even though they're recognized globally, other payment methods like online banking, direct debit, digital wallets, or Buy Now Pay Later (BNPL) are more common elsewhere.

Does PayPal do B2B? ›

Flexible payment solutions for B2B.

Receiving payments is faster and easier than traditional wire transfers, especially for business-business sellers. With PayPal, there are different payment solutions to suit your needs.

Top Articles
Password: Season Two; NBC Renews Game Show Revival But It Won't Return Soon
How Long Do Amphetamines Stay in Your System?
Xre-02022
How To Fix Epson Printer Error Code 0x9e
Yogabella Babysitter
Craigslist Pet Phoenix
South Carolina defeats Caitlin Clark and Iowa to win national championship and complete perfect season
Routing Number 041203824
Cape Cod | P Town beach
William Spencer Funeral Home Portland Indiana
FIX: Spacebar, Enter, or Backspace Not Working
Myql Loan Login
4156303136
Snow Rider 3D Unblocked Wtf
Download Center | Habasit
Highland Park, Los Angeles, Neighborhood Guide
Aldi Süd Prospekt ᐅ Aktuelle Angebote online blättern
Vistatech Quadcopter Drone With Camera Reviews
Spider-Man: Across The Spider-Verse Showtimes Near Marcus Bay Park Cinema
NBA 2k23 MyTEAM guide: Every Trophy Case Agenda for all 30 teams
Effingham Bookings Florence Sc
Pjs Obits
Invitation Homes plans to spend $1 billion buying houses in an already overheated market. Here's its presentation to investors setting out its playbook.
Melissababy
Theater X Orange Heights Florida
Optum Urgent Care - Nutley Photos
All Obituaries | Gateway-Forest Lawn Funeral Home | Lake City FL funeral home and cremation Lake City FL funeral home and cremation
Certain Red Dye Nyt Crossword
Watch Your Lie in April English Sub/Dub online Free on HiAnime.to
Bill Remini Obituary
California Online Traffic School
Dr. Nicole Arcy Dvm Married To Husband
Speedstepper
Mikayla Campinos: Unveiling The Truth Behind The Leaked Content
Cvs Sport Physicals
3 Ways to Format a Computer - wikiHow
Mosley Lane Candles
Have you seen this child? Caroline Victoria Teague
Nextdoor Myvidster
What Happened To Father Anthony Mary Ewtn
Kstate Qualtrics
Asian Grocery Williamsburg Va
Plead Irksomely Crossword
Housing Intranet Unt
craigslist | michigan
Www Usps Com Passport Scheduler
Traumasoft Butler
Craigslist Malone New York
Stosh's Kolaches Photos
antelope valley for sale "lancaster ca" - craigslist
Puss In Boots: The Last Wish Showtimes Near Valdosta Cinemas
OSF OnCall Urgent Care treats minor illnesses and injuries
Latest Posts
Article information

Author: Otha Schamberger

Last Updated:

Views: 6169

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.