{"id":15043,"date":"2024-08-02T13:38:37","date_gmt":"2024-08-02T13:38:37","guid":{"rendered":"https:\/\/trustpair.com\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/"},"modified":"2025-03-25T12:22:47","modified_gmt":"2025-03-25T12:22:47","slug":"what-are-the-most-dangerous-types-of-billing-schemes","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/","title":{"rendered":"What are the most dangerous types of billing schemes?"},"content":{"rendered":"<p>KIA Motor lost $800K from a billing scheme. A CPA approved invoices to a false entity she created herself. She was later charged by Orange County\u2019s District Attorney&#8217;s Office. According to the ACFE, <strong>billing schemes cause the highest median loss ($100,000)<\/strong>. How can you protect your organization against its most dangerous types? Keep reading to find out!<\/p>\n<p>Trustpair blocks the effects of billing scheme fraud by detecting and preventing payment fraud from happening through <a href=\"https:\/\/trustpair.com\/gb\/automated-account-validation\/\">ongoing account validation<\/a>. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Contact an expert to learn more!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-da811cb8-a05b-4781-a174-88c951500f10\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-da811cb8-a05b-4781-a174-88c951500f10\" class=\"hs-cta-node hs-cta-da811cb8-a05b-4781-a174-88c951500f10\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/da811cb8-a05b-4781-a174-88c951500f10\"><img decoding=\"async\" id=\"hs-cta-img-da811cb8-a05b-4781-a174-88c951500f10\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/da811cb8-a05b-4781-a174-88c951500f10.png\" alt=\"New call-to-action\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'da811cb8-a05b-4781-a174-88c951500f10', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>Shell companies<\/h2>\n<p>KIA Motor\u2019s example in the news is a prime illustration of what a shell company billing scheme is:<\/p>\n<ol>\n<li>An employee creates a fictitious organization,<\/li>\n<li>Registers it as a company\u2019s vendor,<\/li>\n<li>Submits invoices to accounts payable for goods or services never rendered,<\/li>\n<li>Receive payments on a bank account that belongs to them, or an accomplice.<\/li>\n<\/ol>\n<p>For example, a rural Texan pharmacy owner operated a fraudulent pharmacy that billed private consumers. They were sentenced to more than four years of imprisonment. Billing schemes are sadly common in hospitals, insurance, as well as office settings.<\/p>\n<p>In a small business, the person submitting the invoice is also the one approving the payment. The whole scheme is easy to commit, and unlikely to be detected before some time.<\/p>\n<p>In larger companies,<strong> the scheme might be run by several employees plotting together<\/strong>. Or, they take advantage of the trust their managers have in them. Either way, knowing your internal processes makes it easy for your employees to commit <a href=\"https:\/\/trustpair.com\/gb\/blog\/how-to-reduce-and-detect-internal-fraud-risk\/\">internal fraud<\/a> through shell companies.<\/p>\n<p>One of the red flags of vendor fraud (another name for it) is that the address on the invoice includes a PO box, and\/or a company name with initials only.<\/p>\n<h2>Fake invoices<\/h2>\n<p><a href=\"https:\/\/trustpair.com\/gb\/blog\/how-to-detect-and-prevent-invoice-fraud\/\">Fake invoice fraud<\/a> is a variation of the above scheme:<strong> employees or fraudulent businesses create a false invoice that gets paid by your company<\/strong>. They usually invoices services, as their delivery is harder to track.<\/p>\n<p>It sadly happens a lot in the healthcare sector. Health Connect America, a behavioral health provider, was recently in the press for a billing scheme. The defendants billed services never rendered to patients that Virginia Medicaid paid for. This type of fraud cost the general public\u2019s tax money and it bad for the hospital\u2019s reputation.<\/p>\n<p>In Illinois, a doctor ran a scheme defrauding the Federal Employees Health Benefits Program. The case didn\u2019t make it to court, as their attorney approved a settlement reaching $750.000.<\/p>\n<p>Employees can also easily duplicate or inflate invoices from your real suppliers to steal money. It can happen without or without your vendor\u2019s knowledge. If they are accomplices of your suppliers, they will get a cut from the profits as accomplices.<\/p>\n<p>All the more reasons to set up adequate employee fraud prevention techniques in your company!<\/p>\n<h2>Pay and returns schemes<\/h2>\n<p>Pay and returns schemes are initiated by employees involved in your procure-to-pay process. <strong>They purposely send a higher payment for a legitimate invoice to your vendors<\/strong>:<\/p>\n<ul>\n<li>Sending a duplicate payment or<\/li>\n<li>Sending a higher amount than requested.<\/li>\n<\/ul>\n<p>They will try to pass this fraudulent B2B transaction as a mistake and request the difference to be returned to them.<\/p>\n<p>They\u2019ll either ask for a check in return that they\u2019ll cash on their own account, or give their bank account details to your vendor. Either way, they will find a way to tamper with the payment return to make a profit.<\/p>\n<h2>Inventory fraud<\/h2>\n<p>This fraud billing scheme involves <strong>an employee selling goods bought by your company<\/strong>. They\u2019ll either take it straight from your inventory or collect it directly at your vendor\u2019s warehouse to avoid leaving a trace.<\/p>\n<p>To avoid detection, they will split a big order into smaller invoices that won\u2019t trigger your internal control processes.<\/p>\n<p>For example, an employee might order goods worth $4,200, knowing that your threshold for approval is $ 4,500. They will then sell the goods and pocket the proceeds.<\/p>\n<h2>Personal purchases<\/h2>\n<p>An employee <strong>buys goods or services that aren\u2019t related to your business \u2014 a personal purchase \u2014 and gets your organization to pay for them.<\/strong><\/p>\n<p>This can happen in several ways:<\/p>\n<ol>\n<li>Sending legitimate invoices: as they are, hoping they\u2019ll get paid, or tampered with to make it look business related.<\/li>\n<li>Credit card fraud: using their corporate credit card to make personal purchases. Once more, they might submit the real receipt, or ask an accomplice to modify it.<\/li>\n<\/ol>\n<p>Employees tamper with their expense reports to make them look like the purchase was a legitimate business expense. This kind of fraud scheme is carried out by people who have access directly or indirectly to the person approving said business expenses.<\/p>\n<h2>Change in supplier\u2019s credentials<\/h2>\n<p>This is a common form of <a href=\"https:\/\/trustpair.com\/gb\/blog\/wire-transfer-fraud-prevention-best-practices-and-recovery\/\">wire transfer scam<\/a>: <strong>an employee changes your vendor\u2019s credentials with their own bank account details<\/strong>. Every time you think you\u2019re paying your real supplier\u2019s real invoice, you\u2019re actually sending money to a fraudster.<\/p>\n<p>Besides causing direct financial losses, it also jeopardizes your supplier relationship. It\u2019s likely to be some time before you or your vendor realize what\u2019s really going on, which could affect your company\u2019s productivity and production.<\/p>\n<p>It\u2019s even harder to detect when the fraudster takes care to change the bank account information back to your real vendors. By doing it temporarily, across various suppliers, they can manage to bury any leads.<\/p>\n<p>Learn more about payment fraud in <a href=\"https:\/\/trustpair.com\/resources\/fraud-in-the-cyber-era-2025-us-fraud-trends-insights\/?utm_campaign=6696251-2025%20US%20Fraud%20Study&#038;utm_source=website&#038;utm_medium=header\">our latest fraud report!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-node hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013\"><img decoding=\"async\" id=\"hs-cta-img-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013.png\" alt=\"fraud study us\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, '26e69232-c009-4130-a9a9-c5b1c44d4013', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>How to detect and prevent fraud billing schemes?<\/h2>\n<p>But billing schemes aren\u2019t a fatality. Now that you\u2019re aware of how they work, you can start adjusting your internal processes so they don\u2019t happen.<\/p>\n<p>Here\u2019s what we at Trustpair recommend:<\/p>\n<ul>\n<li><strong>Implement segregation of duties:<\/strong> splitting key operations across different people reduces the risk of internal fraud. For example, you can have one person making orders, another checking they\u2019ve been received, and a third approving payments \u2014 each with their own security checklist. The same goes for expense reports.<\/li>\n<li><strong>Increase your <a href=\"https:\/\/trustpair.com\/gb\/blog\/internal-control-the-key-to-secure-financial-systems\/\">internal control protocols<\/a>:<\/strong> review your financial reports more often to detect any anomalies. You can set up an internal control department or hire an auditing firm. Just informing your employees about it will have a deterring impact.<\/li>\n<li><strong>Check invoices carefully<\/strong>: look for duplicates, sudden rises in prices, or suppliers who have a PO box as a domiciliation address.<\/li>\n<li><strong>Ongoing account validation:<\/strong> the best way to protect yourself against fraud is to check your vendor\u2019s credentials every time you want to send a payment. That ensures their bank account information hasn\u2019t been tampered with. While only a small percentage of companies do that, it drastically reduces the risk of fraud.<\/li>\n<\/ul>\n<p>The good news? Trustpair helps you with all of that! Our anti-fraud software is designed to protect you against the<a href=\"https:\/\/trustpair.com\/gb\/blog\/fraud-prevention-services-all-you-need-to-know\/\"> main examples of business fraud.<\/a><\/p>\n<p>The solution continuously monitors your supplier\u2019s credentials, checking data against domestic and international databases. Our AI detects suspicious patterns and raises the alarm before the transaction is sent. It means no unauthorized transaction can be sent! It also sends a strong signal to your employees, thus reducing the opportunity for them to commit billing fraud with impunity. We\u2019ve worked with 200+ organizations internally, and have a 100% success rate in eradicating fraud!<\/p>\n<p>Key Takeaways:<\/p>\n<p>A billing scheme happens when employees perceive an opportunity to commit fraud without being caught. Trustpair completely eradicates the risk of fraud by continuously controlling your third-party credentials in real time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>KIA Motor lost $800K from a billing scheme. A CPA approved invoices to a false entity she created herself. She was later charged by Orange County\u2019s District Attorney&#8217;s Office. According to the ACFE, billing schemes cause the highest median loss ($100,000). How can you protect your organization against its most dangerous types? Keep reading to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15044,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-15043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a billing scheme and how to spot it? - Trustpair<\/title>\n<meta name=\"description\" content=\"A billing scheme can have serious consequences for your company. Learn how it works and how to spot it to protect your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a billing scheme and how to spot it? - Trustpair\" \/>\n<meta property=\"og:description\" content=\"A billing scheme can have serious consequences for your company. Learn how it works and how to spot it to protect your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-25T12:22:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"What are the most dangerous types of billing schemes?\",\"datePublished\":\"2024-08-02T13:38:37+00:00\",\"dateModified\":\"2025-03-25T12:22:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/\"},\"wordCount\":1250,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/\",\"name\":\"What is a billing scheme and how to spot it? - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg\",\"datePublished\":\"2024-08-02T13:38:37+00:00\",\"dateModified\":\"2025-03-25T12:22:47+00:00\",\"description\":\"A billing scheme can have serious consequences for your company. Learn how it works and how to spot it to protect your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the most dangerous types of billing schemes?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a billing scheme and how to spot it? - Trustpair","description":"A billing scheme can have serious consequences for your company. Learn how it works and how to spot it to protect your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/","og_locale":"en_GB","og_type":"article","og_title":"What is a billing scheme and how to spot it? - Trustpair","og_description":"A billing scheme can have serious consequences for your company. Learn how it works and how to spot it to protect your business.","og_url":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:37+00:00","article_modified_time":"2025-03-25T12:22:47+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"What are the most dangerous types of billing schemes?","datePublished":"2024-08-02T13:38:37+00:00","dateModified":"2025-03-25T12:22:47+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/"},"wordCount":1250,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/","url":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/","name":"What is a billing scheme and how to spot it? - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg","datePublished":"2024-08-02T13:38:37+00:00","dateModified":"2025-03-25T12:22:47+00:00","description":"A billing scheme can have serious consequences for your company. Learn how it works and how to spot it to protect your business.","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_591470369.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/what-are-the-most-dangerous-types-of-billing-schemes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"What are the most dangerous types of billing schemes?"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=15043"}],"version-history":[{"count":4,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15043\/revisions"}],"predecessor-version":[{"id":17508,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15043\/revisions\/17508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/15044"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=15043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=15043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=15043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}