top of page

Payroll Direct Deposit Risk & Fraud Prevention Playbook

Updated: Mar 13

A practical control pack to prevent payroll diversion, protect employees, and keep bank changes from becoming incidents.


Bank icon, checklist with checkmarks, and shield with exclamation. Text: Payroll Direct Deposit Risk & Fraud Prevention Playbook. Gray tones.


Why bank-change controls matter


Direct deposit changes look routine—until they aren’t.


The highest-impact payroll incidents often come from a simple workflow weakness: someone requests a bank change, payroll processes it quickly, and the next payday routes money to the wrong place.


The root cause is rarely payroll math. It’s usually a breakdown in verification, approvals, and timing controls—exactly the kinds of weaknesses attackers target in payroll phishing and business email compromise schemes. 


This guide is designed to make direct deposit changes boring again: predictable, controlled, and auditable.


The fraud-control trade-off


Direct deposit changes force a trade-off most teams never name:


  • Frictionless updates (fast, minimal review, fewer employee steps)

    vs

  • Controlled updates (verification, holds, approvals, and evidence)


“Frictionless” feels employee-friendly, but it increases the chance of:


  • fraud/diversion events

  • accidental misrouting

  • payday emergencies and off-cycle corrections

  • long-term trust damage (“payroll can’t be trusted”)


“Controlled” adds small steps, but it reduces incident probability dramatically—especially for remote workforces and organizations with multiple admins.


High-level conclusion: treat bank changes like high-risk payroll events


The safest operating model treats direct deposit changes as a high-risk event with four non-negotiables:


  1. Identity verification: the request must be verified through a trusted channel (not the same email thread).

  2. Timing controls: changes near cutoff trigger a hold rule (apply next cycle unless verified early enough).

  3. Evidence pack: every change produces proof (who requested, how verified, who approved, when effective).

  4. Incident playbook: when something smells wrong, you have a stop-the-line escalation path.


These controls align with how federal guidance frames payroll-targeting scams: attackers exploit trust and informal processes, so defenses must be procedural and testable, not just “be careful.” 


Related decision guide: Payroll Change Control Playbook


Hand holds a puzzle piece labeled "PAYROLL" against a dark background. Another piece below shows a hexagonal pattern.

Get Your Free Payroll Software Matches

SelectSoftware Reviews Offers 1:1 Help From a Payroll Software Advisor. Get in touch to:



Table of contents





Pre-mortem: how direct deposit goes wrong in real life


This section is intentionally concrete. The goal is to make failure predictable so prevention becomes practical.


Failure path 1: “Employee email request” with no out-of-band verification


What happens


  • A request arrives by email: “I changed banks—please update direct deposit.”

  • Payroll updates it because it “sounds normal.”

  • Payday routes to a new account that is not the employee’s.


Why it happens

Email is not identity. Attackers leverage compromised inboxes, spoofed addresses, and urgency language—patterns common in business email compromise activity. (fbi.gov)


Prevention control


  • Require out-of-band verification (trusted call-back or portal verification), and never verify in the same email thread.


Failure path 2: “Executive urgency” override (process bypass)


What happens


  • A message appears to come from a leader or HR: “Please update this today—urgent.”

  • The team bypasses normal checks to help.

  • Funds are diverted or misrouted.


Why it happens

Attackers target human helpfulness, perceived authority, and time pressure—again consistent with business email compromise patterns. (fbi.gov)


Prevention control


  • A “stop-the-line” rule: urgency never replaces verification.

  • Escalate to a second approver for any exception to policy.


Failure path 3: Changes inside cutoff windows (timing risk)


What happens


  • An employee requests an update close to payroll cutoff.

  • Payroll updates it immediately.

  • The change applies to the next payroll run without adequate verification time.

  • If anything is wrong, there is no time to correct before pay is released.


Prevention control


  • A cutoff/hold rule: changes inside the window apply next cycle unless they meet a stricter verification standard.


Failure path 4: Shared admin access (no accountability, no traceability)


What happens


  • Multiple admins can change banking details.

  • There’s limited audit trail review.

  • A change is made and later disputed; no one can quickly prove who did what and why.


Prevention control


  • Restrict executors, require approvals, and retain a standard evidence pack.


Related decision guide: Payroll Change Control Playbook


Failure path 5: Employee self-service exists, but “support” bypasses it


What happens


  • A self-service portal exists, but employees email payroll because it’s faster.

  • Payroll makes manual updates without the portal verification trail.

  • Evidence and accountability are weakened.


Prevention control


  • Enforce channel discipline: bank changes must come through controlled channels (portal or verified call-back workflow).

  • If support assists, it should assist through the controlled flow, not bypass it.


Failure path 6: No incident playbook (you lose time when time matters)


What happens


  • A suspicious request comes in or an employee reports missing pay.

  • The team scrambles to decide what to do.

  • Critical time is lost, and evidence is scattered.


Prevention control


  • A short incident escalation workflow: hold changes, notify internal owners, preserve evidence, and escalate to the bank/provider per your internal process.



Direct Deposit Risk & Fraud Prevention Control Pack


This is the primary decision artifact. It includes:


  1. Verification checklist

  2. Cutoff and hold rules

  3. Evidence pack requirements

  4. Escalation workflow (stop-the-line)


All artifact tables follow your 5-column maximum rule.


Artifact Table A — Verification checklist (identity + channel controls)

Step

What to do

Why it matters

Owner

Evidence to retain

V1

Accept bank change requests only through approved channels (preferred: self-service; alternate: verified call-back process)

Reduces spoofing and channel manipulation

Payroll intake owner

Request record + channel used

V2

Verify identity out-of-band (not the same email thread); use a trusted callback method

Email-only verification is vulnerable

Payroll resolver

Verification note (method, date/time)

V3

Require a second check for “high-risk signals” (new bank + urgency + new email/phone)

Risk is multiplicative when multiple signals exist

Payroll lead/approver

Risk flag note + approval

V4

Confirm effective date and communicate when the change will apply

Prevents misunderstanding and timing errors

Payroll intake owner

Employee message copy

V5

If verification fails or feels suspicious, stop-the-line and escalate (do not process)

Prevents irreversible releases

Payroll lead

Escalation record


Artifact Table B — Cutoff and hold rules (timing discipline)

Rule

Condition

Action

Owner

Evidence to retain

T1

Request received inside payroll cutoff window

Default: apply to next pay cycle

Payroll intake owner

Timestamp + cutoff determination

T2

Request is urgent but inside cutoff

Only process this cycle if enhanced verification completed and approver signs off

Payroll lead/approver

Verification proof + approval

T3

Any request with high-risk signals

Mandatory hold until verified + secondary review

Payroll lead

Risk flag + review note

T4

First payroll after change

Run a post-run confirmation check (confirm deposit success where possible)

Payroll resolver

Confirmation note

T5

Employee reports missing pay after a change

Trigger incident workflow immediately

Payroll lead

Incident ticket/log


Artifact Table C — Evidence pack requirements (audit-ready proof)

Evidence item

Minimum content

When required

Owner

Storage location

E1 Request record

Who requested, what changed, date/time, channel

Every change

Intake owner

Evidence pack folder

E2 Identity verification record

Method used, verification date/time, verifier name

Every change not done purely in verified self-service

Resolver

Evidence pack folder

E3 Approval record (if applicable)

Approver, date/time, reason for exception or high-risk flag

High-risk or exception-to-policy

Payroll lead

Evidence pack folder

E4 Effective date confirmation

Which pay date the change applies to

Every change

Intake owner

Evidence pack folder

E5 Post-change confirmation note

Any confirmation performed + outcome

First payroll after change or any incident

Resolver

Evidence pack folder



Artifact Table D — Escalation workflow (stop-the-line)

Trigger

Immediate action

Escalate to

Do not do

Evidence to retain

S1 Suspicious request indicators

Do not process; place hold; verify via trusted method

Payroll lead + security/IT (as applicable)

Don’t reply in-thread confirming details

Incident log entry

S2 Executive urgency request

Require secondary approval + verification

Payroll lead + HR lead

Don’t bypass process due to title

Approval + verification notes

S3 Reported missing pay

Start incident workflow; validate change history; confirm deposit status

Payroll lead + finance (as needed)

Don’t promise timelines you can’t control

Investigation notes + outcomes

S4 Multiple bank changes in short window

Freeze further changes until reviewed

Payroll lead

Don’t process repeated changes without review

Pattern review note

S5 Access anomaly (unexpected admin change)

Suspend change ability; review audit trail

Payroll lead + IT/admin

Don’t assume it’s harmless

Access review record


Hand holds a puzzle piece labeled "PAYROLL" against a dark background. Another piece below shows a hexagonal pattern.

Get Your Free Payroll Software Matches

SelectSoftware Reviews Offers 1:1 Help From a Payroll Software Advisor. Get in touch to:



Decision drivers


Direct deposit controls should be calibrated to the realities that raise risk. This section tells you what to tighten when your environment changes so the control pack stays practical (not overbuilt).


Driver 1: Workforce distribution and remote work


Remote and distributed workforces increase identity and channel risk because:


  • payroll teams rely more on email and messaging

  • in-person verification is rare

  • urgency messages are harder to validate informally


Practical implication


  • Make out-of-band verification a Tier 1 control.

  • Require stronger hold rules near cutoff because verification time is constrained.


Driver 2: Who can change bank details (permission surface area)


Risk increases sharply when multiple admins can edit banking:


  • more potential for error

  • more potential for unauthorized change

  • lower visibility unless audit review is routine


Practical implication


  • Restrict executors.

  • Add a monthly audit trail review of bank changes and admin access.


Related decision guide: Payroll Change Control Playbook


Driver 3: Change volume (how often bank changes happen)


High change volume increases the chance that:


  • a risky request slips through

  • evidence isn’t captured consistently

  • cutoff discipline is bypassed to “keep up”


Practical implication


  • Standardize intake and evidence pack creation so it’s faster to do the right thing than to bypass it.

  • Use the T1/T2 hold rules consistently so urgency doesn’t become the default.


Driver 4: Cutoff timing and payroll cadence


Short payroll cycles and tight cutoffs reduce verification time.


Practical implication


  • Make timing rules explicit and employee-facing (“changes inside cutoff apply next cycle”).

  • Treat cutoff violations as process failures to correct, not heroic exceptions.


Driver 5: Organizational risk tolerance (trust cost of an error)


Direct deposit errors carry outsized trust damage. The “cost of mistake” is often:


  • employee hardship

  • reputation and retention risk

  • admin time for emergency fixes

  • potential fraud exposure


Practical implication

Even small teams should treat bank changes as high-risk events with minimum evidence standards.


Driver 6: Security posture and incident coordination


Payroll teams rarely own incident response. Risk is reduced when the escalation path is defined:


  • who to notify internally

  • how to preserve evidence

  • who controls access and holds


Practical implication

Keep the escalation workflow short and test it once (a tabletop exercise).



Switching triggers


In this guide, “switching triggers” are the signals that your current payroll tooling or process cannot safely support direct deposit changes—and you need to strengthen controls or reconsider your setup.


Trigger 1: Bank changes are processed via email or informal requests


If changes are routinely handled through email with no out-of-band verification, the system is unsafe by design.


Trigger 2: Multiple admins can change bank details without review


If executor access is broad and there’s no periodic review, you lack accountability and detection.


Trigger 3: Cutoff exceptions are common


If changes are frequently made inside cutoff windows, you’re operating in a high-risk mode every cycle.


Trigger 4: You’ve had a near-miss or an incident


A single near-miss should trigger immediate tightening:


  • mandatory verification

  • mandatory hold rules near cutoff

  • evidence packs required every time

  • escalation workflow tested


Trigger 5: High-volume workforce change (hiring surges, turnover)


Surges create more change requests and more noise, increasing the chance of social engineering success.



Failure modes


This section connects the pre-mortem to operating controls. These are the predictable ways teams fail even when they “know about fraud.”


Failure mode 1: Verification is “in the same thread”


Teams believe they verified, but they verified through a compromised channel.


Fix: Out-of-band verification is mandatory.


Failure mode 2: Urgency defeats policy


“Just this once” becomes routine, and controls collapse.


Fix: Urgency requires stricter verification, not looser controls (T2 rule).


Failure mode 3: Evidence is not retained


Even when the change is legitimate, missing evidence creates disputes and weakens incident response.


Fix: Evidence pack requirements (Table C) are mandatory.



Failure mode 4: Permission sprawl and no review


Too many admins + no review means changes can occur without detection.


Fix: Restrict executors; monthly review of bank change audit trail.


Failure mode 5: No stop-the-line culture


Suspicious requests are processed to avoid confrontation or delay.


Fix: Escalation workflow (Table D) plus leadership support that “stop-the-line” is the correct choice.



Migration considerations


Direct deposit risk often increases during transitions: new payroll provider, new HRIS, new identity workflows, or new admins.


Consideration 1: Preserve evidence outside the provider portal


During provider transitions, historical access may change. Treat evidence packs as a durable archive:


  • request records

  • verification notes

  • approvals

  • effective dates

  • incident logs (if any)



Consideration 2: Re-establish roles and access post-go-live


Implementation periods often grant broad admin access. If that access remains, risk stays elevated.


Plan an “access cleanup” milestone in the first 30 days after go-live.



Consideration 3: Align cutoff rules during cutover windows


During migration, teams are tempted to bend cutoffs to “keep things moving.” That increases risk.


Make cutover-window rules explicit:


  • changes apply next cycle unless verified early

  • emergency pathway requires approval + evidence pack


Consideration 4: Test the escalation workflow after go-live


After transition, run a quick tabletop test:


  • simulate a suspicious bank change request

  • confirm who gets notified

  • confirm who can place holds and restrict access

  • confirm where evidence is stored



Final recommendation summary


The safest direct deposit change process is not complicated. It’s consistent.


A practical, right-sized standard for most teams is:


  • Approved channels only (self-service or verified call-back workflow)

  • Out-of-band identity verification for any request not fully contained within a trusted self-service flow

  • Cutoff/hold rules that make “apply next cycle” the default near payroll deadlines

  • Evidence packs for every change so outcomes are defensible

  • Stop-the-line escalation when anything feels off


If you implement only those five components, you will materially reduce:


  • diversion/fraud risk

  • accidental misrouting

  • payday emergencies

  • administrative rework

  • employee trust damage


Related decision guide: Payroll Change Control Playbook

Related decision guide: Payroll Exception Handling SOP



Next steps if you’re ready to act


  1. Define the approved channels and publish the rule (Week 1)


  • Decide how employees must submit bank changes

  • Document the alternate path (verified call-back workflow)

  • Communicate timing: “changes inside cutoff apply next cycle”


  1. Implement verification and hold rules (Week 1–2)


  • Adopt the verification checklist (Table A)

  • Adopt cutoff/hold rules (Table B)

  • Define “high-risk signals” and require secondary review


  1. Standardize the evidence pack (Week 2)


  • Create a consistent storage location

  • Require evidence pack completion for every change (Table C)

  • Spot-check a few recent bank changes for completeness


  1. Lock down access (Week 2–3)


  • Restrict who can change bank details

  • Implement a monthly review of bank change audit trail

  • Document the escalation path if suspicious activity is detected


  1. Run a quick tabletop incident test (Week 3–4)


  • Simulate a suspicious request

  • Confirm the stop-the-line escalation workflow (Table D)

  • Confirm who can place holds and restrict access

  • Confirm where evidence is stored



Hand holds a puzzle piece labeled "PAYROLL" against a dark background. Another piece below shows a hexagonal pattern.

Get Your Free Payroll Software Matches

SelectSoftware Reviews Offers 1:1 Help From a Payroll Software Advisor. Get in touch to:



Q&A: Direct deposit fraud and payroll diversion prevention


Q1) What’s the most common way direct deposit fraud happens in payroll?


A bad actor gets a bank account change approved without proper verification—often through email compromise, impersonation, or weak self-service controls—so the next payroll diverts funds to the wrong account.


Q2) What’s the single highest-leverage control to prevent payroll diversion?


Treat bank account changes as a high-risk workflow: require identity verification, enforce a hold period or “effective date” discipline, and add a second review step (dual control) for changes close to payroll cutoff.


Q3) Should employees be allowed to change bank details in self-service?


They can be—but only if the process has strong verification and risk controls (authentication, step-up verification for changes, and clear logs). If you can’t reliably verify identity, restrict changes to a verified support path.


Q4) What should we do when a bank change is requested right before payroll runs?


Default to caution. Use a strict cutoff rule: either defer the change to the next cycle or require higher verification plus documented approval. Last-minute changes are a common incident pattern.


Q5) What evidence should we retain for bank account changes?


Keep proof of the request, verification steps performed, who approved it, the effective date used, and any employee confirmation. The goal is to reconstruct the decision fast if a dispute or incident occurs.


Q6) If diversion happens, what’s the first thing payroll should do?


Contain and document: freeze further changes, identify the impacted payroll(s) and employees, preserve audit logs and approval evidence, and start an incident checklist so recovery actions are consistent (recall attempts, employee communication, and corrective payroll decisions).



Get new payroll decision guides and operational checklists

Subscribe and receive the Payroll Provider Data Migration Field Map (editable spreadsheet)

Payroll provider data migration field map screenshot


Browse more guides




image of author Ben Scott

About the author

Ben Scott writes and maintains payroll decision guides for founders and operators. His work focuses on execution realities and how decisions hold up under growth, complexity, and controls and documentation pressure. He works hands-on in HR and leave-management roles that intersect with payroll-adjacent workflows such as benefits coordination, cutovers, and compliance-driven process controls.


Author profile: Ben Scott | LinkedIn


Disclosure: Some links in this page may be affiliate links, which means we may earn a commission if you sign up at no additional cost to you. This does not affect our analysis or conclusions.

bottom of page