{"id":68110,"date":"2025-09-02T15:25:11","date_gmt":"2025-09-02T20:25:11","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=68110"},"modified":"2025-09-02T15:26:58","modified_gmt":"2025-09-02T20:26:58","slug":"vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/","title":{"rendered":"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps"},"content":{"rendered":"\n<p>The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two large payments were routed to the impostor. The city recovered one of them, but more than a million dollars was lost before the scheme was discovered. This incident reinforces a familiar pattern in public sector risk. Process gaps, social engineering, and insufficient technical guardrails often converge. The result is financial loss and a hit to public trust.<\/p>\n\n\n\n<p>This post explains how the scam worked, why municipalities remain attractive targets, and how to combine stronger business processes with prevention-first cybersecurity. It also maps those lessons to practical steps and highlights how <a href=\"http:\/\/pcmatic.com\/pro\">PC Matic<\/a> helps local governments reduce risk in the real world.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Happened, A Quick Walkthrough<\/h2>\n\n\n\n<p>Based on the city\u2019s own description, a fraudster impersonated a legitimate company employee, submitted a supplier contact form, and gained access tied to a vendor profile in Workday. The request used a non-company email and spoofed identity. Multiple requests were made to change linked bank accounts. Two staff members approved changes. Accounts payable then sent two large payments to the wrong destination. A bank later flagged suspicious activity, which led to discovery. The city has since said it will tighten verification procedures, restrict permissions, and expand training to spot social engineering.<\/p>\n\n\n\n<p>The mechanics are straightforward. A convincing sender, a plausible business request, and a rushed environment. That is the modern recipe for vendor fraud. The fix is not one thing. It is stronger verification in finance, tighter access controls in the system of record, and cyber controls that reduce the attacker\u2019s room to maneuver.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why Local Governments Are High-Value Targets<\/h2>\n\n\n\n<p>Municipalities manage payrolls, procure critical goods and services, and maintain essential systems. Budgets are public, processes are predictable, and staff often juggle high volumes with limited time. Attackers exploit that reality. They either redirect money through vendor spoofing and business email compromise, or they disrupt services to create leverage for extortion.<\/p>\n\n\n\n<p>The takeaway is simple. Cities and counties must assume adversaries are probing both financial processes and IT systems. Controls must reinforce each other. Verification procedures reduce the chance of a bad change request. Cyber controls reduce the blast radius if an attacker gains any foothold.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Weak Links, Where Scammers Win<\/h2>\n\n\n\n<p>Vendor fraud that changes banking details usually cracks three layers at once.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">1 &#8211; Human Verification<\/h5>\n\n\n\n<p>If a request uses a new email, an unexpected contact, or a hurried tone, a direct confirmation using a known phone number should be mandatory. When that callback does not happen, attackers win.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">2 &#8211; System Permissions<\/h5>\n\n\n\n<p>If anyone can submit a sensitive change and two colleagues can approve it without additional checks, the process is fragile. Restricted roles, least privilege, and dual control for banking updates are essential.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">3 &#8211; Endpoint and Identity Hygiene<\/h5>\n\n\n\n<p>Many vendor fraud schemes begin with a phish. One clicked link can harvest credentials. If malware or unauthorized remote tools can run freely on endpoints, adversaries can plant persistence, bypass multi-factor prompts, or stage automated change requests behind the scenes.<\/p>\n\n\n\n<p>Baltimore\u2019s new commitments after the incident point in the right direction. Cross-verification for bank changes, restricted roles for sensitive updates, and training for staff who handle vendor data are foundational steps that other cities can mirror.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How PC Matic Protects Local Government<\/h2>\n\n\n\n<p><a href=\"http:\/\/pcmatic.com\/pro\">PC Matic <\/a>offers a streamlined, effective allowlisting solution built specifically to meet the needs of organizations with limited cybersecurity staff and high operational risk\u2014including municipal and county governments.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Key Benefits for Local Agencies:<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Default-Deny Allowlisting Model:<\/strong> Only trusted applications are allowed to run, effectively stopping ransomware and unauthorized tools before they execute.<\/li>\n\n\n\n<li><strong>Centralized Management Console: <\/strong>Cloud-based control allows IT teams to manage allowlists across distributed departments and remote users with minimal overhead.<\/li>\n\n\n\n<li><strong>Automated Policy Generation: <\/strong>PC Matic simplifies allowlisting by analyzing known-good applications, reducing the manual effort typically associated with policy creation.<\/li>\n\n\n\n<li><strong>Support for Legacy Systems:<\/strong> Designed to run on Windows 7 and later, making it compatible with older systems still common in public infrastructure.<\/li>\n\n\n\n<li><strong>Low Resource Footprint: <\/strong>Lightweight agent works alongside existing AV or EDR tools without slowing down endpoints.<\/li>\n\n\n\n<li><strong>Compliance Alignment: <\/strong>Helps meet requirements in CISA\u2019s Cybersecurity Performance Goals, NIST 800-171\/53, and CJIS policies.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"http:\/\/pcmatic.com\/pro\">PC Matic<\/a> is made in the USA and used by public sector organizations across the country to block unknown threats, simplify endpoint control, and support Zero Trust initiatives\u2014even without a large SOC team.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Takeaway for Local Governments<\/h2>\n\n\n\n<p>The Baltimore case is another reminder that financial controls and IT security must work together. Policies alone are not enough. Without modern defenses and consistent enforcement, local governments will remain vulnerable to costly fraud and cyberattacks.<\/p>\n\n\n\n<p><a href=\"http:\/\/pcmatic.com\/pro\">PC Matic <\/a>delivers solutions designed to fill these gaps, helping cities, counties, and agencies protect taxpayer dollars and maintain trust in public institutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two large payments were routed to the impostor. The city recovered one of them, but more than a million dollars was lost before the scheme was discovered. This incident reinforces a familiar [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":68111,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[6217],"tags":[],"class_list":["post-68110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps<\/title>\n<meta name=\"description\" content=\"The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps\" \/>\n<meta property=\"og:description\" content=\"The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-02T20:25:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-02T20:26:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-16.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps\",\"datePublished\":\"2025-09-02T20:25:11+00:00\",\"dateModified\":\"2025-09-02T20:26:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/\"},\"wordCount\":814,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-16.jpg\",\"articleSection\":[\"Business Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/\",\"name\":\"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-16.jpg\",\"datePublished\":\"2025-09-02T20:25:11+00:00\",\"dateModified\":\"2025-09-02T20:26:58+00:00\",\"description\":\"The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-16.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/blog-post-16.jpg\",\"width\":2240,\"height\":1260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps","description":"The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/","og_locale":"en_US","og_type":"article","og_title":"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps","og_description":"The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two","og_url":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-09-02T20:25:11+00:00","article_modified_time":"2025-09-02T20:26:58+00:00","og_image":[{"width":2240,"height":1260,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-16.jpg","type":"image\/jpeg"}],"author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps","datePublished":"2025-09-02T20:25:11+00:00","dateModified":"2025-09-02T20:26:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/"},"wordCount":814,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-16.jpg","articleSection":["Business Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/","url":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/","name":"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-16.jpg","datePublished":"2025-09-02T20:25:11+00:00","dateModified":"2025-09-02T20:26:58+00:00","description":"The City of Baltimore reports that a scammer successfully spoofed a vendor and persuaded staff to change banking details inside a financial system. Two","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-16.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/blog-post-16.jpg","width":2240,"height":1260},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/vendor-fraud-in-baltimore-what-local-governments-can-learn-and-how-pc-matic-helps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Vendor Fraud in Baltimore, What Local Governments Can Learn and How PC Matic Helps"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=68110"}],"version-history":[{"count":2,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68110\/revisions"}],"predecessor-version":[{"id":68113,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/68110\/revisions\/68113"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/68111"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=68110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=68110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=68110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}