An individual with such access could withdraw cash and then adjust the cash account accordingly to hide the transaction. Also, he or she could establish fraudulent accounts payable (to an associate in a nonexistent vendor company) and then write checks to discharge the phony obligations. By segregating these functions, the organization’s management can greatly reduce this exposure.