Fraud & Security

Graphic of fraud search

Check Infographic
Graphic of fraud search

Check Infographic

Peer to peer

See more peer to peer

Point of view

See more points of view

Impostor fraud is more common than you might think

Verification can help protect your company from becoming a victim.
Learn More
Business woman on the phone looking at her computer

Payments fraud hits record high of 78% in 2017

The threat of payments fraud is more serious than ever before.
Learn More
78% hit by payment fraud

Payments fraud reaches record-setting levels

In 2017, 78% of organizations were payments fraud targets.
Learn More
Binary tunnel

Cyber threats: A serious risk for businesses

BEC is an ongoing and widespread security threat
Learn More

Business email compromise is a widespread security threat

In 2017, 71% of cyber attacks began with spear phishing.
Learn More
Futuristic earth map technology abstract background

From dial-up to smartphones: The evolution of cybersecurity

Cybersecurity has evolved into a digital battle against cyberthreats.
Learn More
Business woman in office scrutinizing a document while on her computer

Are you prepared for 2018 W-2 email phishing fraud?

The W-2 email phishing scam is one of the most dangerous fraud threats during tax season.
Learn More
6 ways to protect yourself and company online

Six ways to protect yourself and your company online

Part of a company’s cyber defense relies on its employees. Here’s a short list of tips to keep top of mind.
Learn More
Icon graphics of laptop, box, government building, and gear icon

Cyber wars: Trends and recent attacks

Ransomware, bots, hactivism, and more. Find out about the most recent attacks and methods used.
Learn More
A businesswoman with dark and hair wearing glasses has her chin resting on her knuckles and is looking at her computer monitor

Best practices for a company’s cyber health

Cyber crime is fast-evolving. Are your company’s defenses up-to-date?
Learn More
Close up of a man’s hands. Man is sitting at a desk, near a laptop. He is writing on paper with his right hand. His left hand is holding a tablet.

The hidden costs of cyber attacks

Do you know the total cost of a potential cyber attack to your company?
Learn More
account security

Triumph over takeover

8 steps to protect against account takeover fraud.
Learn More
Business woman on smartphone while commuting

Death of the password

Companies are experimenting with new ways to authenticate.
Learn More
Image of woman in airport looking at phone with luggage at side

New muscle to fight card fraud

Empower and protect your cardholders with predictive analytics and alerts.
Learn More
Digital world

Battle armor to combat fraud

Hear about fraud attacks and how to mitigate risks.
Learn More
Computer, users graphic

Double your protection with dual custody

Dual custody is one of the most effective deterrents against fraud.
Learn More
Businessman at desk in office

How one company stopped vendor impostor fraud

A strong, layered approach can help businesses protect themselves from vendor impostor fraud.
Learn More
Computer Hacker

Facing the New Faces of Fraud

The fraud threats out there today are real and serious.
Learn More
Graphic of fraud search

3 steps to combat impostor fraud

Impostor fraud is difficult to detect. Use this checklist to protect against impostor fraud.
Learn More
Digital computer locks

Are your fraud protection efforts keeping pace as fraud evolves?

Use multi-layered authentication to strengthen security.
Learn More

The Dark Side of Internet Security: insights from the front line

New data shows that payments fraud is growing faster than ever.
Learn More
Hacker on computer

Email fraud: The threat lurking in your inbox

In 2016, one in 131 emails contained in malware.
Learn More
Professional woman sitting at desk writing on pad

Protect your accounts from impostor fraud

Impostor fraud is a growing trend.
Learn More
Outside photograph of Liberty Diversified International’s headquarters building. The letters “LDI” are large and in red.

LDI shares lessons learned from impostor fraud encounter

"There were no red flags. The email was from the vendor’s real email address."
Learn More

Impostor fraud: Customer scenarios

Three-part impostor fraud series that shares what impostor fraud is, how to recognize it, and what we can do together to prevent it from harming your business.
Learn More
Remember if something feels off, it probably is

Impostor fraud: It’s time to fight back

Learn seven steps to unmask impostor fraud.
Learn More
Submerged fish hook on a fishing line

Seafood company hooked by vendor impostor fraud

Well-orchestrated fraud scheme results in six-figure loss — and more stringent safeguards.
Learn More