Fraud & Security

desktop icon

View Infographic
account security

View Infographic

Peer to peer

See More Peer to Peer

Point of view

See More Points of View

6 ways to protect yourself and company online

Six ways to protect yourself and your company online

Part of a company’s cyber defense relies on its employees. Here’s a short list of tips to keep top of mind.
Learn More
Icon graphics of laptop, box, government building, and gear icon

Cyber wars: Trends and recent attacks

Ransomware, bots, hactivism, and more. Find out about the most recent attacks and methods used.
Learn More
A businesswoman with dark and hair wearing glasses has her chin resting on her knuckles and is looking at her computer monitor

Best practices for a company’s cyber health

Cyber crime is fast-evolving. Are your company’s defenses up-to-date?
Learn More
Close up of a man’s hands. Man is sitting at a desk, near a laptop. He is writing on paper with his right hand. His left hand is holding a tablet.

The hidden costs of cyber attacks

Do you know the total cost of a potential cyber attack to your company?
Learn More
account security

Triumph over takeover

8 steps to protect against account takeover fraud.
Learn More
Business woman on smartphone while commuting

Death of the password

Companies are experimenting with new ways to authenticate.
Learn More
Image of woman in airport looking at phone with luggage at side

New muscle to fight card fraud

Empower and protect your cardholders with predictive analytics and alerts.
Learn More
Digital world

Battle armor to combat fraud

Hear about fraud attacks and how to mitigate risks.
Learn More
Computer, users graphic

Double your protection with dual custody

Dual custody is one of the most effective deterrents against fraud.
Learn More
Businessman at desk in office

How one company stopped vendor impostor fraud

A strong, layered approach can help businesses protect themselves from vendor impostor fraud.
Learn More
Computer Hacker

Facing the New Faces of Fraud

The fraud threats out there today are real and serious.
Learn More
Graphic of fraud search

3 steps to combat impostor fraud

Impostor fraud is difficult to detect. Use this checklist to protect against impostor fraud.
Learn More
Digital computer locks

Are your fraud protection efforts keeping pace as fraud evolves?

Use multi-layered authentication to strengthen security.
Learn More

The Dark Side of Internet Security: insights from the front line

New data shows that payments fraud is growing faster than ever.
Learn More
Hacker on computer

Email fraud: The threat lurking in your inbox

In 2016, one in 131 emails contained in malware.
Learn More
Three diverse professionals talking around an open laptop

More businesses fall victim to fraud in 2016

Payments fraud rose to its highest level in 2016.
Learn More
74% of organizations were victims of payments fraud in 2016

Payments fraud: Still your company’s most powerful threat

New data shows that payments fraud is growing faster than ever.
Learn More

Cyber fraud: Your threats have broadened

Learn fraudsters' latest methods for taking over your accounts and payments — and how to protect your company.
Learn More
Two business women in office

Five reasons why your business should use dual custody

Payment fraud is a growing threat to businesses.
Learn More
Professional woman sitting at desk writing on pad

Protect your accounts from impostor fraud

Impostor fraud is a growing trend.
Learn More
Fraud rising bar

Beware: Account takeover fraud is on the rise

Account takeover is difficult to detect. Protect your business.
Learn More
Outside photograph of Liberty Diversified International’s headquarters building. The letters “LDI” are large and in red.

LDI shares lessons learned from impostor fraud encounter

"There were no red flags. The email was from the vendor’s real email address."
Learn More
Graphic icons representing a row of commercial buildings

Is your company prepared for a breach?

2016 Network Security and Data Privacy Study from Wells Fargo Insurance.
Learn More
View of a vineyard at sunset

Sandoval Brothers fights check fraud with account reconciliation efficiency

Labor contractor automates reconciliation and cuts 10–12 hours from process.
Learn More
Street view of a residential area in a Florida small town

Town of Orange Park shares lessons learned from cyber fraud attempt

“Something didn’t look right,” said the Town’s finance director.
Learn More
A clock with the second hand approaching 12.

Fraudsters race the clock on EMV technology

Cardholders face short-term fraud spike.
Learn More

Impostor fraud: Customer scenarios

Three-part impostor fraud series that shares what impostor fraud is, how to recognize it, and what we can do together to prevent it from harming your business.
Learn More
Close up of newspaper headline 'Hackers hit...'

Liberty Diversified International’s impostor fraud encounter

New verification process has thwarted additional attempts.
Learn More
Rows of colorful socks hanging from racks

How Stance Socks narrowly avoided loss from check fraud

Fast footwork and a shrewd teller were key.
Learn More
Extreme close up of embossed numbers on a blue credit card

Fighting the threat of card fraud

Three fraud schemes and three ways banks can help you fight them.
Learn More
Dark warehouse with computer servers and a desk on which three computers sit, their screens illuminated

Fighting cyber fraud: Are you as prepared as you think?

Fraudsters are crafty — and patient. What steps have you taken to protect your organization from a financial loss?
Learn More
Icon representing a secured computer.

Four ways online account takeover fraud could happen to you

What to watch out for to protect your company’s accounts.
Learn More
Woman looking at computer screen

Impostor fraud

Learn what it is and how you can protect your accounts and assets against it.
Learn More
Computer, Hacker, BitCoin

Ransomware attacks

Learn what's at stake and how to protect your company.
Learn More
Never give out your online banking credentials

Fraudsters want to take over your accounts

Learn how to outsmart a fraudster — and triumph over account takeover.
Learn More
Remember if something feels off, it probably is

Impostor fraud: It’s time to fight back

Learn seven steps to unmask impostor fraud.
Learn More
Avoid a hostage situation

Avoid a hostage situation

Ransomware attacks have increased 35%. Learn how to protect your company from this growing threat.
Learn More
2013 14%, 2014 27%, 2015 48%

Impostor fraud and wires — by the numbers

Is the increase in wire transfer fraud related to impostor fraud?
Learn More
Computer with pie chart showing 86%, 11%, 3%

How many middle market companies are buying cyber insurance coverage?

Who decides to buy it, and what's behind the purchase decision?
Learn More
computer security

Triumph over takeover

Learn six ways to protect your company from a fraudster's account takeover.
Learn More
Computer Security

Unmasking impostor fraud — 7 essential steps

The best way to fight impostor fraud is to build strong defenses within your company. Learn how.
Learn More
A businessman and business woman seated at a table, engaged in a serious conversation and review of documents

Account validation helps insurers and policyholders transact confidently

Real-time response information can cut fraud losses and boost customer satisfaction.
Learn More
A man holding his smartphone and touching the screen

Keep a close eye on account activity, wherever you’re working

How mobile banking can help protect your company from fraud.
Learn More
Picture of electrical line tower against a blue sky

New solution helps utilities reduce fraud, returns

Account validation technology can streamline your receivables and improve your customer service.
Learn More
Bitcoin symbol with circuit board background

Ransomware: A rapidly growing threat

How safe is your mission-critical data?
Learn More

How scammers exploit social media networks

Beware of fake links and connections when networking online.
Learn More
Card Fraud

Card-not-present fraud threat increasing

Learn five best practices to reduce your risk.
Learn More
Clear, liquid chemical in a small glass beaker, held by a gloved hand.

Vendor impostor burns chemical company

Company now validates all requests to change banking information.
Learn More
Submerged fish hook on a fishing line

Seafood company hooked by vendor impostor fraud

Well-orchestrated fraud scheme results in six-figure loss — and more stringent safeguards.
Learn More

Positive payment fraud trends

There's good news to be found in the 2015 AFP Payments Fraud and Control Survey.
Learn More
1 in 220

Protecting your credentials and accounts online

Online fraud is difficult to detect, but these best practices heighten your awareness and security.
Learn More
Two individuals sitting alone in cubicles, looking at their computer screens, and typing at their keyboards

Dual custody: A best practice in reducing fraud risk

Reduce fraud risk with two people on separate devices, both responsible for administrative changes and online payments.
Learn More

What if hackers change your payment file to pay themselves?

Valspar asked this important question and took steps to protect its payments.
Learn More