Fraud & Security

Legacy-TM-marquee-banner-720×300[4]

Account takeover fraud is rising at an alarming pace

Watch Video
Legacy-TM-marquee-banner-720×300[4]

Account takeover fraud is rising at an alarming pace

Watch Video

Peer to peer

See more peer to peer

BEC attacks are on the rise and difficult to detect

Take steps help defend against BEC scams.
Watch Video

Large school district falls victim to impostor fraud

Hear how a fraudster breached the email system and perpetrated the fraud.
Listen to the Podcast

Business email compromise: The art of deception

Take steps to safeguard your business.
Read More

Beware of business email compromise (BEC) fraud

Hear how fraudsters used BEC to direct wire payments to fake accounts.
Listen to the Podcast

New cybercrime tactics increase the risk for businesses

Discover what trends your company should prepare for.
Read More

Don’t become an impostor fraud victim

Impostor fraud is difficult to detect. Use this checklist to help reduce your risk.
Read More

Payment fraud strikes 82% of organizations in 2018

Payments fraud plays no favorites: no organization is safe.
Read More
Business person typing on laptop computer

BEC is a pervasive and growing threat

Make it your business to protect against BEC.
Read More

Account takeover fraud is rising at an alarming pace

Take steps to help protect yourself and mitigate your risk.
Watch Video

Are fraud concerns keeping you up at night?

Instead of worrying about fraud, take steps to protect against it.
Watch Video

Fraud is growing and becoming more difficult to detect

Dual custody gives you a second chance to spot fraud before it occurs.
Watch Video

Customer falls victim to account takeover fraud

Hear how the fraud was detected and ways you can protect your company.
Listen to Podcast
Internet cyber security with digital connection and lock

Three ways to help reduce the risk of a cyber attack

Address cybersecurity challenges head on to reduce the risk of a breach.
Read More

A new way to think about fraud

Fraud protection must change from a transactional response to a strategic approach.
Watch Video

Customer narrowly escapes impostor fraud

Hear how the fraud unfolded and steps you can take to protect your company.
Listen to Podcast

Impostor fraud is more common than you might think

Verification can help protect your company from becoming a victim.
Watch Video

Payments fraud jumps to record high

Fraud attacks are becoming more sophisticated and difficult to detect.
Read More
6 ways to protect yourself and company online

Six ways to protect yourself and your company online

Part of a company’s cyber defense relies on its employees. Here’s a short list of tips to keep top of mind.
Read More
Icon graphics of laptop, box, government building, and gear icon

Cyber wars: Trends and recent attacks

Ransomware, bots, hactivism, and more. Find out about the most recent attacks and methods used.
Read More
A businesswoman with dark and hair wearing glasses has her chin resting on her knuckles and is looking at her computer monitor

Best practices for a company’s cyber health

Cyber crime is fast-evolving. Are your company’s defenses up-to-date?
Read More
account security

Triumph over takeover

8 steps to protect against account takeover fraud.
Read More
Digital world

Battle armor to combat fraud

Hear about fraud attacks and how to mitigate risks.
Listen to Podcast
Computer, users graphic

Double your protection with dual custody

Dual custody is one of the most effective deterrents against fraud.
Read More
Businessman at desk in office

How one company stopped vendor impostor fraud

A strong, layered approach can help businesses protect themselves from vendor impostor fraud.
Read More
Professional woman sitting at desk writing on pad

Protect your accounts from impostor fraud

Impostor fraud is a growing trend.
Read More
Outside photograph of Liberty Diversified International’s headquarters building. The letters “LDI” are large and in red.

LDI shares lessons learned from impostor fraud encounter

"There were no red flags. The email was from the vendor’s real email address."
Watch Video

Impostor fraud: Customer scenarios

Three-part impostor fraud series that shares what impostor fraud is, how to recognize it, and what we can do together to prevent it from harming your business.
Watch Video
Submerged fish hook on a fishing line

Seafood company hooked by vendor impostor fraud

Well-orchestrated fraud scheme results in six-figure loss — and more stringent safeguards.
Read More