Fraud & Security

Professional woman sitting at desk writing on pad

Read Article
Professional woman sitting at desk writing on pad

Read Article

Peer to peer

See More Peer to Peer

Point of view

See More Points of View

Digital computer locks

Are your fraud protection efforts keeping pace as fraud evolves?

Use multi-layered authentication to strengthen security.
Learn More
1/131 emails sent in 2016 were malicious, the highest rate in five years

The Dark Side of Internet Security: insights from the front line

New data shows that payments fraud is growing faster than ever.
Learn More
Hacker on computer

Email fraud: The threat lurking in your inbox

In 2016, one in 131 emails contained in malware.
Learn More
Three diverse professionals talking around an open laptop

More businesses fall victim to fraud in 2016

Payments fraud rose to its highest level in 2016.
Learn More
74% of organizations were victims of payments fraud in 2016

Payments fraud: Still your company’s most powerful threat

New data shows that payments fraud is growing faster than ever.
Learn More

Cyber fraud: Your threats have broadened

Learn fraudsters' latest methods for taking over your accounts and payments — and how to protect your company.
Learn More
Two business women in office

Five reasons why your business should use dual custody

Payment fraud is a growing threat to businesses.
Learn More
Professional woman sitting at desk writing on pad

Protect your accounts from impostor fraud

Impostor fraud is a growing trend.
Learn More
Fraud rising bar

Beware: Account takeover fraud is on the rise

Account takeover is difficult to detect. Protect your business.
Learn More
Outside photograph of Liberty Diversified International’s headquarters building. The letters “LDI” are large and in red.

LDI shares lessons learned from impostor fraud encounter

"There were no red flags. The email was from the vendor’s real email address."
Learn More
Graphic icons representing a row of commercial buildings

Is your company prepared for a breach?

2016 Network Security and Data Privacy Study from Wells Fargo Insurance.
Learn More
View of a vineyard at sunset

Sandoval Brothers fights check fraud with account reconciliation efficiency

Labor contractor automates reconciliation and cuts 10–12 hours from process.
Learn More
Street view of a residential area in a Florida small town

Town of Orange Park shares lessons learned from cyber fraud attempt

“Something didn’t look right,” said the Town’s finance director.
Learn More
A clock with the second hand approaching 12.

Fraudsters race the clock on EMV technology

Cardholders face short-term fraud spike.
Learn More

Impostor fraud: Customer scenarios

Three-part impostor fraud series that shares what impostor fraud is, how to recognize it, and what we can do together to prevent it from harming your business.
Learn More
Close up of newspaper headline 'Hackers hit...'

Liberty Diversified International’s impostor fraud encounter

New verification process has thwarted additional attempts.
Learn More
Rows of colorful socks hanging from racks

How Stance Socks narrowly avoided loss from check fraud

Fast footwork and a shrewd teller were key.
Learn More
Extreme close up of embossed numbers on a blue credit card

Fighting the threat of card fraud

Three fraud schemes and three ways banks can help you fight them.
Learn More
Dark warehouse with computer servers and a desk on which three computers sit, their screens illuminated

Fighting cyber fraud: Are you as prepared as you think?

Fraudsters are crafty — and patient. What steps have you taken to protect your organization from a financial loss?
Learn More
Icon representing a secured computer.

Four ways online account takeover fraud could happen to you

What to watch out for to protect your company’s accounts.
Learn More
Woman looking at computer screen

Impostor fraud

Learn what it is and how you can protect your accounts and assets against it.
Learn More
Computer, Hacker, BitCoin

Ransomware attacks

Learn what's at stake and how to protect your company.
Learn More
Never give out your online banking credentials

Fraudsters want to take over your accounts

Learn how to outsmart a fraudster — and triumph over account takeover.
Learn More

Impostor fraud: It’s time to fight back

Learn seven steps to unmask impostor fraud.
Learn More
Avoid a hostage situation

Avoid a hostage situation

Ransomware attacks have increased 35%. Learn how to protect your company from this growing threat.
Learn More
2013 14%, 2014 27%, 2015 48%

Impostor fraud and wires — by the numbers

Is the increase in wire transfer fraud related to impostor fraud?
Learn More
Computer with pie chart showing 86%, 11%, 3%

How many middle market companies are buying cyber insurance coverage?

Who decides to buy it, and what's behind the purchase decision?
Learn More
computer security

Triumph over takeover

Learn six ways to protect your company from a fraudster's account takeover.
Learn More
Computer Security

Unmasking impostor fraud — 7 essential steps

The best way to fight impostor fraud is to build strong defenses within your company. Learn how.
Learn More
A businessman and business woman seated at a table, engaged in a serious conversation and review of documents

Account validation helps insurers and policyholders transact confidently

Real-time response information can cut fraud losses and boost customer satisfaction.
Learn More
A man holding his smartphone and touching the screen

Keep a close eye on account activity, wherever you’re working

How mobile banking can help protect your company from fraud.
Learn More
Picture of electrical line tower against a blue sky

New solution helps utilities reduce fraud, returns

Account validation technology can streamline your receivables and improve your customer service.
Learn More
Bitcoin symbol with circuit board background

Ransomware: A rapidly growing threat

How safe is your mission-critical data?
Learn More

How scammers exploit social media networks

Beware of fake links and connections when networking online.
Learn More
A hacker wearing a hooded sweatshirt typing on a keyboard in front of three glowing monitors in a dark room

The scope of cyber security threats has broadened

Take steps now to protect against financial loss.
Learn More
Card Fraud

Card-not-present fraud threat increasing

Learn five best practices to reduce your risk.
Learn More
Clear, liquid chemical in a small glass beaker, held by a gloved hand.

Vendor impostor burns chemical company

Company now validates all requests to change banking information.
Learn More
Submerged fish hook on a fishing line

Seafood company hooked by vendor impostor fraud

Well-orchestrated fraud scheme results in six-figure loss — and more stringent safeguards.
Learn More
Two business professionals looking at computer screen

Impostor fraud: Do you know whom you’re paying?

Beware of requests to change vendor payment information or make payments outside normal channels.
Learn More

Positive payment fraud trends

There's good news to be found in the 2015 AFP Payments Fraud and Control Survey.
Learn More
1 in 220

Protecting your credentials and accounts online

Online fraud is difficult to detect, but these best practices heighten your awareness and security.
Learn More
Two individuals sitting alone in cubicles, looking at their computer screens, and typing at their keyboards

Dual custody: A best practice in reducing fraud risk

Reduce fraud risk with two people on separate devices, both responsible for administrative changes and online payments.
Learn More
Broken glass

Data insecurity: Protect your organization’s data, reputation, and cash

Regardless of your organization's size or industry, you have data thieves want. Learn where it is and how to protect it.
Learn More

What if hackers change your payment file to pay themselves?

Valspar asked this important question and took steps to protect its payments.
Learn More