Fraud & Security

TM_3197_ Symantec Infographic Grabber_featured

View Infographic
TM_3197_ Symantec Infographic Grabber

View Infographic

Peer to peer

See More Peer to Peer

Point of view

See More Points of View

Binary tunnel

Cyber threats: A serious risk for businesses

BEC is an ongoing and widespread security threat
Learn More

Business email compromise is a widespread security threat

In 2017, 71% of cyber attacks began with spear phishing.
Learn More
Futuristic earth map technology abstract background

From dial-up to smartphones: The evolution of cybersecurity

Cybersecurity has evolved into a digital battle against cyberthreats.
Learn More
Business woman in office scrutinizing a document while on her computer

Are you prepared for 2018 W-2 email phishing fraud?

The W-2 email phishing scam is one of the most dangerous fraud threats during tax season.
Learn More
6 ways to protect yourself and company online

Six ways to protect yourself and your company online

Part of a company’s cyber defense relies on its employees. Here’s a short list of tips to keep top of mind.
Learn More
Icon graphics of laptop, box, government building, and gear icon

Cyber wars: Trends and recent attacks

Ransomware, bots, hactivism, and more. Find out about the most recent attacks and methods used.
Learn More
A businesswoman with dark and hair wearing glasses has her chin resting on her knuckles and is looking at her computer monitor

Best practices for a company’s cyber health

Cyber crime is fast-evolving. Are your company’s defenses up-to-date?
Learn More
Close up of a man’s hands. Man is sitting at a desk, near a laptop. He is writing on paper with his right hand. His left hand is holding a tablet.

The hidden costs of cyber attacks

Do you know the total cost of a potential cyber attack to your company?
Learn More
account security

Triumph over takeover

8 steps to protect against account takeover fraud.
Learn More
Business woman on smartphone while commuting

Death of the password

Companies are experimenting with new ways to authenticate.
Learn More
Image of woman in airport looking at phone with luggage at side

New muscle to fight card fraud

Empower and protect your cardholders with predictive analytics and alerts.
Learn More
Digital world

Battle armor to combat fraud

Hear about fraud attacks and how to mitigate risks.
Learn More
Computer, users graphic

Double your protection with dual custody

Dual custody is one of the most effective deterrents against fraud.
Learn More
Businessman at desk in office

How one company stopped vendor impostor fraud

A strong, layered approach can help businesses protect themselves from vendor impostor fraud.
Learn More
Computer Hacker

Facing the New Faces of Fraud

The fraud threats out there today are real and serious.
Learn More
Graphic of fraud search

3 steps to combat impostor fraud

Impostor fraud is difficult to detect. Use this checklist to protect against impostor fraud.
Learn More
Digital computer locks

Are your fraud protection efforts keeping pace as fraud evolves?

Use multi-layered authentication to strengthen security.
Learn More

The Dark Side of Internet Security: insights from the front line

New data shows that payments fraud is growing faster than ever.
Learn More
Hacker on computer

Email fraud: The threat lurking in your inbox

In 2016, one in 131 emails contained in malware.
Learn More
Three diverse professionals talking around an open laptop

More businesses fall victim to fraud in 2016

Payments fraud rose to its highest level in 2016.
Learn More
74% of organizations were victims of payments fraud in 2016

Payments fraud: Still your company’s most powerful threat

New data shows that payments fraud is growing faster than ever.
Learn More
Two business women in office

Five reasons why your business should use dual custody

Payment fraud is a growing threat to businesses.
Learn More
Professional woman sitting at desk writing on pad

Protect your accounts from impostor fraud

Impostor fraud is a growing trend.
Learn More
Outside photograph of Liberty Diversified International’s headquarters building. The letters “LDI” are large and in red.

LDI shares lessons learned from impostor fraud encounter

"There were no red flags. The email was from the vendor’s real email address."
Learn More

Impostor fraud: Customer scenarios

Three-part impostor fraud series that shares what impostor fraud is, how to recognize it, and what we can do together to prevent it from harming your business.
Learn More
Woman looking at computer screen

Impostor fraud

Learn what it is and how you can protect your accounts and assets against it.
Learn More
Computer, Hacker, BitCoin

Ransomware attacks

Learn what's at stake and how to protect your company.
Learn More
Never give out your online banking credentials

Fraudsters want to take over your accounts

Learn how to outsmart a fraudster — and triumph over account takeover.
Learn More
Remember if something feels off, it probably is

Impostor fraud: It’s time to fight back

Learn seven steps to unmask impostor fraud.
Learn More
computer security

Triumph over takeover

Learn six ways to protect your company from a fraudster's account takeover.
Learn More
Picture of electrical line tower against a blue sky

New solution helps utilities reduce fraud, returns

Account validation technology can streamline your receivables and improve your customer service.
Learn More
Submerged fish hook on a fishing line

Seafood company hooked by vendor impostor fraud

Well-orchestrated fraud scheme results in six-figure loss — and more stringent safeguards.
Learn More