Fraud & Security


Beware of business email compromise (BEC) fraud

Listen to the podcast

Beware of business email compromise (BEC) fraud

Read Article

Peer to peer

See more peer to peer

Point of view

See more points of view

Beware of the danger of malware

Learn how to recognize the warning signs.
Read More

BEC attacks are on the rise and difficult to detect

Take steps help defend against BEC scams.
Watch Video

Large school district falls victim to impostor fraud

Hear how a fraudster breached the email system and perpetrated the fraud.
Listen to the Podcast

Business email compromise: The art of deception

Take steps to safeguard your business.
Read More

Beware of business email compromise (BEC) fraud

Hear how fraudsters used BEC to direct wire payments to fake accounts.
Listen to the Podcast

New cybercrime tactics increase the risk for businesses

Discover what trends your company should prepare for.
Read More

Don’t become an impostor fraud victim

Impostor fraud is difficult to detect. Use this checklist to help reduce your risk.
Read More

Payment fraud strikes 82% of organizations in 2018

Payments fraud plays no favorites: no organization is safe.
Read More
Business person typing on laptop computer

BEC is a pervasive and growing threat

Make it your business to protect against BEC.
Read More

Account takeover fraud is rising at an alarming pace

Take steps to help protect yourself and mitigate your risk.
Watch Video

Are fraud concerns keeping you up at night?

Instead of worrying about fraud, take steps to protect against it.
Watch Video

Fraud is growing and becoming more difficult to detect

Dual custody gives you a second chance to spot fraud before it occurs.
Watch Video

Payments fraud jumps to record high

Fraud attacks are becoming more sophisticated and difficult to detect.
Read More
6 ways to protect yourself and company online

Six ways to protect yourself and your company online

Part of a company’s cyber defense relies on its employees. Here’s a short list of tips to keep top of mind.
Read More
Icon graphics of laptop, box, government building, and gear icon

Cyber wars: Trends and recent attacks

Ransomware, bots, hactivism, and more. Find out about the most recent attacks and methods used.
Read More
A businesswoman with dark and hair wearing glasses has her chin resting on her knuckles and is looking at her computer monitor

Best practices for a company’s cyber health

Cyber crime is fast-evolving. Are your company’s defenses up-to-date?
Read More
account security

Triumph over takeover

8 steps to protect against account takeover fraud.
Read More
Digital world

Battle armor to combat fraud

Hear about fraud attacks and how to mitigate risks.
Listen to Podcast
Computer, users graphic

Double your protection with dual custody

Dual custody is one of the most effective deterrents against fraud.
Read More
Businessman at desk in office

How one company stopped vendor impostor fraud

A strong, layered approach can help businesses protect themselves from vendor impostor fraud.
Read More
Outside photograph of Liberty Diversified International’s headquarters building. The letters “LDI” are large and in red.

LDI shares lessons learned from impostor fraud encounter

"There were no red flags. The email was from the vendor’s real email address."
Watch Video
Submerged fish hook on a fishing line

Seafood company hooked by vendor impostor fraud

Well-orchestrated fraud scheme results in six-figure loss — and more stringent safeguards.
Read More