Attempted and actual electronic payment fraud attacks, particularly business email compromise (BEC), are rising. Businesses must act to protect themselves.Contact Us about Electronic Payment Fraud Prevention
Payment fraud scams, including business email compromise, can happen to you—especially if your organization hasn’t set up the right payment controls. Your organization holds fire drills to help prepare for a fire; you need the same level of preparation to be ready for an attack by fraudsters. Don’t wait until after you’ve been attacked to start protecting your business.
A company’s payments staff is at the front line of email compromise fraud prevention. Here are best practices that can help protect your company.Read article about Fraud Prevention: 9 Best Practices for Payments Staff
Fraud attempts are constantly increasing, and criminals are becoming more sophisticated in their attacks. Learn best practices for fraud prevention—and the mistakes that could cost you.Read article about 6 Cyberfraud Scenarios From Worst to Best
As technology evolves, so does payments fraud. Download the full 2018 AFP Payments Fraud and Control Survey Report to find out how you can protect your organization.Learn more about 2018 AFP Payments Fraud and Control Survey Report
Payments fraud increased to record levels in 2017. Find out what the results of this year’s AFP Payments Fraud and Control Survey mean for businesses like yours.View infographic about Payments Fraud Rises as Tactics Evolve
In this webinar, learn about the latest in payment fraud trends and find out how you can protect your business.View webinar about Protect Your Business From the Growing Threat of Payments Fraud
See how prepared you and your company are to combat payments fraud in this quick quiz.Take the quiz about Is Your Business as Secure as You Think?
Have a trusted, regular contact for all commonly used vendors and verify all unusual payment requests with them using a known phone number.
Email accounts can be masked, spoofed or hacked, so you should never rely on email to validate a payment request—even when it appears to come from an internal source.
Confirm payments with vendors and reconcile activity every day. The sooner you recognize unusual activity, the better your chances of stopping or recovering from it.