Blog Post
The unfortunate reality is that cybercrime continues to pay, and as such, it continues to grow. This makes cybersecurity for small business an especially important topic for the small business world as most smaller companies have limited budgets—and therefore limited protection. Read more on how you...
Blog Post
Fraudsters Continue to Target Check Payments A large majority of organizations are still using checks for outgoing payments and checks continue to be the primary target of payments fraud. Without preventative measures in place, every check payment could be exposing an organization to fraud. AFP...
Blog Post
Fraud continues to be a challenge for many organizations. According to the 2023 Association for Financial Professionals, 65 percent of organizations report that they continue to be targets of fraud. And as the payments landscape continues to evolve, fraudsters are evolving their tactics too. Targets...
Blog Post
Your HTLF fraud partners, Director John Fick, and Fraud Risk Manager Tracy Swaim, along with their teams, work daily to help prevent and mitigate fraud loss for our clients. Now more than ever, small businesses are at an increased risk of fraud. Due to Covid-19, inflation, and rising interest rates...
Blog Post
Business email compromise scams—also known as BEC scams—can do untold damage to your company and reputation. Recognizing compromised emails is the difference between safe guarding your business or becoming a victim. Learn more about BEC scams and how you can protect your business and your bottom...
Blog Post
Discover the many ways your business can benefit from a streamlined and secure payments process utilizing electronic payments. Hear from our clients and team as they share insights and strategies that can positively impact a company’s bottom line. Our client panel includes: A large Construction...
Blog Post
Internal Fraud is the misuse of an organization’s resources or assets conducted by a malicious insider. This individual could be a current or former employee, contractor, or other business relationship who has knowledge of or access to the processes and/or systems within an organization. Due to...
Blog Post
Credential stuffing is an attempt by malicious attackers to use credentials that were previously exposed from another account platform against an online banking environment. The frequency of this type attack is growing exponentially, and they’re becoming more and more sophisticated over time. With...
Blog Post
What is Ransomware? Ransomware is a continuously evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption - often targeting and threatening to sell or leak...
Blog Post
Every business owner’s story is unique, yet many will reach a point where they ask the same question – how can I help my business grow? Sometimes the answer to that question is a loan, and knowing ahead of time what lenders will look for can help you simplify the process and secure financing faster...
Blog Post
Even as Covid-19 infections caused by the delta variant continue to rise in some areas of the country, economic activity continues to increase. Consumer spending rose at an annualized rate of 11.8 percent in the second quarter, according to the U.S. Bureau of Economic Analysis. Payroll employment...