The disadvantages of using checks for business payments

The disadvantages of using checks for business payments, according to Mad Men

Consider this: the only business tool used by Madison Avenue ad agencies in the 1960s that is still in use today, are the checks sitting on your desk. Nostalgia might make for great television, but...

/ September 14, 2017

Ask the Experts: Same Day ACH Phase 2 — Obstacles and Opportunities

Phase two of same day ACH is upon us, which means that Receiving Depository Financial Institutions (RDFIs) now need to allow for debit transactions designated as Same Day ACH to be processed and funds made...

/ September 11, 2017
fraud collusion in banks

Identify & Eliminate Fraud Collusion, Part 1: A Guide for Banks

Clearly organizations have to take fraud collusion into account when crafting their security plan, or else run the risk of potentially significant financial losses and a damaged reputation. But how? The good news is that...

/ September 5, 2017

The House of Cards Guide to Creating an Effective Payment Strategy

“You build your future. It isn’t handed to you.” That’s what Francis J. Underwood, the ferocious political titan from House of Cards, would say about devising an effective payment strategy that promotes your business’s success....

/ September 5, 2017

What Security Protections Should You Expect From a Banking Partner?

As organizations undergo the arduous process of selecting banking partners, one of the critical factors they must evaluate is the security of the institution. This aspect of the process cannot be understated. It has to...

/ May 19, 2017

3 Lessons Preparing for the Zombie Apocalypse Can Teach You About Protecting Patient Data Against Cyber Attacks

Zombies are exactly like the cyber criminals we fight against every day to protect patient data. They’re everywhere you turn, they’re a seemingly unstoppable force, and they’ve got to be stopped, or else we’ll lose...

/ May 9, 2017

Slaying the Malware Beast

Malware is hardly a new threat in the security landscape. Banking Trojans that specialize in stealing user credentials, hijacking authenticated sessions and manipulating transactions in order to steal funds have been around since the inception...

/ May 9, 2017

Yogi Berra, Cyber-Security Visionary?

Yogi Berra's wisdom is appropriate in many situations, including cyber security. Who knew we could learn so much from a grumbly old baseball catcher from Missouri…

/ May 9, 2017

The Three Battles of International Payments

If you're battling with international payment processes, you're not alone. The processes behind sending payments to different geographies are challenging, time-consuming and relentlessly frustrating.

/ May 8, 2017

Will your risky business practices make you a victim of fraud?

Law of averages requires that at least one or two of your employees turns out to be more of a threat than an asset.

/ May 8, 2017