Webinar: July 25 – Spotlight: Handling Suspect Credits in ACH Presenters: Sandy Ortins, AAP, APRP, NCP Rayleen M. Pirnie, BCJ, AAP, CERP Compliance Officers and Fraud Investigators are often challenged with identifying appropriate actions when money laundering activity or fraud is suspected with ACH credit entries. The ACH Network Rules must be balanced with applicable […]
[Wake-Up Call] It’s Time to Focus More on Preventing Spear Phishing
Fighting spear phishing attacks is the single best thing you can do to prevent breaches. Social engineering is involved in 70% to 90% of successful compromises. It is the number one way that all hackers and malware compromise devices and networks. No other initial root cause comes close (unpatched software and firmware is a distant second being involved […]
The Common Root Exploits of All Hackers and Malware Attacks
Readers, am I missing something in my inclusive list? I need your help. If you want to stop thieves from breaking into your house, over and over, you need to figure out how the thieves could break into your house (e.g., doors, windows, floor, ceiling, basement, roof, wall, etc.),figure out the MOST LIKELY ways they […]