Watch this recording from our accounts payable (AP) automation expert Greg Schmidt to discover the simplicity that Webdocs can bring to your AP department.
Mercury® Financial needed a way to protect data in transit to stay secure and compliant. The added data security and peace of mind through the use of Clearswift Secure ICAP Gateway paired with the GoAnywhere MFT solution became the perfect pairing for the credit card company.
Gartner forecast a $600 billion global market in 2022 for technology that powers hyperautomation. Without a doubt, hyperautomation has quickly moved from an industry buzzword to the way companies of all sizes approach automation.
Surveys from the technology research and consulting firm show that a majority of CEOs and two-thirds of boards of directors are demanding operational excellence and...
Stealing credit card data is a perennial favorite of cybercriminals everywhere, whose aggressive tactics to score sensitive accountholder details result in breach after breach for organizations small and large. In its most recent research on payment card fraud, The Nilson Report found $28.6 billion in losses for 2020 (nearly 36% in the U.S. alone),...
Unfortunately, the bad news about data breaches, cybersecurity scams, and email attacks is constant and the numbers are more staggering with each year. Learn which steps to take NOW to protect your organization’s email ecosystem, such as collecting threat intelligence, mitigating against brand impersonation, and training your employees on security awareness, all while maintaining compliance. That...
It’s difficult to control your Social Security number in the wild. In his September contribution to Forbes Advisor, John Wilson discusses the most common scams involving Social Security numbers and provides 8 steps individuals can take to prevent identity fraud.
PCI DSS 4.0 is here, and you may have questions. Our webinar can help you navigate questions your organization may have in order to get ready for the March 2025 deadline.
In Cyber Protection Magazine’s Crucial Tech podcast, John Wilson, Senior Fellow, Threat Research, delves into the latest research from Agari and PhishLabs by Fortra.
In his August contribution to Forbes Advisor, John Wilson explains what vishing is, the most common vishing scams and how individuals and organizations can protect themselves from vishing scammers.
Watch now for an informative webinar where Document Management expert Greg Schmidt discusses iForms' value as a modern alternative to AFP and walks you through how to use iForms to create a variety of business critical documents.
Discover the ability to create electronic forms and professional business reports from virtually any data source using iForms. Create professional invoices, purchase orders, billing statements and reports without relying on expensive pre-printed forms or custom reporting tools.
Hybrid vishing (email-initiated voice phishing) attacks are on the rise. In this ZDNet article, John Wilson discusses the findings from the latest Agari and PhishLabs research and explains what organizations can do to help prevent hybrid vishing attacks.
Response-based attacks targeting corporate inboxes have climbed to their highest volume since 2020, representing 41 percent of all email-based scams targeting employees, during Q2 of this year. This is according to the latest Quarterly Threat Trends & Intelligence Report from Agari and PhishLabs, part of the Fortra cybersecurity portfolio.
In his latest Forbes Advisor article, John Wilson, Senior Fellow, Threat Research at Fortra, looks at how fraudsters are targeting multifactor authentication and provides 3 ways to protect yourself.
Modern organizations need critical documents to be readily accessible and secure. Watch this 30-minute webinar to learn how web-based document management systems can streamline document control and improve efficiency.
John Wilson, Senior Fellow, Threat Research at Fortra features in this episode of Infosec’s Cyber Work Podcast. John covers all aspects of email fraud including business email compromise and phishing, and shares career tips and advice for budding threat researchers at all levels.