COVID-19 (Coronavirus) fraud has been a growing concern to both government and business. New fraud tactics have targeted unemployment and COVID-19 economic relief funds. Find out the challenges of the U.S. War on COVID-19 fraud and how organizations can protect themselves.
COVID-19 (Coronavirus) fraud has been a growing concern to both government and business. New fraud tactics have targeted unemployment and COVID-19 economic relief funds. Find out the challenges of the U.S. War on COVID-19 fraud and how organizations can protect themselves.> Continue Reading
In early 2021, NACHA will be changing compliance standards for routing number and account verification used for internet payments (WEB debits). The current iteration of the WEB Debit Account Validation Rule (Article Two, Subsection 188.8.131.52) states that originators of WEB debit entries must use a “commercially reasonable fraudulent transaction detection system” to screen for fraud. Beginning March 19, 2021, the wording of the rule will update to require “account validation” to be part of fraud screening systems.> Continue Reading
Coronavirus OR covid-19 has impacted people and businesses all over the world. The rapid spread of COVID-19 has caused a shortage of protective masks for communities and healthcare workers. Thanks to innovative employees at the parent company of Lyons Commercial Data, Autoscribe is making protective masks using a 3D printer. (more…)> Continue Reading
In an earlier blog post, we covered the basics of the FTC’s Red Flags Rule – which requires certain types of businesses and financial organizations create an Identity Theft Prevention Program designed to detect the “red flags” (i.e. signs indicative of potential identity theft activity) unique to their day-to-day operations.
Since every business deals with different types of red flags and levels of risk, the FTC does not endorse or enforce any kind of one-size-fits-all compliance program. They have, however, provided guidelines describing the 4 core elements of ID theft prevention programs – which we’ll walk through in this blog post. (more…)> Continue Reading