Laptop with overlay of email icons

Mitigate Risks

Resources to help minimize your organization’s risk.

Safeguarding your business. A cybercrime and fraud protection video series with Ken Gavrity.

Join our Executive Vice President of Commercial Payments as he discusses the rise of digital fraud, emerging cybercrime trends, the red flags to watch out for, and how to help protect your business from cyberattacks, scams, and fraud.

How EMTransfer is using KeyBank’s APIs to revolutionize the real estate industry

EMTransfer offers a service that ameliorates the most tedious parts of the traditional real estate process. EMTransfer's industry-specific cash management platform combines the electronic movement of money across all available payment rails, integration with industry ERP/Production solutions, and secure electronic interactions between all the parties of the real estate transaction without the need for a Third-Party processor. Additionally, with the advent of the KeyBank API, EMTransfer has enhanced its service to include Real-Time Payments and Previous/Intra Day reporting to allow for a complete embedded banking experience.

Synthetic identity fraud: creating fake people to scam businesses

Identity theft is one of the oldest scams in the book, but the updated version of this classic fraud tactic may not be as familiar to business owners. In 2020, so-called “synthetic identity fraud” resulted in an estimated $20 billion in losses—an increase of 33% over 2018. Concerned security professionals report that cybercriminals may be using synthetic identity fraud to apply for jobs at target companies to steal confidential information.

True crime: anatomy of a cyberattack webinar

In this session, Tammy Gedetsis, KeyBank Senior Manager - Information Security, hosts expert panelists, Kevin Brown, FBI Acting Supervisory Special Agent - Cyber Criminal Squad; Eric Balish, US Secret Service Assistant to the Special Agent in Charge - Financial Crimes; and Kristi Deason, KeyBank Senior Client Manager - Middle Market Payments, as they dissect a real-life case of business email compromise.

Protect your business against holiday fraud – here’s how

The winter holidays bring a surge of activity to businesses of all kinds—from hotels and restaurants to big-box retailers and local craft shops. But along with the sales uptick, companies experience a spike in cybercrime and fraud during these festive—and busy—final weeks of the year. Here are steps business owners and employees can take to prevent scammers from putting a damper on the holiday season.

Embedded finance expands payments options, helps reduce merchant risk

Embedded finance helps businesses reduce the risk of fraud and expands support for consumers’ preferred payment methods. In the “Embedded Finance Tracker®,” a PYMNTS collaboration with Galileo, KeyBank’s Bennie Pennington tells PYMNTS how this technology is allowing merchants to offer more cohesive end-to-end services to their customers.

True crime: anatomy of a cyberattack

Register to join operatives and experts on Thursday, October 27 at 1:00 p.m. ET from KeyBank, the FBI and the U.S. Secret Service as we dissect a real-life case of business email compromise. Get insights into the fraudsters, their increasingly sophisticated criminal operations, and how to survive a cyberattack.

Shields up! The importance of cybersecurity for hospitals and healthcare organizations

Just as healthcare professionals seek to provide patients with high-quality patient care, healthcare organizations must also address vulnerabilities in their digital infrastructure to protect patient data.

Spot the spoof: how to recognize and avoid phishing attacks

No matter how you slice it, phishing scams are a two-way street. For these criminal campaigns to succeed, the recipients of the fake correspondence must take some action - click on a link, open an attachment or share sensitive information.

Protecting your company’s data: special treatment for privileged access

When it comes to data breaches and other cybercrime, advanced attackers often abuse privileged access credentials to get to an organization’s sensitive data, infrastructure and systems. And with more and more companies relying on high volumes of data to run both front- and back-office operations, keeping that sensitive information secure is mission critical. Learn more about privileged access and how to manage it to protect your organization’s private data.

Malware has gone mobile – here’s how to protect your business

With more companies embracing remote work and flexible schedules, the number of people using a mobile device for work—whether personal or employer-provided—is higher than ever. The BYOD (“bring your own device”) approach is increasingly common in settings from corporate offices to mom-and-pop retailers. But with mobile malware and malicious apps on the rise, employees might be bringing more than just their smartphones into their work environments. Learn about the different software and apps to watch out for, how they infect mobile devices, and how to protect your business.

Avoid being duped by deepfakes

When you hear the term “deepfake,” you probably think of hackers digitally manipulating videos of celebrities and political leaders to spread disinformation via social media. However, deepfakes also present an emerging threat to businesses as cybercriminals leverage this technology to commit fraud and identity theft. It’s important to understand how deepfakes work, be aware of red flags, and plan ahead to protect your business.

Back to Top


Healthcare Organization Financing Options

Doctor reviewing chart

Merchant Services

Customizing Multiple Payment Options

Waiter using hand held credit card reader

Market Insights

Insights to Help Understand Markets & Industries

Line graph

Connect With Us

  • Social Share Icon
  • Social Share Icon
  • Social Share Icon

Find an Expert