Displaying 1 - 10 of over 22 results for "*"
March 7, 2022
As users of the ACH Network contemplate data quality, risk and compliance strategies, they should be aware that on March 18, 2022, Nacha’s ACH WEB Debit “Account Validation Rule” becomes enforceable. The rule requires that the first use of an account number, or account number changes, be…
Products and Solutions, Risk Management, Rules Compliance
September 2, 2021
Below investigates one specific fraud, however, additional threats are others outlined on the page:
Current Fraud Threats
WEB eResources
WEB transactions, or Internet-Initiated/Mobile Entries, are one of the fastest-growing areas of Direct Payment via ACH. As more organizations look for…
ACH, Risk Management
September 2, 2021
Below investigates one specific fraud, however, additional threats are others outlined on the page:
Current Fraud Threats
What is Account Takeover?
Account takeover is a type of cybercrime or identity theft where a malicious third party gains access to (or “takes over”) an online account,…
ACH, Risk Management
September 2, 2021
Below investigates one specific fraud, however, additional threats are others outlined on the page:
Current Fraud Threats
What Are Coronavirus Scams?
COVID-19 scams are frauds that primarily rely on the existence of the COVID-19 pandemic.
Resources
FinCEN
Advisory on…
ACH, Risk Management
September 2, 2021
Below investigates one specific fraud, however, additional threats are others outlined on the page:
Current Fraud Threats
What is a Money Mule?
A money mule is someone who transfers or moves illegally acquired money on behalf of someone else.
Resources
Nacha
Protecting Against…
ACH, Risk Management
September 2, 2021
Below investigates one specific fraud, however, additional threats are others outlined on the page:
Current Fraud Threats
What is Ransomware?
Ransomware is a type of malware that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.…
ACH, Risk Management
September 2, 2021
Below investigates one specific fraud, however, additional threats are others outlined on the page:
Current Fraud Threats
What is Business Email Compromise?
Business email compromise (BEC) attacks are a form of cybercrime that uses email fraud to attack organizations. In 2020, the FBI (…
ACH, Risk Management
October 30, 2020
This complimentary Blackbaud webinar addresses adding a new payment option or more aggressively promoting an existing payment option to improve donor retention and increase sustaining donations. Simply using ACH Payments can help accomplish that. Learn from ACH experts on how to have a greater…
ACH, Direct Payment
November 11, 2019
Version 2.x
Version 2 is an architecturally improved version of the IFX Business Message Specification (BMS), including refined adaptation to SOA, a consistently applied object model and important new content IFX Version 2 continues the Forum’s commitment to a business-first, service-…
APIs
November 11, 2019
Diagram
This diagram shows the basic container hierarchy of every object in the IFX Standard. The data attributes commonly associated with an object are found mostly in the xxxInfo segment and the current state of the object is found in the xxxStatus segment.
Extended Discussion…
APIs