You receive a request to change remittance information from the vendor. Is that really the vendor? Combat business email compromise, deepfakes, and other fraud tactics by creating a reference to authenticate incoming email and telephone requests – especially if you are still working remotely.
Click here to view or download slides. Click below to begin the video presentation.