Fraud Prevention

In this webinar, Ryan Barrett, Founder and CEO of ORAM, covers essential topics such as personal cybersecurity best practices, password hygiene and insights into the mysterious world of the dark...

Even with the rise of cybersecurity awareness, there are several misconceptions that can prevent you from truly achieving effective security. That’s why we’re busting some common cybersecurity myths and providing...

Needham Bank’s NB My Cards helps keep your cards secure by sending transaction alerts and enabling you to define when, where and how your card is used. You can even...

Owning a home can be a dream come true, but with that responsibility comes the need to make occasional home improvements to keep your home up-to-date and running smoothly. As...

Most cybersecurity experts will tell you it’s only a matter of time before every company experiences a data breach incident. When a cyber incident does occur, your business needs to...

Getting a good travel deal is always a nice feeling—but sometimes it is too good to be true. As the weather gets warmer and people start traveling more, certain scams...

An email domain is the section of an email address that follows the @ symbol. A subdomain is an email address under the main domain. It comes immediately after the...

If you suspect you’ve become a victim of fraud, please follow our checklist to help fix your credit and limit the impact to your account(s).

Identity theft occurs when someone gains access to your personal information, such as name, date of birth and Social Security number (SSN), and uses that information to commit fraudulent acts,...

Fraudsters are “fishing” for envelopes containing written checks in United States Postal Service (USPS) mailboxes. When fraudsters come across a check, they use techniques to erase all of the details...

Ransomware is a threat to all industries, and there has been a significant increase in the number of ransomware attacks in the last few years with no sign of the...

Multi-factor authentication (MFA), sometimes referred to as two-factor authentication, is an added layer of security that requires more than one form of verification of a user’s identity. This can range...