Blogs

Article | 3 min |
The Cash Conversion Cycle (CCC) measures how much time it takes for your business to convert inventory or other resources into cash from sales. Creating efficiencies with the CCC is one way to increase working capital without generating additional revenue. There are three important factors that affect your CCC: Days Inventory Outstanding (DIO): Measures how quickly your business converts materials into products. Releasing additional working capital into the CCC will allow your business to purchase needed inventory. Access to additional working capital may also allow your business to take...
Article | 7 min |
Your HTLF fraud partners, Director John Fick, and Fraud Risk Manager Tracy Swaim, along with their teams, work daily to help prevent and mitigate fraud loss for our clients. Now more than ever, small businesses are at an increased risk of fraud. Due to Covid-19, inflation, and rising interest rates, some small businesses are forced to work on a skeleton crew, meaning fewer eyes looking for potential scams. Falling victim to fraud can cost your business precious resources including time and money. Learn more in our latest article about what you can do to help protect yourself and your business...
Article | 8 min |
The economic forecast may be uncertain, but preparing for potentially inflated rates is the smartest course of action. Liquidity management is a lot of work, but the benefits can help your business thrive rather than survive. Learn more about how you can keep your business afloat in every season. A fluctuating economic environment, such as the one we’re currently experiencing, has historically pointed toward the imminent possibility of a recession. While forecasts aren’t 100% reliable, proactive leaders should prepare for future economic turmoil by reimagining their company’s liquidity...
Credential stuffing is an attempt by malicious attackers to use credentials that were previously exposed from another account platform against an online banking environment. The frequency of this type attack is growing exponentially, and they’re becoming more and more sophisticated over time. With this type of fraud, attackers will aggregate lists of username and password combinations found on the dark web. Using these credential lists, the attackers will script an attack in hopes that customers have re-used the same login credentials from another account platform. It’s dangerous because...
What is Ransomware? Ransomware is a continuously evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption - often targeting and threatening to sell or leak exfiltrated data or authentication information if the ransom is not paid. Who is at Risk of Ransomware Attacks? Anyone with a device connected to the internet is at risk, including government or law enforcement agencies and healthcare systems as well as other critical infrastructure entities. Ransomware...