Instigate change. Start a new collaborative Blog Group

Create group
Blogs
Chris Brown

What Fund Management Boards Need to Know about Cybersecurity

Fund management executives and board directors play a crucial role in helping asset management firms navigate cybersecurity. As the financial, operational and reputational costs of cyber risk continue...

18 Mar 2024
Information Security
Jamel Derdour

Online Payment Processing: How it Works and Best Practices for Security

In the modern world, more and more businesses are moving online, and with that comes the need for secure online payment processing. Whether you are a small business owner or a large enterprise, it is ...

12 Sep 2023
Information Security
Cheryl Chiodi

5 Ways to Protect Your Financial Institution from Account Takeover Fraud

No matter how much emphasis is placed on creating safe passwords, avoiding phishing attempts, and safeguarding sensitive personal data, the risk of account takeover (ATO) fraud remains ever-present. T...

02 Aug 2023
Information Security
Aare Reintam

Preparing for DORA

The Digital Operational Resilience Act (DORA) will enter into force on the 17th January 2025. After this point, banks, other financial institutions, and all organisations providing services and produ...

19 Jul 2023
Information Security
Michael Berman

Strengthening Cybersecurity Defenses: The Significance of Vendor Cyber Monitoring

In the rapidly evolving landscape of cybersecurity, financial institutions face an ongoing battle to protect their systems and data. That battle extends beyond their own systems and data to those of t...

18 May 2023
Information Security
Aileen Allkins

Fending off the fraudsters: how organisations can protect themselves from cyberattacks

In 2015, a senior executive at Mattel received an email from the company’s newly appointed CEO. The note requested the processing of an overdue payment to a familiar manufacturer. In acting on the ema...

04 May 2023
Information Security
Aare Reintam

Achieving Zero Trust in Finance as Digital Ecosystems Grow in Complexity

Those of us who work in the cyber security industry have been talking about Zero Trust for more than a decade now. During that time, it’s fair to say that the financial services industry has become re...

03 May 2023
Information Security
Ameesh Divatia

Protecting and Sharing Financial Data is not Easy — Here’s How to Do It

Data represents both a huge opportunity and a significant risk for companies in the financial services industry. On the one hand, data sharing and analytics can help organizations uncover a wide array...

24 Apr 2023
Information Security
Luke Watts

Microsoft 365 vs Google Workspace: Which is Better?

Microsoft Office used to be the only office software that mattered (at least in the business world). Now, Microsoft is working to sideline its traditional office software in favour of its cloud-orient...

21 Dec 2022
Information Security
Philip Chethalan

Best Practices, Challenges and Trends in Employee Onboarding for BPOs

Employee Onboarding effectiveness defines whether your employee will be engaged or disengaged at work, depending on the impression created on them. Poorly managed onboarding can lead to abandonment, e...

25 Nov 2022
Information Security
Tristan Hinsley

5 Reasons to Use Cybersecurity Performance Management (CPM)

Over the last half decade, industry insiders around the world have watched cybersecurity budgets balloon astronomically to fight the ongoing threats facing businesses everywhere. The rise of ransomwar...

30 Sep 2022
Information Security
Steve Bradford

The allure of fraud – and how to protect against it

2022 has so far seen an insatiable appetite for stories of fraud. From ‘The Tinder Swindler’ Simon Leviev fooling potential love interests into giving him millions of dollars to escape his "enemi...

31 Aug 2022
Information Security

Now hiring