Community
The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...
As the owner, you will also give up ownership if you leave this group.
Retired Member
Ever clicked send on an email, and instantly regretted it? I think we’ve all been there – but perhaps not to the scale of one UBS employee this week, where a small error has created some rather significant repercussions. Yes, this is the story of a UBS employee who inadvertently sent an email containing financial details of the then client General...
23 November 2010 /security /regulation
Following recent news that more than two-thirds of companies have been hit by data breaches over the past year, the report featured in Computer Weekly is an interesting, if not alarming, confirmation that fraud is on the rise. Although person-present payments have improved security measures due to developments in global security standards like PCI...
23 November 2010 /security /payments
We all know about identity fraud and the various ways this can happen, but what about the tools to fight identity fraud? Well, there are industry measures in place to stop people’s identities being used fraudulently like the work of the Dedicated Cheque and Plastic Crime Unit and CIFAS, the Fraud Intelligence Sharing System and the banks use of int...
22 November 2010 /security
To date, the poor availability of phones with NFC technology has been one of the factors holding back the use of this technology to enable wave-and-pay mobile payments in a shop or peer-to-peer payments by touching phones together. It seemed earlier this year that bridging technologies may provide the kick start needed for contactless payments to ...
03 November 2010 /payments
Key security considerations for home and mobile workers In many cases executive IT and security professionals trust their Information Security departments to provide adequate security to protect employees while operating in their business environment. However it is rare for users to extrapolate this security to a home environment. What does this ...
01 November 2010 /security /payments
There is no doubt we live in an increasingly mobile, fast-paced and complicated society. If you had asked the average person in the street five years ago how their identity could be stolen then bin raiding and theft of personal mail would certainly have figured prominently. Today, ask the same question and you’re likely to get a multitude of respo...
29 October 2010 /security
If Visa’s Payment Security Forum held in Cairo this week is anything to go by, Data Field Encryption projects certainly seem to be on the agenda for banks in the Middle East, Africa, and Eastern Europe. More than 95% of those responding to a quick poll at the conference said they were either considering, evaluating, or were actively engaged in Da...
30 September 2010 /security /payments
Lachlan Gunn Executive Director at European Association for Secure Transactions
I first did a blog on Do you Protect Your PIN at ATM on this site last winter. In it I stated: "The most common ways that criminals obtain a PIN at an ATM are by looking over your shoulder (defeated by covering your PIN), by using spy or micro cameras (also defeated by covering your PIN) and by using a false overlay over the PIN pad. It shoul...
23 September 2010 /security
The voices calling for the U.S. to migrate to EMV have been growing louder over the past few months with Walmart, T-Mobile and even the Federal Reserve calling for or discussing the move. Meanwhile, just across the border, the United States’ close northern cousins in Canada have already taken the decision to make the move and are well underway in...
09 September 2010 /payments
Anthony Cossey Project Manager at Fixnetix ltd
The UAE and Saudi Arabia have banned certain communications services available via Blackberry devices in their countries, simply because the data leaving the device is encrypted and this makes the data difficult to perform snooping on. This to me defies logic, if were using any Internet connected device for illegal purposes, i would certainly be u...
05 August 2010 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.