Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
2011 presented some fascinating security breaches that could have been prevented. Here are my top three trends, and how to avoid them in 2012! Online identity and social media sites The successful lau...
Laptops, desktops, Macs, mobiles, and tablets are on many people’s wish lists this holiday season. Once these shiny new devices are connected to the Internet, they will be under siege by malware creat...
Consumers love alternatives, especially if the alternative is easy to use and already part of their everyday life. However, most consumers who undertake e-commerce using their mobile device are woefu...
T H I R T E E N T R U T H S O F P I P E L I N E M A N A G E M E N T Truth #1: The first truth of pipeline management is, as you might expect, that a strong pipeline avoids the quarter end crunch...
In my last blog post I wrote about the problems banks will have with fraud detection when the three day payment process window shortens dramatically from January 2012. Because existing risk-engine str...
On our way home from a recent family vacation, my two year old grew understandably anxious and uncooperative while waiting for a flight in an airport terminal. So I handed over my iPhone, hoping to di...
As of 1st January 2012, the three-day wait for fund transfers will be over. Banks must ensure that for all electronic payments (e.g. online banking transfers), the money reaches the payee’s account in...
As most of us know, new FSA rulings came into force at the start of last month, demanding that regulated investment firms record all mobile phone conversations relating to transactions in certain mark...
The concern with stories like the recent one in the Telegraph about it being too expensive for the police to arrest a fraudster - so there are no consequences for the card fraud criminal - is that th...
The more sophisticated the technology used in the internet gaming industry gets, the more advanced the levels of fraud become. From card fraud to identity theft and misrepresentation, providers have h...
We're experiencing a massive shift in consumer behavior right now with the explosion of Facebook, Twitter, YouTube, and other community collaboration and social media platforms. A world where Facebook...
Key to any financial institution is the identification and management of risk. IT compliance certainly fits inside this category, where the implementation of controls to meet compliance also has an ...