Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
Ever wonder just how hackers bust into systems and cause destruction? One reason is because people are still using weak passwords. While your pet’s name and wedding anniversary dates are easy to remem...
Don’t blame the hackers; don’t blame the bank; apparently it’s the victim’s fault that a Missouri escrow firm was robbed of $440,000 in a cybercrime, says a report on computerworld.com. The attack ...
In a single move, mergers and acquisitions can provide businesses with a tremendous tool for increasing growth, profitability and improving strategic capabilities. M&As are gathering speed and las...
CEB TowerGroup predicts mobile banking usage will reach 17 billion transactions in 2015. At the same time, customers are still worried about security, which is the number one fear among potential mo...
In the movies, the good guys always get the bad guys. In cyber reality, no such thing exists. A survey of 5,000 IT security professionals turns up the following: 63% doubt they can stop data breac...
In part one of this blog series, I explained that firms need to take a holistic three stage approach to ensure data is kept secure, and therefore comply with data protection regulation and avoid fines...
Mashable.com says that recently over 98,000 photos have been leaked from Snapsaved.com, which has shut down. The Snapchat app makers won’t take any credit, even though previously, 4.7 million phone nu...
Cyber storage does not always = secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should...
Earlier this month Mark Boleat, head of policy for the City of London, gave a serious warning to the financial services industry as he prepared to address the Institute of International Finance in Was...
Hackers are hell-bent on busting into the network of their targets. They are persistent—never giving up. When you build your defense against cyber criminals, it must be done with the idea that they WI...
We’ve heard the acronym BYOD (Bring Your Own Device) for some time now, but less about ‘COPE’ – Corporate Owned, Personally Enabled devices; tablets, smartphones and laptops which are owned by the ent...
The increase in corporate mobile device use, fuelled by better technology and trends like Bring Your Own Device (BYOD) and enterprise focussed apps, means there are many more ways in which a business ...