136 Results from 2015, /security
Retired Member
Despite increasing regulations across the finance sector globally, fraud and associated risks continue to increase—and at a staggering pace. Thomson Reuters was recently quoted as saying, “Increased regulation isn’t just a temporary challenge for global financial institutions—it’s the new reality.” And, the cost of compliance is on the rise. A rec...
11 October 2015 /security /sibos
Robert Siciliano Security Analyst at Safr.me
Most experts in cybersecurity suggest that computer users utilize a password manager, and I think they have a great point. These managers ensure that you can use a unique, strong password for all online account. On the flip side, there are naysayers that state a password manager isn’t as safe as you might think, as if the master password is discov...
10 October 2015 /security
If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accounts unless you use a virtual private network (VPN). A VPN is a technology that creates a secure connection over an unsecured network. It’s important ...
03 October 2015 /security
Paul Hampton Security Expert at Thales
The use of online banking and shopping has grown significantly, but so too has the number of security threats targeting such services. According to the latest Breach Level Index report, 888 data breaches occurred during the first half of 2015 alone, compromising 246 million records worldwide. However, while cash and card payments are still the mo...
01 October 2015 /security /payments
You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with viruses or cracks passwords to raid the accounts of big business. This is one kind of hacker, but in a broader sense a hacker is a person (male or fem...
01 October 2015 /security
A Hacker in Business School As the Java style capitalisation in 'CryptoSecurities' suggests, I was a proper nerd before I took a left turn into a top business school and later became a financial services consultant. What I didn’t anticipate is that a hacker’s mind would actually be an asset in an unlikely profession. Now Hackers are people who sol...
30 September 2015 /security /regulation
You have the best IT security, but dang it…the bad guys keep getting in. This means someone inside your house keeps opening the back door and letting the thieves slip inside. You have to find out who this enabler in your company is, and it may be more than one. They don’t know they’re letting in the crooks, because the crooks are disguising themse...
26 September 2015 /security
No company can afford to ignore their compliance regulations that are in place to ensure markets and financial systems remain sound, stable and resilient - inhibiting market abuse and promoting confidence in the Financial Services sector. Luckily for you, voice technology has come a long way and, if applied correctly, can be extremely helpful in me...
22 September 2015 /security
You’ll probably be shocked to learn that last year, thousands of cars with keyless entry technology were stolen in London, says a report from wired.com. But fact is, the more connected a vehicle is to the cyber world, the more hackable the vehicle is—and the hack could be to steal the vehicle or hurt the owner. Rule: Anything that’s connected, espe...
19 September 2015 /security
Catfishing is when someone creates a phony online account—and not necessarily to scam someone for financial gain. An article on vice.com tells all about a person who’s been catfishing for eight years. She started in middle school by creating “Joey” on MySpace. She then commented, as “Joey,” on her real MySpace page to make herself appear that som...
18 September 2015 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.