136 Results from 2015, /security
Robert Siciliano Security Analyst at Safr.me
In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up. So many people, including ones with businesses that rely upon cyber communication, continue to avoid backing up their digital data. Nobody is exempt from the No. 1 rule of backing ...
16 June 2015 /security
Retired Member
To understand how seriously the international community is taking money laundering you need look no further than the first paragraph of the G20’s ‘2015-16 Anti-Corruption Implementation Plan’. ‘Corruption presents a serious threat to global growth and financial stability…’ ‘Corruption destroys public trust, undermines the rule of law, skews compe...
16 June 2015 /security /regulation
The data regulation landscape is changing rapidly. Recent research found that in 2014 data breaches increased by 49% with more than a billion data records stolen or compromised - that’s 32 records lost or stolen every second. Incidents involving these institutions have shone the data regulation spotlight firmly on to financial institutions and th...
11 June 2015 /security /regulation
Providing digital financial services requires high level of security both on the client and bank side. At the same time, Digital Banking growth can only be achieved if the security and the functionality mixed in a right balance, otherwise security might become a business disabler. For this reason, Authentication of clients in a secure and easy way...
10 June 2015 /security Innovation in Financial Services
What would you rather have happen to you? A Russian ring of hackers has infiltrated your computer and smartphone and is hell-bent on taking control of your finances, social media life, even the smart gadgets in your house…OR…you’ve just been diagnosed with paranoid psychosis, and in fact, nobody’s out to harm you at all. In a day and age where it’...
09 June 2015 /security
Twenty years ago I had to help put together an exchange’s solution for broadcasting corporate actions notifications to the world. That was before everyone used email, so we had to rely on faxes from issuers. To ensure that responsibility and liability for accuracy remained clearly with the issuer, and not with the exchange or any data vendor or ...
05 June 2015 /security
Yes, identity fraud is SO common that someone becomes a victim every two seconds. The 2014 Identity Fraud Study, as reported on javelinstrategy.com, turned up some alarming results. Though the dollar amount stolen had decreased over the year preceding the study, the number of victims had increased. People at highest risk were ages 35 to 44. Account...
04 June 2015 /security
You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there? The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may be familiar with “cloud services...
03 June 2015 /security
Who needs psychics to reveal future lottery numbers when you can hack into the state lottery association and tamper with it? That apparently was the reasoning of Eddie Raymond Tipton, 51. Prosecutors believe Tipton inserted a thumb drive into a computer—the one that spits out random numbers for the lottery, says an article in the Des Moines Registe...
02 June 2015 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.