Join the Community

21,002
Expert opinions
43,805
Total members
327
New members (last 30 days)
116
New opinions (last 30 days)
28,278
Total comments

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

Chris Brown

Chris Brown CEO and Executive Coach at New Cyber Executive

What Fund Management Boards Need to Know about Cybersecurity

Fund management executives and board directors play a crucial role in helping asset management firms navigate cybersecurity. As the financial, operational and reputational costs of cyber risk continue to mount, successful collaboration between fund management executives, cybersecurity executives and the board is essential for effective oversight o...

/security /regulation

Jamel Derdour

Jamel Derdour CMO at Transact365 / Nucleus365

Online Payment Processing: How it Works and Best Practices for Security

In the modern world, more and more businesses are moving online, and with that comes the need for secure online payment processing. Whether you are a small business owner or a large enterprise, it is important to understand how online payment processing works and the best practices for ensuring the security of your transactions. How Online Payment...

/security /payments

Cheryl Chiodi

Cheryl Chiodi Industry Strategist, Financial Services at Akamai

5 Ways to Protect Your Financial Institution from Account Takeover Fraud

No matter how much emphasis is placed on creating safe passwords, avoiding phishing attempts, and safeguarding sensitive personal data, the risk of account takeover (ATO) fraud remains ever-present. This type of fraud, where criminals brazenly steal account credentials and personal identifiable information, including social security numbers, addre...

/security /crime

Aare Reintam

Aare Reintam Chief Operating Officer at CybExer Technologies

Preparing for DORA

The Digital Operational Resilience Act (DORA) will enter into force on the 17th January 2025. After this point, banks, other financial institutions, and all organisations providing services and products in the financial sector in the EU will be required by law to adhere to the regulation. This includes explicit rules around areas including incide...

/security

Michael Berman

Michael Berman CEO at Ncontracts

Strengthening Cybersecurity Defenses: The Significance of Vendor Cyber Monitoring

In the rapidly evolving landscape of cybersecurity, financial institutions face an ongoing battle to protect their systems and data. That battle extends beyond their own systems and data to those of their critical third-party vendors. Not only must they protect their own systems from cyberattacks, they must also ensure that the third-party vendors...

/security /crime

Aileen Allkins

Aileen Allkins Chief Revenue Officer at YNV Tech Talent

Fending off the fraudsters: how organisations can protect themselves from cyberattacks

In 2015, a senior executive at Mattel received an email from the company’s newly appointed CEO. The note requested the processing of an overdue payment to a familiar manufacturer. In acting on the email, the executive set-in motion a $3 million mistake. Cyber attacks of this kind are known as ‘whaling’ emails, which rather than the ‘copy-paste’ met...

/security /people

Aare Reintam

Aare Reintam Chief Operating Officer at CybExer Technologies

Achieving Zero Trust in Finance as Digital Ecosystems Grow in Complexity

Those of us who work in the cyber security industry have been talking about Zero Trust for more than a decade now. During that time, it’s fair to say that the financial services industry has become relatively good at verifying the identity of actors within and outside its dedicated networks. Unfortunately though, while defining best practices for ...

/security

Ameesh Divatia

Ameesh Divatia Co-founder and CEO at Baffle

Protecting and Sharing Financial Data is not Easy — Here’s How to Do It

Data represents both a huge opportunity and a significant risk for companies in the financial services industry. On the one hand, data sharing and analytics can help organizations uncover a wide array of insights that can offer market differentiation, such as customer preferences and intent, marketing opportunities and motivation for more efficien...

/security

Luke Watts

Luke Watts Managing Director at RoundWorks IT

Microsoft 365 vs Google Workspace: Which is Better?

Microsoft Office used to be the only office software that mattered (at least in the business world). Now, Microsoft is working to sideline its traditional office software in favour of its cloud-orientated counterpart Microsoft 365. That in turn is facing serious competition from Google Workspace. If you’re choosing between them, this is what you n...

/cloud

Philip Chethalan

Philip Chethalan Marketing Manager at Subex

Best Practices, Challenges and Trends in Employee Onboarding for BPOs

Employee Onboarding effectiveness defines whether your employee will be engaged or disengaged at work, depending on the impression created on them. Poorly managed onboarding can lead to abandonment, especially for youngsters. According to an SHRM article: 69% of employees stay longer with good onboarding A structured onboarding program will make 5...

/people /identity