Why treasurers need to be cool cats
by Bija Knowles
Are you an emotional treasurer? If so, you might be at more risk of giving away sensitive security information
Corporate treasury departments need a fraud prevention strategy that not only keeps pace, but is one step ahead of the fraudsters. To be truly effective, systems and processes needs to be able to spot…
Read moreby Bija Knowles
Are you an emotional treasurer? If so, you might be at more risk of giving away sensitive security information
by Jack Large
7 questions from ProcessUnity you need to ask whether your Vendor Risk Management systems and processess are good enough
by Jack Large
Reported global economic crime hits record levels
by Bija Knowles
Cybercrime has a greater impact on financial services than on any other industry, with greater costs and a higher attack rate, according to research by Accenture and the Ponemon Institute
by Bija Knowles
Last year, identity fraud rose to record levels in the US, affecting about seven per cent of American consumers. These five actions can help to protect both consumer and business accounts
by Bija Knowles
Companies have a roughly 50 per cent chance of being targeted by cybercrime but few are highly prepared – and new research shows the more spent on IT, the better protected the organisation
by Bija Knowles
With huge databases of personal security credentials and passwords now publicly available on the dark web, emails are an increasingly unsafe way to conduct financial business
by Jeremy Gram , Senior Associate, Prescient
Prescient show that simple database checks in due diligence programmes are often not enough to unravel who really owns a company
by Kylene Casanova
Book by Gerard Blokdijk provides a Fraud Analytics roadmap on how to understand and move forward in the right direction, based on verifiable data
by Kylene Casanova
Self assessment in fraud control is essential in war against all kinds of fraud - cyber fraud, occupational fraud, corruption and bribery, etc.
by Kylene Casanova
Kroll’s 10th Annual Global Fraud & Risk Report 2017/18 shows that there are major repercussions from current levels fraud-related losses; confidential information is increasingly under threat
by Kylene Casanova
Most lucrative time for a fraudster or criminal network is the period right after a breach has happened, and before it has been discovered or reported
by Bija Knowles
Chief financial officers are faced with expanding responsibilities when it comes to driving corporate growth – but taking cost out of the business is an overall priority
by Kylene Casanova
Remove TRUST GAPS between board & company & business units & IT cybersecurity & external vendors/suppliers & government AND with technology providers
by Bija Knowles
The International Chamber of Commerce has launched a tool to provide guidance for companies on corporate responsibility, due diligence and how to tackle corruption
by Bija Knowles
Hackers aren't always to blame for corporate security breaches. Research suggests that two in five data breaches are not caused by external cybercriminals but by an 'insider threat'
by Bija Knowles
Panellists in the 'Fighting fraud' session, at BNP Paribas's Cash Management University in Paris last week, said that the problem is probably even bigger than we imagine
by Jack Large
A button to report suspicious e-mails, use hackers to expose your vulnerabilities, real-time monitoring, biometric authentication + prevention methodologies
by Bija Knowles
Corporate networks and business users are increasingly in the crosshairs of cybercriminals, with more than a quarter of ransomware attacks in 2017 targeted at businesses
by Bija Knowles
Nearly half of all Asia Pacific corporates have experienced a cybersecurity threat in the past year but only 15 per cent are certain no breach has occurred
by Dan Blumen , Founding Partner, Treasury Alliance Group
All the technology in the world won't protect you from 'staff leaving gate unlocked'. Complete set of policies backed by procedures to protect department are needed
by Bija Knowles
Few corporates are confident of their ability to detect sophisticated cybercrime but a strategy to respond to a data breach and comply with legal obligations should be part of every corporate plan
by Bija Knowles
Software as a service (SaaS) is making the implementation of e-signatures faster to deploy, while the use of e-signatures is reducing errors, improving productivity and reducing staff hours
by Jack Large
Quantum computing is requiring an overhaul of our cryptographic tools, claims ISARA, nevertheless discipline to avoid self-inflicted fraud still needed
