Category: Risk & Fraud

The business of BEC: Hackers are serious about the business of fraud. Are you?

There’s no question that fraud (especially business email compromise) is rising aggressively, with 75% of companies reporting they have fallen victim to a fraud incident within the past year. As new technologies emerge, fraudsters are redoubling their efforts to take advantage of every opportunity. They have mobilized, they’re organized, and they probably even have health plans. To defend yourself, it’s time to have a better plan than the criminals, one that comes down to being proactive, rather than reactive.

Ring-fencing: How will it impact UK banks and their corporate customers?

Ring-fencing is a new regulation that requires the largest UK banks to separate their core retail banking services from their investment banking and international banking activities.

The changes this shift will require, impacting many customers whether they are businesses, consumers or indeed other banks, are numerous and complex to say the least.

Treasury’s Role in Security — Identifying Vulnerabilities and Addressing Weak Points

As organizations bear the daily burden of protecting their payments, one question looms large: what can be done?

Strategic Treasurer’s Craig Jeffery asked that and more when he spoke with security and business payments experts from Bottomline Technologies, a leader in business payment automation technology for more than 30 years.

Are Your Employees Working Together to Work Against You? Part 3

Monitoring user behavior and understanding that behavior in the context of typical network traffic are keys to building a solid security strategy that protects your organization from employee fraud collusion. It’s important to take that a step further however and also correlate activities in various channels and systems across the organization. Here’s why…

Are Your Employees Working Together to Work Against You? Part 2

Monitoring user behavior is the most important first step you can take to protect your organization against insider fraud losses.

Monitoring activity alone however isn’t enough. To more accurately identify fraud attempts it’s important to have context – and that’s where analytics come in.