Category: Risk & Fraud

5 Reasons to Adopt a Payment Hub

If your treasury team is unfamiliar with the concept of a payment hub, how do you make the case? By starting with the basics, like these five key benefits:

/ November 27, 2017

Everything You Need to Know About SWIFT’s CSP & How to Prepare

You’ve got enough on your plate making sure your environment is adequately protected against further attacks, so here is a brief, common sense explanation of the most important things you need to know about the...

/ October 13, 2017

Ring-fencing: How will it impact UK banks and their corporate customers?

Ring-fencing is a new regulation that requires the largest UK banks to separate their core retail banking services from their investment banking and international banking activities. The changes this shift will require, impacting many customers...

/ October 13, 2017

Treasury’s Role in Security — Identifying Vulnerabilities and Addressing Weak Points

As organizations bear the daily burden of protecting their payments, one question looms large: what can be done? Strategic Treasurer’s Craig Jeffery asked that and more when he spoke with security and business payments experts...

/ October 11, 2017
The disadvantages of using checks for business payments

The disadvantages of using checks for business payments, according to Mad Men

Consider this: the only business tool used by Madison Avenue ad agencies in the 1960s that is still in use today, are the checks sitting on your desk. Nostalgia might make for great television, but...

/ September 14, 2017

Ask the Experts: Same Day ACH Phase 2 — Obstacles and Opportunities

Phase two of same day ACH is upon us, which means that Receiving Depository Financial Institutions (RDFIs) now need to allow for debit transactions designated as Same Day ACH to be processed and funds made...

/ September 11, 2017

What Security Protections Should You Expect From a Banking Partner?

As organizations undergo the arduous process of selecting banking partners, one of the critical factors they must evaluate is the security of the institution. This aspect of the process cannot be understated. It has to...

/ May 19, 2017

3 Lessons Preparing for the Zombie Apocalypse Can Teach You About Protecting Patient Data Against Cyber Attacks

Zombies are exactly like the cyber criminals we fight against every day to protect patient data. They’re everywhere you turn, they’re a seemingly unstoppable force, and they’ve got to be stopped, or else we’ll lose...

/ May 9, 2017

Slaying the Malware Beast

Malware is hardly a new threat in the security landscape. Banking Trojans that specialize in stealing user credentials, hijacking authenticated sessions and manipulating transactions in order to steal funds have been around since the inception...

/ May 9, 2017

Yogi Berra, Cyber-Security Visionary?

Yogi Berra's wisdom is appropriate in many situations, including cyber security. Who knew we could learn so much from a grumbly old baseball catcher from Missouri…

/ May 9, 2017