Category: Risk & Fraud
Choosing the Right Anti-Money Laundering Software: 3 Things to Think About
Updating your anti-money laundering system might seem like a daunting task, but there’s no better time than now for organizations to evaluate their security protections. Between rising costs, new legislation and new technologies, the likelihood...
5 Reasons to Adopt a Payment Hub
If your treasury team is unfamiliar with the concept of a payment hub, how do you make the case? By starting with the basics, like these five key benefits:
Everything You Need to Know About SWIFT’s CSP & How to Prepare
You’ve got enough on your plate making sure your environment is adequately protected against further attacks, so here is a brief, common sense explanation of the most important things you need to know about the...
Treasury’s Role in Security — Identifying Vulnerabilities and Addressing Weak Points
As organizations bear the daily burden of protecting their payments, one question looms large: what can be done? Strategic Treasurer’s Craig Jeffery asked that and more when he spoke with security and business payments experts...
The disadvantages of using checks for business payments, according to Mad Men
Consider this: the only business tool used by Madison Avenue ad agencies in the 1960s that is still in use today, are the checks sitting on your desk. Nostalgia might make for great television, but...
Ask the Experts: Same Day ACH Phase 2 — Obstacles and Opportunities
Phase two of same day ACH is upon us, which means that Receiving Depository Financial Institutions (RDFIs) now need to allow for debit transactions designated as Same Day ACH to be processed and funds made...
3 Lessons Preparing for the Zombie Apocalypse Can Teach You About Protecting Patient Data Against Cyber Attacks
Zombies are exactly like the cyber criminals we fight against every day to protect patient data. They’re everywhere you turn, they’re a seemingly unstoppable force, and they’ve got to be stopped, or else we’ll lose...
Slaying the Malware Beast
Malware is hardly a new threat in the security landscape. Banking Trojans that specialize in stealing user credentials, hijacking authenticated sessions and manipulating transactions in order to steal funds have been around since the inception...
Yogi Berra, Cyber-Security Visionary?
Yogi Berra's wisdom is appropriate in many situations, including cyber security. Who knew we could learn so much from a grumbly old baseball catcher from Missouri…