Tag: Cyber Security

Three Ways Banks Can Reduce Payment Fraud

According to the Association of Financial Professionals, 78% of organizations experienced attempted or actual payments fraud in 2017. These breaches put banks at increased risk as fraudulent transactions are processed through their payment systems. It’s...

/ October 15, 2018

The Importance of Bank Account Validation as a Payment Protection Measure

As we discussed in my last post, the importance of bank account validation cannot be understated when it comes to streamlining payment processes and eliminating failed direct debit transactions. As was recently noted in the...

/ September 10, 2018
Treasury Fraud

Understanding the State of Treasury Fraud & Controls

Once upon a time, stealing money from a bank or business meant that criminals had to put on a mask and commit a robbery. Coming into the second half of 2018 however, that thought seems...

/ June 12, 2018
SWIFT Customer Security Programme

Meeting the Requirements of the SWIFT Customer Security Programme

With the January deadline for self-attestation to the SWIFT Customer Security Programme (CSP) in the rear view mirror, members of the Swift community find themselves at various levels of compliance. On the whole, many organisations...

/ April 9, 2018

5 Steps to Detect & Prevent Cyber Fraud

Even though it seems a new data breach is announced daily, many organizations are still unsure about how to protect themselves against attack. With threats originating from inside organizations as well as outside and fraud...

/ February 6, 2018

Choosing the Right Anti-Money Laundering Software: 3 Things to Think About

Updating your anti-money laundering system might seem like a daunting task, but there’s no better time than now for organizations to evaluate their security protections. Between rising costs, new legislation and new technologies, the likelihood...

/ January 24, 2018

Everything You Need to Know About SWIFT’s CSP & How to Prepare

You’ve got enough on your plate making sure your environment is adequately protected against further attacks, so here is a brief, common sense explanation of the most important things you need to know about the...

/ October 13, 2017

Treasury’s Role in Security — Identifying Vulnerabilities and Addressing Weak Points

As organizations bear the daily burden of protecting their payments, one question looms large: what can be done? Strategic Treasurer’s Craig Jeffery asked that and more when he spoke with security and business payments experts...

/ October 11, 2017

Ask the Experts: Same Day ACH Phase 2 — Obstacles and Opportunities

Phase two of same day ACH is upon us, which means that Receiving Depository Financial Institutions (RDFIs) now need to allow for debit transactions designated as Same Day ACH to be processed and funds made...

/ September 11, 2017

3 Lessons Preparing for the Zombie Apocalypse Can Teach You About Protecting Patient Data Against Cyber Attacks

Zombies are exactly like the cyber criminals we fight against every day to protect patient data. They’re everywhere you turn, they’re a seemingly unstoppable force, and they’ve got to be stopped, or else we’ll lose...

/ May 9, 2017