There’s no question that fraud (especially business email compromise) is rising aggressively, with 75% of companies reporting they have fallen victim to a fraud incident within the past year. As new technologies emerge, fraudsters are redoubling their efforts to take advantage of every opportunity. They have mobilized, they’re organized, and they probably even have health plans. To defend yourself, it’s time to have a better plan than the criminals, one that comes down to being proactive, rather than reactive.
Sometimes, catching insider collusion comes down to plain old common sense…
You’ve got enough on your plate making sure your environment is adequately protected against further attacks, so here is a brief, common sense explanation of the most important things you need to know about the CSP and what you need to do to prepare.
Ring-fencing is a new regulation that requires the largest UK banks to separate their core retail banking services from their investment banking and international banking activities.
The changes this shift will require, impacting many customers whether they are businesses, consumers or indeed other banks, are numerous and complex to say the least.
As organizations bear the daily burden of protecting their payments, one question looms large: what can be done?
Strategic Treasurer’s Craig Jeffery asked that and more when he spoke with security and business payments experts from Bottomline Technologies, a leader in business payment automation technology for more than 30 years.
What if you could give your organization an unfair advantage – an extra level of competitiveness – with Swift’s Customer Security Programme (CSP)?
If you aren’t sure what security has to do with your company’s ability to compete, let me explain.
Monitoring user behavior and understanding that behavior in the context of typical network traffic are keys to building a solid security strategy that protects your organization from employee fraud collusion. It’s important to take that a step further however and also correlate activities in various channels and systems across the organization. Here’s why…
Monitoring user behavior is the most important first step you can take to protect your organization against insider fraud losses.
Monitoring activity alone however isn’t enough. To more accurately identify fraud attempts it’s important to have context – and that’s where analytics come in.
Consider this: the only business tool used by Madison Avenue ad agencies in the 1960s that is still in use today, are the checks sitting on your desk. Nostalgia might make for great television, but it doesn’t mix well with banking.
Phase two of same day ACH is upon us, which means that Receiving Depository Financial Institutions (RDFIs) now need to allow for debit transactions designated as Same Day ACH to be processed and funds made available by the end of the RDFI’s business day.
While this new functionality allows for access to funds much more quickly than ever before, it also introduces a whole host of potential security concerns that need to be addressed.