Information Security

Group founded 04 Apr 2007
Posts 201
Members 42
Group summary

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...

More blogs
See all Blogs »
Aare Reintam

Achieving Zero Trust in Finance as Digital Ecosystems Grow in Complexity

Those of us who work in the cyber security industry have been talking about Zero Trust for more than a decade now. During that time, it’s fair to say that the financial services industry has become re...

03 May 2023
Ameesh Divatia

Protecting and Sharing Financial Data is not Easy — Here’s How to Do It

Data represents both a huge opportunity and a significant risk for companies in the financial services industry. On the one hand, data sharing and analytics can help organizations uncover a wide array...

24 Apr 2023
Luke Watts

Microsoft 365 vs Google Workspace: Which is Better?

Microsoft Office used to be the only office software that mattered (at least in the business world). Now, Microsoft is working to sideline its traditional office software in favour of its cloud-orient...

21 Dec 2022
Philip Chethalan

Best Practices, Challenges and Trends in Employee Onboarding for BPOs

Employee Onboarding effectiveness defines whether your employee will be engaged or disengaged at work, depending on the impression created on them. Poorly managed onboarding can lead to abandonment, e...

25 Nov 2022
Tristan Hinsley

5 Reasons to Use Cybersecurity Performance Management (CPM)

Over the last half decade, industry insiders around the world have watched cybersecurity budgets balloon astronomically to fight the ongoing threats facing businesses everywhere. The rise of ransomwar...

30 Sep 2022
Steve Bradford

The allure of fraud – and how to protect against it

2022 has so far seen an insatiable appetite for stories of fraud. From ‘The Tinder Swindler’ Simon Leviev fooling potential love interests into giving him millions of dollars to escape his "enemi...

31 Aug 2022
Boris Bialek

How to create a zero trust environment in financial services

It wasn’t that long ago that security professionals protected their IT in much the same way that mediaeval guards protected a walled city – they made it as difficult as possible to get inside. But onc...

30 Aug 2022
René Hendrikse

Here’s why (and how) the world should remove the need for passwords

Are you a good password user? If you have different passwords for every account, each a unique configuration of letters, numbers, capitals, and symbols, perhaps you are. No one can access your account...

06 Jul 2022
Todd Carroll

The Three Worst Financial Industry Data Leaks

Banks, fintechs and other financial institutions have a unique responsibility to maintain the highest level of data security. Billions of people trust them with highly sensitive personal information, ...

13 Apr 2022
Amit Agarwal

What are Cloud Based Applications’ Tech Challenges?

Cloud-based services are expected to be the dominant technology in the digital age. According to Cisco Cloud, the cloud will house more than 94% of the workload and computing operations by 2021. Cloud...

25 Jan 2022

Now hiring