Remove Capital Remove Cyber Security Remove Risk Management Remove Security
article thumbnail

Reduce your accounting firm’s cyber risks with these 8 actions

Abrigo

Demand for effective cyber risk management is so strong that the AICPA is developing common criteria for CPAs to use as they help clients evaluate their programs and efforts. I know a lot of people do not take security awareness seriously, but for Sageworks, the No. Develop a security awareness program.

article thumbnail

Treasurers Trust Big Data For Real-Time Risk Assessment

PYMNTS

Risk management is complex territory for many businesses, especially those with complex partnerships, vast supply chains and global footprints. For fund investors, active risk management is of particular importance for treasurers, Hazeltree noted. One is in assessing counterparty strength.

Big Data 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

April 2014: A Busy Month for Fraud Alerts!

Jack Henry

The following steps are expected of FIs: Maintain an information security program and risk assessment, Monitor Internet traffic to your website in order to detect an attack (establish a baseline so you can easily discern an increase in activity). Ensure adherence to appropriate patch management policy and procedures.

Fraud 88
article thumbnail

Sizzle Or Fizzle: Restaurants Rule, FireEye Flounders And Lending Club Is Back On The List

PYMNTS

Then, there was the announcement of Square Capital’s partnership with Upserve , a restaurant management system (the same one that also acquired Breadcrumb from Groupon in May) to extend working capital to restaurants. But is FireEye’s fizzle this week a security sizzle?

Lending 100
article thumbnail

The 2015 GonzoBanker Awards

Gonzobanker

One internal memo acknowledges the weaknesses in the bureau’s methodology and admits to the litigation risks in its case against Ally. FFIEC’s Cyber Security Self-Assessment Tool. “We teach you to make sure you use our system in a manner that doesn’t open any security loopholes.” Demo Quote.