Remove Cyber Security Remove Online Remove Operations Remove Technology
article thumbnail

Guest blog post: Protecting yourself online

Abrigo

The majority of professionals love technology. But when is too much technology just too much? Sageworks asked Don West, a member of the AICPA''s Information Management and Technology Assurance Section''s CITP Credential Committee the best ways to protect one''s self and business online. --. Do you bank online?

Online 199
article thumbnail

EMV’s Online Fraud Attack Push

PYMNTS

Though the industry knew it was coming, the sharp migration of fraud from in-store to online channels with the growing adoption of EMV is still enough to keep any online merchant up at night. Not only is online fraud threat growing, but also it’s hitting merchants right where it hurts by putting a greater risk on digital transactions.

Fraud 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inside China’s Cyber, Financial Regulatory Changes And Challenges

PYMNTS

billion-strong, high-spending consumers and their willingness to adapt to new technologies, trends and products may represent the economy of the future for many banks and businesses, but it is notoriously difficult for firms to enter and compete in this market. Confronting the Chinese Privacy Myth . The law is still ambiguous.

article thumbnail

Q3 Global Fraud Attack Index Data Deep-Dive

PYMNTS

online merchants and how that changes over time, and examines the types, sources and geography of fraud attacks. Prior to founding Forter, Michael was the VP Product & International Operations at Pango Parking where he was in charge of the deployment and adoption of Mobile Wallet technologies worldwide.

Fraud 100
article thumbnail

The Importance Of Cyber War Games For Digital Businesses

PYMNTS

based Immersive Labs for its cyber security war games demonstrates the enduring appeal of that adage. In addition, organizations — those with a long view, at least — have long done cyberthreat assessments, a process centered around checking anti-hacking technology and the credibility of cyberattack response plans.

Exercises 151
article thumbnail

Top Fraud Issues for Telecommunications: Survey Results

FICO

Fraud teams operate with lean structures. They have relatively small teams, considering the diverse breadth of activities that they are expected to undertake, and the emerging fraud risks from new technologies and services their organisations offer. by Mel Prescott.

Survey 52
article thumbnail

Synthetic Identities: From Data Breaches to Auto Loan Fraud

FICO

As the US transitioned to hard-to-counterfeit EMV payment card technology several years ago, criminals flocked to card not present (CNP) fraud , often combining identity fragments and card numbers stolen in breaches to make illicit purchases online. Fraud and data breaches have always had a close, if destructive, relationship.

Fraud 70