article thumbnail

How to secure finance on the front line

Accenture

The post How to secure finance on the front line appeared first on Accenture Banking Blog. They face the most sophisticated cyber threat actors who continually grow their capabilities and are rarely held accountable across the global footprint where they operate. Financial institutions are literally defending the front lines of….

How To 195
article thumbnail

How to Set Your Strategic Planning Time Horizon

South State Correspondent

After adjusting for risk and cost, individual securities and loans perform approximately the same. Securities add no long-term value while loans contribute about 10% ( HERE ) to value. Securities are the most liquid and are the easiest to shift. Finally, you can set your investment duration. is step one.

How To 195
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Practice Loan Pricing Discipline

South State Correspondent

While bankers should be aware of the prevailing pricing in their market, that information is used correctly to make a buy-or-sell decision (make a loan or buy a security), not to match or follow the competition. In our future articles, we will discuss some of those relationship parameters and how they affect bank performance.

How To 195
article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS). Megan is working on a file that has several different Social Security Numbers of different employees at her organization.

Data 520
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Bales, Esq.

article thumbnail

Lifehack | How To Secure Your Child’s Future

BankBazaar

There are no tricks to securing your child’s future financially, only tried and tested ways that are now common knowledge. Hence, it’s safe to say that saving up to secure your child’s future is playing on your mind all the time. And you’re probably worried at how everything around you is getting more expensive by the day.

Security 145
article thumbnail

How To Secure 5G — And The Internet Of Things, Too

PYMNTS

Jonathan Knudsen , senior security strategist at Synopsys , said in an interview with PYMNTS that a secure, standardized security framework can help various ecosystems move toward 5G with confidence. The key question,” Knudsen said, “is how do you build that system or device in a way that minimizes risk?”.

Security 195
article thumbnail

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association 

PCI compliance can feel challenging and sometimes the result feels like you are optimizing more for security and compliance than you are for business outcomes. They’ll share how to grow your business faster and minimize costs for both security and compliance.

article thumbnail

3 Ways to Protect Your Clients’ Personal Information

And the best way of doing this is to first understand the details of how to prevent a breach or cybersecurity risk. Download this guide “Secure Document Collection: 3 Ways to Protect Your Clients’ Personal Information” to learn: Which types of information are considered personally identifiable.