Join the Community

22,735
Expert opinions
43,887
Total members
365
New members (last 30 days)
186
New opinions (last 30 days)
28,929
Total comments

Latest expert opinions

clear
clear

96 Results from 2018, /security

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Use a Password Manager Or You WILL Get Hacked

Do you ever use the same password over and over again for different accounts? If so, you are not alone. However, this is quite dangerous. It’s best to use a different, unique password for each account, and to make it easier, you should use a password manager. According to surveys, people understand that they should use unique passwords, and more th...

/security

Reghunathan Sukumara Pillai

Reghunathan Sukumara Pillai Consultant at Infosys

Personal data everywhere ?

Early morning, I received a call in my cell phone from a consumer finance company explaining to me about some consumer finance/EMI offers. After a few hours, I received a call from one call entre of a bank selling credit cards about life time free card with other offers. In the afternoon, I received a call from an Insurance company about some insu...

/security Data Protection Act Issues

Robert McClure

Robert McClure Managing Director at Sequrest

Navigating the GDPR maze

On 25 May 2018 most processing of personal data by organisations will have to comply with the General Data Protection Regulation (GDPR). This legislation replaces the Data Protection Act and will have far reaching consequences for how institutions collect, process and store data. Individuals will gain greater rights and control over their data. ...

/security /regulation Data Protection Act Issues

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

14 Social Media Disasters Ready to Strike

There are many ways that you or a small business could get caught up in a social media disaster. Can you think of any off the top of your head? If you are like most of us, probably not. Here are 14 ways that you could be in danger: A Terrible Online Reputation – Do you keep a watchful eye on you or your business’ Facebook page? Are people posting ...

/security

Nick Mothershaw

Nick Mothershaw Chief Identity Strategist at Open Identity Exchange (OIX)

Identity, trust and value. How an unbalanced investment in trust can be a detriment to you.

We can see in our research that most businesses are investing heavily in data and analytics to better understand their customers. This is great. The objective is to increase new customers and improve acquisition and onboarding rates. But, the same level of investment isn’t being put into data and analytics to fight fraud, or identify people. The r...

/security /payments Personal Finance

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Understanding and Stopping Criminal Identity Theft

The definition of criminal identity theft is a crime where the criminal impersonates the victim in order to protect their innocence. This can lead to victims getting fines or even getting arrested and charged for crimes they did not commit. How Does This Happen? There are a number of ways that a criminal can pull this off, and it generally occurs w...

/security

Konrad Litwin

Konrad Litwin Global General Manager - Testing at Perforce Software

How and why software development must be included in FS compliance, risk and security processes

Digitalisation is at the heart of most financial services and processes, whether internal or external. The good news is that it can be a catalyst for innovation and gaining a competitive edge. The downside is that the high dependency on these ‘soft assets’ brings its own challenges and vulnerabilities. While they are already considered within ri...

/security Financial Risk Management

Retired Member

Retired Member 

Time to take GDPR seriously

Whilst the transition to digital has brought countless benefits to businesses, almost every organisation runs the risk of losing or corrupting sensitive data, either through accidental, or malicious intent. It’s common knowledge that losing sensitive commercial and customer information can have serious implications for revenue, business confidence...

/security Data Management 101

Robert Siciliano

Robert Siciliano Security Analyst at Safr.me

Top 10 Signs of a Malware Infection on Your Computer

Not all viruses that find their way onto your computer dramatically crash your machine. Instead, there are viruses that can run in the background without you even realizing it. As they creep around, they make messes, steal, and much worse. Malware today spies on your every move. It sees the websites you visit, and the usernames and passwords you ty...

/security

Martin Koderisch

Martin Koderisch Manager at Edgar, Dunn & Company

Rise of ID Theft & Account Take Over Fraud

In the UK, total financial fraud losses across payment cards, remote banking and cheques were estimated to have been around £770 million in 2016 by Financial Fraud Action UK. Of the various subcategories, card ID theft stands out as being on the rise. Card ID theft fraud occurs when a criminal uses fraudulently obtained card details, along with st...

/security /payments

Now Hiring