article thumbnail

A time of reflection: Five tips for Financial Services in 2019

OpenText Information Management

The New Year is upon us, and with it come new challenges and opportunities for the Financial Services industry.

article thumbnail

Digital Preservation -- High Stakes for Finance and Insurance Companies

AIIM

Nowhere is this truer than in the financial services sector. In a recent AIIM survey, 85% of finance and insurance executives said that digital preservation was “important” or “very important” to their organizations – even higher than the 77% reported in other industries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DOL Puts Plan Sponsors and Other Fiduciaries on Notice: ERISA Requires Appropriate Precautions to Mitigate Cybersecurity Threats

Data Matters

The Cybersecurity Guidance is set forth in three parts: Tips for Hiring a Service Provider , directed toward plan sponsors and fiduciaries. Online Security Tips for plan participants and beneficiaries. Plan sponsors and fiduciaries should carefully review the full list of Tips for Hiring a Service Provider.

article thumbnail

A massive phishing campaign using QR codes targets the energy sector

Security Affairs

Other top 4 targeted industries include Manufacturing, Insurance, Technology, and Financial Services seeing 15%, 9%, 7%, and 6% of the campaign traffic respectively.” Experts warn that the Energy sector was a major focus of this campaign, followed by manufacturing, and insurance. ” continues the report.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 147
article thumbnail

CyberheistNews Vol 13 #13 [Eye Opener] How to Outsmart Sneaky AI-Based Phishing Attacks

KnowBe4

Strategies include: Developing a comprehensive, defense-in-depth plan Technical controls all organizations should consider Gotchas to watch out for with cybersecurity insurance Benefits of implementing new-school security awareness training Best practices for creating and implementing security policies Get the E-Book now!

article thumbnail

Expect More Spam Calls and SIM-Card Scams: 400 Million Phone Numbers Exposed

Adam Levin

Your phone provider will have tips on the best practices to avoid SIM-card attacks, and common sense can be your guide regarding any unexpected phone calls, and practice the Three Ms: Minimize your exposure. It is believed this was the method used to recently hack Jack Dempsey’s Twitter account. . What You Can Do.

Mining 79