Fund Managers Targeted in Sophisticated Cyberattacks
Data Matters
DECEMBER 10, 2019
Impersonation of key senior personnel to remit fraudulent payment instructions via telephone and video. For remote access to emails, trading systems and other electronic data containing confidential information, the authentication mechanism should utilize at least two of the following factors: what a person knows (e.g., biometrics).
Let's personalize your content