article thumbnail

994: Balancing Top-Line Growth and Bottom-Line Results | Naresh Bansal, CFO, Menlo Security

CFO Thought Leader

He navigated through these turbulent waters by leveraging his deep understanding of the company’s financial backbone and by building strong relationships with the new management. This chapter of his career highlights a key lesson for finance professionals: Success often depends on the ability to manage not just numbers but also change.

CFO 59
article thumbnail

Remote Onboarding Boom Being Secured By Multifactor Authentication

PYMNTS

Per the November Tracker , “Many banks, utility companies and government agencies have been leveraging two-factor authentication (2FA) for several years. Consumers can be surprisingly finicky these days when it comes to their personal identifiable data (PII), and additional security measures can strengthen trust at a critical time like this.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deep Dive: Using Phone Verification And Text Messaging For Secure Checkouts

PYMNTS

Many banks, utility companies and government agencies have been leveraging two-factor authentication (2FA) for several years. It appears that these stepped-up verification approaches are warranted, too, as tales of security breaches that have ensnared unsuspecting internet users are rampant. Leveraging phone-based verification.

article thumbnail

Deep Dive: Why Leveraging Biometrics Can Ease FIs’ $4B ATO Problem

PYMNTS

This means banks need to carefully consider how to maximize their defense strategies while presenting minimal interruption to customers and enabling secure, smooth engagement. Some of these attacks see bots entering random words and numbers, while others involve entering common usernames and passwords. Detecting And Thwarting Attacks.

article thumbnail

Deep Dive: How FIs Can Keep Their Digital-First Innovations Secure

PYMNTS

Some schemes that are impractical to wage in person are simpler to perpetrate online because of a decreased security presence, the anonymity of transactions and fraudsters’ abilities to stage hundreds of attacks simultaneously. Biometric-based methods’ effectiveness varies, but all provide better security than simple passwords.

article thumbnail

Weekend Reading For Financial Planners (April 20-21)

Nerd's Eye View

Enjoy the current installment of "Weekend Reading For Financial Planners" - this week's edition kicks off with the news that CFP Board announced that it has crossed the milestone of 100,000 CFP professionals in the United States, and despite having just celebrated its 50th anniversary last year, just set a record high in the number of advisors sitting (..)

article thumbnail

How US Mobile Leverages Digital Identity To Protect Against SIM Swap Fraud

PYMNTS

Digital identity has become a crucial part of the telecommunications industry as the proliferation of smartphones and the personal data they hold makes security paramount. Such security methods can be critical to preventing fraud that targets mobile users, of which one of the most prevalent types is SIM swap fraud. It's that easy.”.