Remove Blog Remove Credit and Collections Remove Cybersecurity
article thumbnail

Decoding Cybersecurity and Data Privacy Controls with SAP Cloud Services

SAP Credit Management

(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and a Fellow of Information Privacy (FIP), awarded by the International Association of Privacy Professionals (IAPP). SAP Audit Log API: The SAP BTP Audit Management service provides a way to collect and analyse audit logs from SAP Cloud Platform applications.

article thumbnail

Over 100,000 ChatGPT Account Credentials Stolen

SAP Credit Management

This blog will briefly describe what happened, explain the risk, and recommend steps to mitigate the risk and prevent future compromising of your information. Singapore based cybersecurity firm, Group IB, reported that between June 2022 and May 2023, more than 101,000 ChatGPT account credentials were stolen by the hackers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Durian Model of Effective Cyber Resilience

SAP Credit Management

Cybersecurity is a multi-dimensional problem that never ends. When applying durian to cybersecurity, the joke about people running the moment their security or compliance officer shows up writes itself. The hard spiky stuff of our cybersecurity framework and the resulting controls we set for ourselves aren’t up for debate.

article thumbnail

Conducting an exam-proof AML/CFT risk assessment for credit unions

Abrigo

Best practices for your BSA/AML risk assessment Learn top tips for creating a risk assessment to capture your credit union's risk. Has your credit union started your annual process for updating your anti-money laundering/countering the financing of terrorism (AML/CFT) risk assessment?

article thumbnail

Beware of Fraudulent Letters: Protect Your Personal Information from Data Broker Exploitation

Regal Credit Management

How Scammers Are Exploiting Data Broker Reports Data brokers, such as BeenVerified, PeopleFinder, and Whitepages, collect and sell extensive amounts of personal data sourced from public records, social media, online activities, and other sources.

article thumbnail

Security Safeguards for SAP Cloud Services: Addressing the Threats to Cloud Computing

SAP Credit Management

(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and a Fellow of Information Privacy (FIP), awarded by the International Association of Privacy Professionals (IAPP). By leveraging the Cyber Fusion Center, SAP is well-equipped to navigate the ever-changing landscape of cybersecurity threats.

article thumbnail

Top 10 Crypto scams to look for in 2023

Abrigo

Scammers collect funds from new investors in order to pay the older investors, creating no legitimate investment opportunity and leaving investors with no recourse. Financial Cybersecurity. Top AML/CFT & fraud blogs of the year. Top AML/CFT & fraud blogs of the year. Financial Cybersecurity. Fraud Trends.