article thumbnail

Build vs buy? Strategic decisions in financial crime management

The Payments Association

Lower Maintenance Burden: Vendor handles updates, bug fixes, and compliance changes. Vendor Dependence: Reliance on a third party for critical functions and data security. Data Privacy Concerns: Sharing sensitive data with vendors may introduce privacy and compliance risks.

article thumbnail

The Uncharted Territory Of M&A Cyber Risks

PYMNTS

which suffered a data breach last year as the result of a cybersecurity incident at a third-party vendor. T-Mobile ‘s breach in 2015 that compromised the data of 15 million customers was the result of a third-party security lapse, too. Such cases have been reported at Ticketmaster U.K.

Risk 65
article thumbnail

When Vendors Open Doors To Cyberattackers

PYMNTS

The findings are troubling: 44 percent of survey respondents said their companies had experienced “a significant, business-altering data breach caused by a vendor.” ” That’s despite the majority (60 percent) of companies surveyed having a third-party policy around data security.

article thumbnail

Back To Basics For SME Security

PYMNTS

Doing so can help a company set controls within the organization as to who can have access to data, conduct background checks on employees and develop company policies for data security. Some are quite technical — like implementing antivirus software or encrypting data — and may require assistance from third-party vendors.

article thumbnail

Facebook Hit With Fine From UK’s Information Commission Over Data Handling

PYMNTS

The data, which was processed from 2007 through 2014, was accessible to developers of third-party vendors without the Facebook users providing consent. Information Commissioner Elizabeth Denham confirmed the action with CNBC, saying that Facebook failed to keep the personal information of its users secure.

article thumbnail

Keeping Third-Party Risk First On The Cybersecurity (Risk) List

PYMNTS

The challenge thus has become one where cybersecurity is not just centered on what must be done internally to protect a company and its customers, said Woodbury, but also to determine how third-party interaction with data is regulated. .

article thumbnail

Wells’ Woes, Stripe’s Acquisition And North Korea’s New Hacking Groove

PYMNTS

We have a huge responsibility and fell short of our ideals for managing and providing oversight of the third-party vendor and our own operations,” Franklin R. Or at least a less frustrating one. Codel, head of consumer lending at Wells Fargo, said in an interview. “We