What does Facebook Know About You? Besides Everything.

Posted by James on 6/12/19 11:15 AM

Big brother is watching you. This scary motto of George Orwell’s novel still disturbs the minds of our contemporaries, although it’s been almost 70 years since the book was published. And there’s a good reason behind the strong emotions caused by the story as nowadays it’s as close as ever to the reality and your favorite social media has made a huge contribution to that.

 

Facebook knows everything about you

 

Unlike Orwell’s vision, the reality proved to be much simpler. There are no cameras installed in every corner to spy on you. In the era of total globalization and tons of convenient services available on the web, we provide these services with our private information ourselves.

Read More

Topics: gdpr, hacks, Cybersecurity

Facebook Doesn't Seem to do Much to Earn our Trust

Posted by James on 5/8/19 10:40 AM

One of our favorite social media giants with whom we seem to have a love-hate relationship is back in the news as they are on the receiving end of a lawsuit by the attorney general from Washington, D.C. It seems as if they are always in and out of the public eye with some scandal or another. While they are holding true to their goal of connecting people, sometimes they do it a little too well—and at what expense? It’s becoming a little too common that they don’t quite have honesty as a top priority in terms of communicating and upholding the privacy policy governing their users’ personal data. Is their mantra not actually build community and bring the world closer together? Maybe it’s profit over privacy. This has gone so overboard it may be time for a breakup.

Read More

Topics: gdpr, Data ownership, Cybersecurity

The Marriott Hack: Looking Back

Posted by Kelvin Chandran on 4/17/19 4:38 AM

Hacks seem to be showing up in the news right and left. A hack is an intentional attack on a system to get access to private information that the attackers are not supposed to have access to. They can be carried out by a single person or a group of people. Some hacks require skill, and some not so much. The best route of action for cyber-attackers, though, is looking for weaknesses in systems so they can be exploited—a weakness resulting from human negligence. It’s information that is left unsecured enabling third parties to see it if they wanted to. What kind of data a hacker wants and what he or she wants to do with it will generally define who their lucky victim is going to be.

Read More

Topics: News, Blockchain technology, Fraud prevention, gdpr

Who Needs to Abide By AML/CFT Regulations in New Zealand?

Posted by Kelvin Chandran on 3/20/19 11:58 AM

Anti-money laundering (AML) regulations have played an important role in shaping the continued development of the international financial system in past decades. In recent years, the types of businesses that need to comply with these regulations have been expanding as governments aim to better prevent financial crimes.

Read More

Topics: AML, CFT, New Zealand

AML Obligations and FATF– What You Should Be Doing to Reduce Fraud

Posted by Kelvin Chandran on 3/13/19 3:13 PM

When considering the various regulations surrounding cryptocurrency, it’s sometime difficult for organisations and individuals to keep up. At local, provincial, and national levels, there are all sorts of policies that apply to companies (i.e. crypto projects and crypto exchanges) that are operating in this sector.

Read More

Topics: AML, Fraud prevention, FATF

Facial Recognition Software for Citizen Security

Posted by Kelvin Chandran on 3/4/19 10:28 AM

Advancements in biometric security solutions like facial recognition technology have led governments and organisations alike to utilise this technology.

Read More

Topics: Data ownership, Digital identity

How Secure Is Facial Recognition Technology?

Posted by Kelvin Chandran on 2/21/19 10:30 AM

Facial recognition and other biometrics technologies have gained massive adoption from a wide range of companies in the past few years. In this article, we'll examine how these technologies work. Then, we'll look at some current real-world applications as well as the risks and benefits for individuals and organisations.

Read More

Topics: Data ownership, Digital identity

A Guide to KYC for FinTech Startups

Posted by Kelvin Chandran on 2/18/19 11:56 AM

Launching any startup involves a lot of challenges and opportunities. Businesses in the FinTech sector have to think about all sorts of metrics: customer acquisition costs, churn, monthly cash burn rates, and many other factors.

Read More

Topics: KYC, FinTech

Using Digital Identities to Streamline Customer Onboarding

Posted by Kelvin Chandran on 2/15/19 11:18 AM

Although you might think that customer onboarding in the digital era would be much easier than a few decades ago, there are numerous potential hurdles for organisations to consider.

Read More

Topics: RegTech, Customer onboarding

SingleSource nominated as Top 10 KYC Solution Providers 2018 by Banking CIO Outlook

Posted by Christelle Blanchet-Aissaoui on 1/24/19 10:55 AM

For organisations, know your customer (KYC) is all about finding efficient ways to prove that potential customers are who they say they are. Organisations need secure and reliable information to ensure they are providing accurate services to their customers. For individuals, they want more ownership of their data and simple onboarding processes to ensure an exceptional customer experience occurs and trust is developed. Between this, an effective KYC solution should be in place to ensure these transactions between organisation and customer are secure and frictionless.

Read More

Topics: News

Recent Posts

Subscribe here