Connect with us

Top Stories

SONICWALL UNVEILS NEXT-GENERATION EMAIL SECURITY WITH CAPTURE ADVANCED THREAT PROTECTION TO ADDRESS ZERO-DAY AND ADVANCED THREATS

Published

on

SONICWALL UNVEILS NEXT-GENERATION EMAIL SECURITY WITH CAPTURE ADVANCED THREAT PROTECTION TO ADDRESS ZERO-DAY AND ADVANCED THREATS
  • SonicWall enhances its security portfolio, introducing innovations in email security and next-generation firewall solutions to protect against the newest threats in 2017.
  • SonicWall Email Security 9.0 with Capture Advanced Threat Protection Service provides comprehensive next-generation email security protection to prevent ransomware and emerging zero-day attacks.
  • The Email Security portfolio is available for enterprises and managed service providers as a hardware appliance, a hardened virtual appliance, software and as a hosted cloud service.
  • SonicOS 6.2.7 preview delivers enhanced breach prevention capabilities, a new threat API, more scalability and connectivity, and ease of management.

SonicWall, the trusted security partner protecting more than a million business networks worldwide, today announced new next-generation email security platform and firewall operating system capabilities for enhanced breach prevention against ransomware, zero-day and advanced threats. SonicWall Email Security 9.0 now integrates with Capture Advanced Threat Protection (ATP) Service to deliver a cloud-based, multi-engine sandbox that not only inspects email traffic for suspicious code, but also blocks malicious files from entering the network until a verdict is reached. SonicWall also unveiled a preview of SonicOS 6.2.7 operating system, delivering better breach prevention, a new threat Application Program Interface (API), more scalability and connectivity, and ease of management.

SonicWall Addresses the Cyber Arms Race with Continuous Innovation in its Portfolio

According to the 2017 SonicWall Annual Threat Report released this week, organisations are facing an onslaught of new security challenges. According to the SonicWall Global Response Intelligence Defense (GRID) Threat Network, the growth in ransomware attack attempts grew by 167x year-over-year to 638 million in 2016. SonicWall has a track record of introducing continuous cybersecurity innovations to provide defence-in-depth protection against these pervasive threats, such as its award-winning cloud-based, multi-engine Capture ATP Service introduced last year.

“Our 2017 SonicWall Annual Threat Report found that email remains a highly successful attack vector for cyber criminals because it’s all too easy for employees to fall victim to ransomware, phishing and unknown threats,” said Bill Conner, president and CEO, SonicWall. “SonicWall is enabling customers to stay one step ahead of cyber criminals by bolstering our platform with innovations that inspect and render a verdict on all email coming into and going out of their organisations, while keeping performance and usability high.”

SonicWall Email Security 9.0 Delivers Advanced Threat Protection

SonicWall Email Security 9.0 with Capture ATP Service utilises cloud-based sandboxing technology to detect advanced threats by scanning a range of email attachment types, analysing them in a multi-engine sandbox, blocking them until reviewed by an administrator, and rapidly deploying remediation signatures. Signatures for newly discovered malware are quickly generated and automatically distributed across the SonicWall GRID Threat Network, thereby preventing further infiltration by the identified malware threat. Organisations have a choice of administrative options ranging from removing an offending email attachment to blocking an entire message, leading to higher security effectiveness and faster response times.

Additional features of SonicWall Email Security 9.0 include:

  • Advanced Threat Protection: The solution incorporates anti-spam, anti-virus and anti-spoofing functionalities to not only detect and prevent spam and other unwanted email, but also scan email messages and attachments for ransomware, Trojan horses, worms and other types of malicious content.
  • Improved Office 365 Support: Office 365 customers can enhance their security by enabling SonicWall Hosted Email Security protection.
  • Updated Line of Appliances: SonicWall is refreshing its line of hardware appliances to help customers better face threats delivered by email.
  • Encryption Protection: In addition to supporting SMTP Authentication, the encryption service feature enables any email identified as containing protected data to be automatically encrypted, routed for approval or archived.
  • Policy and Compliance Management: The policy management feature enables an administrator to enact policies that filter messages and their contents as they enter or exit the organisation. This allows organisations to meet regulatory requirements based on government legislation, industry standards or corporate governance activities.

“SonicWall Email Security featuring Capture ATP Service will further protect customers worldwide against known and unknown threats while defending against data leaks and compliance violations,” Conner said. “As an independent cybersecurity company, SonicWall is persevering to help protect customers in today’s cyber arms race by integrating Capture ATP Service across the portfolio.”

SonicOS 6.2.7 Preview Demonstrates Enhanced Breach Prevention and Simplified Management

As attack methods evolve frequently, it is difficult for IT teams to ensure organisations are operating at optimal efficiencies and consistencies, while also meeting changing network security requirements. To address these network security challenges, the company is previewing SonicOS 6.2.7 which provides enhanced breach prevention, a new threat API, improved scalability and connectivity while simplifying management to ensure small businesses and large distributed enterprises receive a high quality-of-service level, increased on-demand capacity and connectivity and better security.

Additional new features of SonicOS 6.2.7 will include:

  • Deep Packet Inspection of Secure Socket Shell (DPI-SSH): Detects and prevents advanced encrypted attacks that leverage SSH, blocks encrypted malware downloads, ceases the spread of infections, and thwarts command and control communications and data exfiltration.
  • Threat API: Designed to ingest any and all proprietary, original equipment manufacturer and third-party intelligence feeds to combat advanced threats such as zero-day, malicious insider, compromised credentials, ransomware and advanced persistent threats.
  • Biometric Authentication: Supports mobile device authentication such as fingerprint recognition that cannot be easily duplicated or shared to securely authenticate the user identity for network access.
  • Dell X-Series Switch Extensibility: For large distributed network infrastructures with massive capacity and connectivity requirements, SonicWall has extended its Dell X-Series integration by doubling the switch and port counts under firewall management. This gives organisations enhanced network security flexibility and scalability to adapt to service-level increases and ensures that network services and resources are available and protected when the capacity grows without having to upgrade the firewall system.
  • Easy VPN: Designed to simplify and reduce complex distributed firewall deployment down to a trivial effort by automating the initial site-to-site VPN gateway provisioning while security and connectivity occurs instantly and automatically.

“As a loyal SonicWall channel partner, we at Napa Valley Networks were thrilled to see SonicWall resume operations as a standalone cybersecurity company and go back to its roots of driving a deeper focus on technological innovation,” said Julie Neely, founding partner of Napa Valley Networks. “SonicWall Email Security 9.0 with Capture Advanced Threat Protection Service and the SonicOS 6.2.7 preview are clear demonstrations of the company’s continued commitment to better serving its channel partners.”

“At Sterling Computers, our mission is to help government and education customers get the most out of their tech infrastructure,” said Steve Van Ginkel, vice president of Business Development & Partner Alliances at Sterling Computers. “With the continued onslaught of ransomware, malware and other cyber-attacks, our customers are looking to us to provide them with solutions that allow them to spend more time conducting day-to-day business while staying abreast of the threat landscape. SonicWall allows our engineers, and most importantly our customers, to sleep at night!”

Availability & Pricing

  • SonicWall Email Security 9.0 with Capture ATP Service will be available worldwide on February 28, 2017. Leveraging a highly-scalable and redundant architecture, SonicWall Email Security offers an array of deployment options, including on-premises appliances, virtual machine, software and cloud-hosted solutions. Pricing for Hosted Email Security starts at $20 per user per year, and Capture for Hosted Email Security will run an additional $4 per user per year.
  • SonicOS 6.2.7 is currently in beta and will be generally available for download via com to partners and customers worldwide in late Q1. Available with SonicOS Standard Support contracts, including software and firmware updates, pricing will start at $78 per year.

Top Stories

To take the nation’s financial pulse, we must go digital

Published

on

To take the nation’s financial pulse, we must go digital 1

By Pete Bulley, Director of Product, Aire

The last six months have brought the precarious financial situation of many millions across the world into sharper focus than ever before. But while the figures may be unprecedented, the underlying problem is not a new one – and it requires serious attention as well as  action from lenders to solve it.

Research commissioned by Aire in February found that eight out of ten adults in the UK would be unable to cover essential monthly spending should their income drop by 20%. Since then, Covid-19 has increased the number without employment by 730,000 people between July and March, and saw 9.6 million furloughed as part of the job retention scheme.

The figures change daily but here are a few of the most significant: one in six mortgage holders had opted to take a payment holiday by June. Lenders had granted almost a million credit card payment deferrals, provided 686,500 payment holidays on personal loans, and offered 27 million interest-free overdrafts.

The pressure is growing for lenders and with no clear return to normal in sight, we are unfortunately likely to see levels of financial distress increase exponentially as we head into winter. Recent changes to the job retention scheme are signalling the start of the withdrawal of government support.

The challenge for lenders

Lenders have been embracing digital channels for years. However, we see it usually prioritised at acquisition, with customer management neglected in favour of getting new customers through the door. Once inside, even the most established of lenders are likely to fall back on manual processes when it comes to managing existing customers.

It’s different for fintechs. Unburdened by legacy systems, they’ve been able to begin with digital to offer a new generation of consumers better, more intuitive service. Most often this is digitised, mobile and seamless, and it’s spreading across sectors. While established banks and service providers are catching up — offering mobile payments and on-the-go access to accounts — this part of their service is still lagging. Nowhere is this felt harder than in customer management.

Time for a digital solution in customer management

With digital moving higher up the agenda for lenders as a result of the pandemic, many still haven’t got their customer support properly in place to meet demand. Manual outreach is still relied upon which is both heavy on resource and on time.

Lenders are also grappling with regulation. While many recognise the moral responsibility they have for their customers, they are still blind to the new tools available to help them act effectively and at scale.

In 2015, the FCA released its Fair Treatment of Customers regulations requiring that ‘consumers are provided with clear information and are kept appropriately informed before, during and after the point of sale’.

But when the individual financial situation of customers is changing daily, never has this sentiment been more important (or more difficult) for lenders to adhere to. The problem is simple: the traditional credit scoring methods relied upon by lenders are no longer dynamic enough to spot sudden financial change.

The answer lies in better, and more scalable, personalised support. But to do this, lenders need rich, real-time insight so that lenders can act effectively, as the regulator demands. It needs to be done at scale and it needs to be done with the consumer experience in mind, with convenience and trust high on the agenda.

Placing the consumer at the heart of the response

To better understand a customer, inviting them into a branch or arranging a phone call may seem the most obvious solution. However, health concerns mean few people want to see their providers face-to-face, and fewer staff are in branches, not to mention the cost and time outlay by lenders this would require.

Call centres are not the answer either. Lack of trained capacity, cost and the perceived intrusiveness of calls are all barriers. We know from our own consumer research at Aire that customers are less likely to engage directly with their lenders on the phone when they feel payment demands will be made of them.

If lenders want reliable, actionable insight that serves both their needs (and their customers) they need to look to digital.

Asking the person who knows best – the borrower

So if the opportunity lies in gathering information directly from the consumer – the solution rests with first-party data. The reasons we pioneer this approach at Aire are clear: firstly, it provides a truly holistic view of each customer to the lender, a richer picture that covers areas that traditional credit scoring often misses, including employment status and savings levels. Secondly, it offers consumers the opportunity to engage directly in the process, finally shifting the balance in credit scoring into the hands of the individual.

With the right product behind it, this can be achieved seamlessly and at scale by lenders. Pulse from Aire provides a link delivered by SMS or email to customers, encouraging them to engage with Aire’s Interactive Virtual Interview (IVI). The information gathered from the consumer is then validated by Aire to provide the genuinely holistic view of a consumer that lenders require, delivering insights that include risk of financial difficulty, validated disposable income and a measure of engagement.

No lengthy or intrusive phone calls. No manual outreach or large call centre requirements. And best of all, lenders can get started in just days and they save up to £60 a customer.

Too good to be true?

This still leaves questions. How can you trust data provided directly from consumers? What about AI bias – are the results fair? And can lenders and customers alike trust it?

To look at first-party misbehaviour or ‘gaming’, sophisticated machine-learning algorithms are used to validate responses for accuracy. Essentially, they measure responses against existing contextual data and check its plausibility.

Aire also looks at how the IVI process is completed. By looking at how people complete the interview, not just what they say, we can spot with a high degree of accuracy if people are trying to game the system.

AI bias – the system creating unfair outcomes – is tackled through governance and culture. In working towards our vision of a world where finance is truly free from bias or prejudice, we invest heavily in constructing the best model governance systems we can at Aire to ensure our models are analysed systematically before being put into use.

This process has undergone rigorous improvements to ensure our outputs are compliant by regulatory standards and also align with our own company principles on data and ethics.

That leaves the issue of encouraging consumers to be confident when speaking to financial institutions online. Part of the solution is developing a better customer experience. If the purpose of this digital engagement is to gather more information on a particular borrower, the route the borrower takes should be personal and reactive to the information they submit. The outcome and potential gain should be clear.

The right technology at the right time?

What is clear is that in Covid-19, and the resulting financial shockwaves, lenders face an unprecedented challenge in customer management. In innovative new data in the form of first-party data, harnessed ethically, they may just have an unprecedented solution.

Continue Reading

Top Stories

The Future of Software Supply Chain Security: A focus on open source management

Published

on

The Future of Software Supply Chain Security: A focus on open source management 2

By Emile Monette, Director of Value Chain Security at Synopsys

Software Supply Chain Security: change is needed

Attacks on the Software Supply Chain (SSC) have increased exponentially, fueled at least in part by the widespread adoption of open source software, as well as organisations’ insufficient knowledge of their software content and resultant limited ability to conduct robust risk management. As a result, the SSC remains an inviting target for would-be attackers. It has become clear that changes in how we collectively secure our supply chains are required to raise the cost, and lower the impact, of attacks on the SSC.

A report by Atlantic Council found that “115 instances, going back a decade, of publicly reported attacks on the SSC or disclosure of high-impact vulnerabilities likely to be exploited” in cyber-attacks were implemented by affecting aspects of the SSC. The report highlights a number of alarming trends in the security of the SSC, including a rise in the hijacking of software updates, attacks by state actors, and open source compromises.

This article explores the use of open source software – a primary foundation of almost all modern software – due to its growing prominence, and more importantly, its associated security risks. Poorly managed open source software exposes the user to a number of security risks as it provides affordable vectors to potential attackers allowing them to launch attacks on a variety of entities—including governments, multinational corporations, and even the small to medium-sized companies that comprise the global technology supply chain, individual consumers, and every other user of technology.

The risks of open source software for supply chain security

The 2020 Open Source Security and Risk Analysis (OSSRA) report states that “If your organisation builds or simply uses software, you can assume that software will contain open source. Whether you are a member of an IT, development, operations, or security team, if you don’t have policies in place for identifying and patching known issues with the open source components you’re using, you’re not doing your job.”

Open source code now creates the basic infrastructure of most commercial software which supports enterprise systems and networks, thus providing the foundation of almost every software application used across all industries worldwide. Therefore, the need to identify, track and manage open source code components and libraries has risen tremendously.

License identification, patching vulnerabilities and introducing policies addressing outdated open source packages are now all crucial for responsible open source use. However, the use of open source software itself is not the issue. Because many software engineers ‘reuse’ code components when they are creating software (this is in fact a widely acknowledged best practice for software engineering), the risk of those components becoming out of date has grown. It is the use of unpatched and otherwise poorly managed open source software that is really what is putting organizations at risk.

Emile Monette

Emile Monette

The 2020 OSSRA report also reveals a variety of worrying statistics regarding SSC security. For example, according to the report, it takes organisations an unacceptably long time to mitigate known vulnerabilities, with 2020 being the first year that the  Heartbleed vulnerability was not found in any commercial software analyzed for the OSSRA report. This is six years after the first public disclosure of Heartbleed – plenty of time for even the least sophisticated attackers to take advantage of the known and publicly reported vulnerability.

The report also found that 91% of the investigated codebases contained components that were over four years out of date or had no developments made in the last two years, putting these components at a higher risk of vulnerabilities. Additionally, vulnerabilities found in the audited codebases had an average age of almost 4 ½ years, with 19% of vulnerabilities being over 10 years old, and the oldest vulnerability being a whopping 22 years old. Therefore, it is clear that open source users are not adequately defending themselves against open source enabled cyberattacks. This is especially concerning as 99% of the codebases analyzed in the OSSRA report contained open source software, with 75% of these containing at least one vulnerability, and 49% containing high-risk vulnerabilities.

Mitigating open source security risks

In order to mitigate security risks when using open source components, one must know what software you’re using, and which exploits impact its vulnerabilities. One way to do this is to obtain a comprehensive bill of materials from your suppliers (also known as a “build list” or a “software bill of materials” or “SBOM”). Ideally, the SBOM should contain all the open source components, as well as the versions used, the download locations for all projects and dependencies, the libraries which the code calls to, and the libraries that those dependencies link to.

Creating and communicating policies

Modern applications contain an abundance of open source components with possible security, code quality and licensing issues. Over time, even the best of these open source components will age (and newly discovered vulnerabilities will be identified in the codebase), which will result in them at best losing intended functionality, and at worst exposing the user to cyber exploitation.

Organizations should ensure their policies address updating, licensing, vulnerability management and other risks that the use of open source can create. Clear policies outlining introduction and documentation of new open source components can improve the control of what enters the codebase and that it complies with the policies.

Prioritizing open source security efforts

Organisations should prioritise open source vulnerability mitigation efforts in relation to CVSS (Common Vulnerability Scoring System) scores and CWE (Common Weakness Enumeration) information, along with information about the availability of exploits, paying careful attention to the full life cycle of the open source component, instead of only focusing on what happens on “day zero.” Patch priorities should also be in-line with the business importance of the asset patched, the risk of exploitation and the criticality of the asset. Similarly, organizations must consider using sources outside of the CVSS and CWE information, many of which provide early notification of vulnerabilities, and in particular, choosing one that delivers technical details, upgrade and patch guidance, as well as security insights. Lastly, it is important for organisations to monitor for new threats for the entire time their applications remain in service.

Continue Reading

Top Stories

On the Frontlines of Fraud: Tactics for Merchants to Protect Their Businesses

Published

on

On the Frontlines of Fraud: Tactics for Merchants to Protect Their Businesses 3

By Nicole Jass, Senior Vice President of Small Business and Fraud Products at FIS

Fraud isn’t new, but the new realities brought by COVID-19 for merchants, and the rising tide of attacks have changed the way we need to approach the fight. Even before the pandemic broke out earlier this year, the transition to digital payments was well underway, which means fighting fraud needs a multilayered, multi-channel approach. Not only do you want to increase approval rates, you want to protect your revenue and stop fraud before it happens.

A great place to start is working with your payment partners to refresh your company’s fraud strategies with emerging top three best practices:

  1. AI-based machine learning fraud solutions helps your business stay ahead of fraud trends. Leveraging data profiles to model both “good” and “bad” behavior helps find and reduce fraud. AI-based machine learning will be increasingly essential to stay ahead of the explosive and sophisticated eCommerce fraud.
  2. Increasing capabilities around device fingerprinting and behavioral data are essential to detect fraud before it happens. While much of the user-input values can be easily manipulated to look more authentic, device fingerprinting and behavioral data are captured in the background to derive unique details from the user’s device and behavior. Bringing in more unique elements into decisioning, can help authenticate the users and determine the validity of the transactions.
  3. Prioritize user authentication. User authentication is a vital linchpin in any fraud defense and should receive even greater priority today. Setting strong password requirements and implementing multi-factor authentication helps curb fraud attacks from account takeover.

As well as working with your payment partners it’s more critical than ever to protect online transactions while not jeopardizing legitimate purchases. Fortunately, there are a few things you can do right now to address these concerns:

  1. Monitor warning signs

Payment verification is an important part of protecting your business. There are a variety of strategies to employ including implementing technology utilizing artificial intelligence and machine learning to help catch certain patterns. In addition to technology, here are a few other tips that may serve as warning signs. These are not a guarantee fraud is occurring, but they are flags to investigate.

o   The shipping address and billing address differ

o   Multiple orders of the same item

o   Unusually large orders

o   Multiple orders to the same address with different cards

o   Unexpected international orders

  1. Require identity verification

Finding a balance between protection and ease of purchase will ultimately help you protect your customers and your business. The following tactics can make it more difficult for fraudsters to be successful:

o   For customers that have a login, require a minimum of eight characters as well as the use of special characters in your customers’ passwords

o   Set up Two-Factor Authentication that requires a One-time Passcode (OTP) via SMS or email

o   Use biometric authentication for mobile purchases or logins

  1. Monitor chargebacks

Keeping good records is essential for eCommerce. If a customer initiates a dispute, your only available recourse is to provide proof that the order was fulfilled. Be prepared to provide all the supporting information about a disputed transaction. Worldpay’s Disputes solutions can connect to your CRM and provide you dual-layer protection against friendly fraud, first deflecting them before they arise and then fully managing chargeback defenses on your behalf.

  1. Monitor declines

Credit card issuers mitigate fraud by automatically declining payments that look suspicious, based on unusual card activity such as drastic changes in spending patterns or uncommon geolocations of spending. You can check your own declined payment history to help spot a potential problem. When volumes increase, the help of a payments fraud management partner is beneficial.

  1. Protect your own wallet

While you take the steps to protect your business, it’s also important to be mindful of your own protection—it’s incumbent on all responsible consumers to be vigilant about their data. Whether it’s simple awareness of how the fraudsters are operating today, sticking to trusted brands when shopping online, and thinking twice about what data you share and who you share it with, you’ll soon see how often you are sharing personal information about yourself.

Continue Reading
Editorial & Advertiser disclosureOur website provides you with information, news, press releases, Opinion and advertorials on various financial products and services. This is not to be considered as financial advice and should be considered only for information purposes. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third party websites, affiliate sales networks, and may link to our advertising partners websites. Though we are tied up with various advertising and affiliate networks, this does not affect our analysis or opinion. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you, or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish sponsored articles or links, you may consider all articles or links hosted on our site as a partner endorsed link.

Call For Entries

Global Banking and Finance Review Awards Nominations 2020
2020 Global Banking & Finance Awards now open. Click Here

Latest Articles

Why cybercriminals have ‘Gone Vishing’ during the COVID-19 Pandemic 4 Why cybercriminals have ‘Gone Vishing’ during the COVID-19 Pandemic 5
Business2 hours ago

Why cybercriminals have ‘Gone Vishing’ during the COVID-19 Pandemic

More than 215,000 vishing attempts in the last year alone As new coronavirus restrictions look set to confine much of...

Risk Mitigation vs. Risk Avoidance: Why FIs Need to Maintain Risk Appetite and Not Place All Bets on De-Risking 6 Risk Mitigation vs. Risk Avoidance: Why FIs Need to Maintain Risk Appetite and Not Place All Bets on De-Risking 7
Finance3 hours ago

Risk Mitigation vs. Risk Avoidance: Why FIs Need to Maintain Risk Appetite and Not Place All Bets on De-Risking

De-risking aims to protect financial institutions from the increasing pressures placed by regulators and threats, associated with clients operating in...

Using AI to identify public sector fraud 8 Using AI to identify public sector fraud 9
Technology6 hours ago

Using AI to identify public sector fraud

When it comes to audits in the public sector, both accountability and transparency are essential. Not only is the public...

Five golden rules of recruitment 10 Five golden rules of recruitment 11
Business6 hours ago

Five golden rules of recruitment

Former investment banker and entrepreneur, Connie Nam, discusses five ways in which basing your recruitment process around understanding a candidate’s...

Using data analytics to improve SME cash flow and treasury management 13 Using data analytics to improve SME cash flow and treasury management 14
Business7 hours ago

Using data analytics to improve SME cash flow and treasury management

The pressure facing SMEs this year is widely known, and they are looking for ways to improve their cash flow...

Why dependency on SMS OTPs should not be the universal solution 15 Why dependency on SMS OTPs should not be the universal solution 16
Technology7 hours ago

Why dependency on SMS OTPs should not be the universal solution

By Chris Stephens, Head of Banking Solutions at Callsign In our day-to-day lives, SMS one-time passwords, also known as OTPs, have...

The chosen one 17 The chosen one 18
Business8 hours ago

The chosen one

By Jesse Swash, Co-Founder Design by Structure. The lessons for the future lie in the past. The same truths still hold. This time...

How PR can help franchise businesses emerge stronger from 2020 19 How PR can help franchise businesses emerge stronger from 2020 20
Business8 hours ago

How PR can help franchise businesses emerge stronger from 2020

By Mimi Brown, Head of Entrepreneurs & Business at The PHA Group A second wave of coronavirus is gathering pace...

Cash and digital payments – a balancing act to aid financial inclusion 21 Cash and digital payments – a balancing act to aid financial inclusion 22
Finance9 hours ago

Cash and digital payments – a balancing act to aid financial inclusion

By Matthew Jackson, Head of Partner Development, EMEA at PPRO The cashless debate is one that continues to spark both conversation...

Research exposes the £68.8 billion opportunity for UK retailers 23 Research exposes the £68.8 billion opportunity for UK retailers 24
Business3 days ago

Research exposes the £68.8 billion opportunity for UK retailers

Modelling shows increasing the proportion of online sales by 5 percentage points would have significantly boosted retailers’ revenues during the...

Newsletters with Secrets & Analysis. Subscribe Now