Page 10 - Pay Magazine s2014
P. 10
companies & people
Industry Views: Risky Business
What should payments providers be investing in to protect their systems from hacks or misuse? (cont.)
Cachet continues to employ a proactive and ag- gressive approach to data and security protection. We invest heavily in vulnerability management technology that detects and ags out-of-date and unpatched devices and software. We also employ sophisticated encryption for data at rest and in transport, as well as automated penetration and vulnerability scanning to reduce the time to discover defects, decrease the likelihood of human errors and con rm issue-free results.
—Hunter Wolfe,
senior vice president, sales and operations, Cachet Financial Solutions
Before rms can invest in a solution, they need to identify the problems they’re solving for. The rst, crucial step is a vulnerability threat assessment to determine a rm’s strengths and weaknesses and to identify any existing gaps. The most important invest- ment of time, for any rm, is to work on behavior modi cation within its internal teams and with external partners. Data and cybersecurity awareness is key, and the employee and partner training programs should include a holistic view of information security and proper oversight.
—Andrea Corbine,
senior consultant, SightSpan Inc.
Flexibility. Personalizaaon. EMV On-Demand.
You really can have it all.
8