Premium
Information Security and Cloud‐Based Computing: Tools for the Corporate Treasurer
Author(s) -
Pendley John A.
Publication year - 2015
Publication title -
journal of corporate accounting and finance
Language(s) - English
Resource type - Journals
eISSN - 1097-0053
pISSN - 1044-8136
DOI - 10.1002/jcaf.22031
Subject(s) - hacker , treasury , computer security , malware , information security , cloud computing , jurisdiction , information technology , computer science , business , information security management , cloud computing security , security information and event management , law , political science , operating system
This article describes cybersecurity issues for the financial treasurer. Although job descriptions for corporate treasurers probably don't mention systems and information security, many treasury services are now digitized, which raises the risk of information being compromised by hackers, malware, or computer viruses. In this information technology (IT) environment, treasury officials are increasingly being asked to justify the steps being taken to secure and control the electronic transactions and digitized data under their jurisdiction. This article will help by describing practices and tools available to secure modern financial processing systems from unauthorized access. © 2015 Wiley Periodicals, Inc.