Resources - Blog

Blog

Methods of cyber laundering

Methods of cyber laundering

Cyber laundering can occur in two ways:Instrumental cyber laundering When at least one of the three stages of laundering occurs digitally. Online cyberwashing When all three stages occur digitally.in the case of online cyberwashing, the funds that are used to...

Monitor Plus® and Mobility

Monitor Plus® and Mobility

By: Jorge Domingo Samayoa Jr. Mobility is now an integral component of daily business, from taking notes in a meeting to conducting online banking transactions is nowadays part of our clients' activities....

All for the Experience

All for the Experience

By: Giovanni Castellanos Many people believe that every touch point involves a personal interaction, but this is increasingly distant from reality, since with the incorporation of technology into our daily lives, our activity is done through the use of touch points....

Risk-Based Thinking

Risk-Based Thinking

By: Jorge Diéguez Risk management in institutions (in the financial or non-financial sector) has long ceased to be an issue related to occupational or financial risks and should now be seen as a strategy for the entire financial sector.

Machine Learning

Machine Learning

By: Martín Rago In this 3rd Industrial Revolution, the radical change is that we now have algorithms capable of learning by themselves. We are not only witnessing, but are participants in the 3rd industrial revolution. In the 1st one, human power was replaced by...

Good Corporate Governance Attracts Investors

Good Corporate Governance Attracts Investors

By: Jorge Diéguez Corporate governance is a set of rules and management tools that guide organisations, which must have adequate rules compatible with the characteristics of the company and line of business. The implementation of a corporate...

Machine Learning and Fraud Prevention

Machine Learning and Fraud Prevention

By: Martín Rago The current generation has the rare privilege of living through the biggest change in human history in the business world, here and now: the industrial revolution based on Machine Learning technology. This is the...

Mitigating Threats in Digital Banking

Mitigating Threats in Digital Banking

By: Omar Veliz Digitisation has encouraged banking to change its approach and offer the best services available to its customers. The password era has ended with an estimated 7,858,136,197 of these made available on the black market. How do you know if your...

The Phishing Threat and its Consequences

The Phishing Threat and its Consequences

By: José Ruiz Cybercrime is a US$600 million annual industry that is projected to be worth US$6 trillion in damages by 2021 according to The Cybersecurity Hub. One of the most common forms of this type of crime is phishing, a threat that pretends to...

Summary: FATF Digital Identity Guidance - Relevant Aspects

Summary: FATF Digital Identity Guidance - Relevant Aspects

By: Ilian Vasco The increasing volume of digital transactions, the ubiquity of the internet and the possibility of mass application of digital solutions prompted FATF to offer a guide to better understand how individuals are being targeted and how they are being...

About Cryptoassets and Controls

About Cryptoassets and Controls

By: Ilian Vasco In previous entries, we have discussed the approaches used in different jurisdictions to the treatment of virtual assets. To date, the most popular adoption is a risk-based approach that imposes requirements on the providers of virtual assets....

Digital Fraud in Times of COVID-19

Digital Fraud in Times of COVID-19

By: Álvaro Arzayus In addition to health rules (washing hands, social distancing and quarantine), a new rule of this pandemic should be digital hygiene: be vigilant and wary of online attacks and scams, which have grown in recent years....

Payment Aspects of Financial Inclusion

Payment Aspects of Financial Inclusion

By: Ilian Vasco With the understanding that current accounts should enable (i) end-users to meet most of their payment needs, (ii) securely store some value and (iii) serve as a gateway to access new services....

Test

Testing no more

Say 1, 2, 3, 4