article thumbnail

Steps CIOs should take to protect customer data in Nigeria’s open banking systems

CIO Business Intelligence

The Operational Guidelines for Open Banking in Nigeria published by the CBN stress that customer data security is critical for the safety of the open banking model. The preliminary draft will guide the industry discussion before the final guidelines are put in place by the end of the year.

Banking 119
article thumbnail

Siemens Mobility scales RPA by empowering employees

CIO Business Intelligence

As a result, Siemens Mobility learned that UiPath could help it automate processes involving different software applications, with a focus on SAP integration. “We Ensure you follow best practices and you have programming guideline standards for that,” he says. We weren’t sure whether it would pay off or not,” Bock says. “We

Mobile 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Academic institutions are already losing information and may not realise it

CIO Business Intelligence

For example, academic institutions must comply with strict guidelines for the retention of research data for anywhere from ten to thirty years. Every organisation collects masses of content, none more so than academic institutions.

article thumbnail

Mainframe modernization and the importance of security

CIO Business Intelligence

To better support a hybrid cloud approach to modernizing, businesses can adopt a variety of monitoring tools, improved data storage, and intelligent automation solutions that help IT teams keep track of their data, lighten workloads, and stay on top of regulatory guidelines. Data and Information Security

article thumbnail

Top considerations for data modernization initiatives

CIO Business Intelligence

Businesses today are faced with frequent disruption, shifts in consumer demand, and evolving regulatory guidelines. With highly integrative, agile content management software, they can take on modernization while keeping pace with the realities of a changing business landscape. Data and Information Security

Data 98
article thumbnail

The Importance of an Online Encryption Policy

CTOvision

Though you may have the best IT department in the world and advanced computing resources, if there are no written methodical steps that will serve as guidelines or Standard Operating Procedure (SOP) for computing and data storage, then all these hiring-sprees of IT talents and investments are doomed to fail.

Policies 283
article thumbnail

Bad Cybersecurity Practices: What Would You Add?

SecureWorld News

Eric Goldstein, Executive Assistant Director at CISA, explains the purpose of the list as a way to cut through all the noise around best practices: "There is certainly no lack of standards, practices, control catalogs, and guidelines available to improve an organization’s cybersecurity.