Connect with us

Cyber Security

Certified Information Systems Auditor (CISA)

Published

on

Certified Information Systems Auditor
Certified Information Systems Auditor

Certified Information Systems Auditor (CISA)- ISACA is the organisation that administers the Certified Information Systems Auditor (CISA) credential. The Knowledge Systems Audit and Control Association (ISACA) was founded in 1969 by a group of experts who saw a need for a centralised source of information and assistance in the then-new field of electronic data processing audits. It now has 145,000 members in 180 countries. They connect 460,000 engaged information and cybersecurity professionals and serve as a resource for them.

The CISA, CRISC, CISM, CGEIT, CSX-P, and CDPSE are among ISACA’s professional certificates. Each of these qualifications gives practitioners of various parts of information systems legitimacy, such as:

The aim and usefulness of the CISA certification will be examined in this tutorial. CISA stands for Certified Information Systems Auditor, and we’ll go over the criteria, fees, and benefits of this professional qualification. The material in this guide can assist candidates in determining the value of acquiring a CISA and determining if it is the best certification for their career path.

According to ISACA, this certification is held by over 151,000 professionals, and the CISA is accredited under ISO/IEC 17024:2012 – General requirements for entities operating certification of persons. Within the information systems world, it is widely acknowledged as a means of indicating the holder’s expertise and talents.

Table of Contents

What does it mean to be a Certified Information Systems Auditor (CISA)?

The CISA is intended to demonstrate knowledge for people who audit, control, monitor, and assess their organization’s information technology and business systems on a regular basis.

A CISA certification implies knowledge of the following areas of work:

  • Information systems auditing process
  • Governance and management of IT
  • Information systems acquisition, development, and implementation
  • Information systems operations and business resilience
  • Protection of information assets

For many IT workers, acquiring a CISA credential is easily justifiable due to high salaries and an above-average predicted job growth rate.

The CISA is difficult to earn due to a difficult exam and required work experience. Nonetheless, the popularity of this certification indicates that many IT audit, security, and control professionals are capable of earning it.

IS/IT auditors’ major responsibility is to prevent fraud, waste, and non-compliance. They also conduct research and provide findings to the C-suite.

Here are a few examples of common CISA jobs:

What are CISA Requirements?

A candidate for the CISA must have five or more years of experience in an IS/IT audit, control, assurance, or security job, in addition to completing the CISA exam. They must also agree to follow a set of professional ethics. For a maximum of three years, experience waivers are available.

The professional code of ethics covers the following seven points:

  • Support the establishment of appropriate standards and processes for the effective governance and management of enterprise information systems and technology, including audit, control, security, and risk management, and encourage adherence to them.
    Carry out their responsibilities with objectivity, care, and professionalism in accordance with professional norms.
  • Serve in the best interests of stakeholders while adhering to the law, maintaining high standards of conduct and character, and not bringing their profession or the Association into disrepute.
  • Unless compelled by legal authority, maintain the privacy and confidentiality of information gathered in the course of their activities. This information will not be used for personal gain or disclosed to unsuitable parties.
  • Maintain proficiency in their particular disciplines and commit to engage in only those tasks that they may fairly anticipate to execute with the skills, knowledge, and competence required.
  • Inform appropriate parties of the results of work completed, including the disclosure of all critical facts known to them that, if not revealed, could skew the results reporting.
    Support stakeholders’ professional education in order to improve their awareness of enterprise information systems and technology governance and management, including audit, control, security, and risk management.

How Much Does Obtaining a CISA Certification Cost?

Exam fees are determined by your membership status at the time you register for the exam. Nonmembers pay $760.00, while ISACA members pay $575.00.

Of course, the total cost of studying for a CISA certification would differ depending on the candidate’s expertise and expertise. An instructor-led course can help a candidate with a minimal of practical knowledge and competence prepare for the exam. A more experienced candidate, on the other hand, may merely need to brush up using the ISACA self-paced exam prep option.

A 12-month subscription to interactive, customisable sample examinations is included in the self-paced exam prep solution. These practise examinations are based on a database of over 1,000 questions. This subscription costs $299.00 for ISACA members and $399.00 for nonmembers.

An online review course is also offered, which includes video training sessions on demand, interactive modules and workbooks, case study assignments, and evaluations. Candidates who choose this option will have access to an online discussion board where they can ask questions. The subscription charge for this 22-hour, 365-day course is $795.00 for members and $895.00 for nonmembers.

Other expenses related to studying for the CISA exam include study materials. The official CISA Review Manual, as well as other publications hand-picked for their usefulness in helping CISA candidates prepare for exam day. The printed or eBook versions will set you back approximately $110.

Candidates can choose between virtual instructor-led or in-person training and conferences for instructor-led exam prep. These courses can cost anything from $1,000 for virtual instructor-led workshops to $1,400.00 for in-person classes. A tailored on-site service is available for large business groups.

The cost of keeping a CISA certification is also an ongoing expense. A CISA certification holder must get a minimum of 20 hours of Continuing Professional Education (CPE) credits each year and 120 hours during a three-year reporting cycle period to maintain their certification. In addition, a yearly maintenance charge of $45 for ISACA members and $85 for nonmembers is required.

There are soft expenses to consider in addition to the expenditures connected with training courses and materials. Preparing for the exam will necessitate sacrifice, and such soft costs should be factored into the total cost-benefit analysis. Nonetheless, the better salaries and expanded employment options obtained by CISA members indicate that earning the certification will almost always pay off.

Deep Dive into the CISA exam

ISACA offers a CISA practise quiz so that candidates can test their readiness for the test. A candidate guide for the exam can be downloaded. It contains important information about eligibility and the exam process.

The CISA certification test, which is available in eleven languages, consists of 150 multiple-choice questions that cover the exam subject outline prepared using the most recent exam content analysis. The exam can take up to 4 hours to complete.

DOMAINS OF THE CISA JOB PRACTICE AREAS WEIGHT
Domain 1: Information System Auditing Process 21%
Domain 2: Governance and Management of IT 17%
Domain 3: Information Systems Acquisition, Development and Implementation 12%
Domain 4: Information Systems Operations and Business Resilience 23%
Domain 5: Protection of Information Assets 27%
  • Information system auditing process

This area include executing risk-based IS audit methods, adhering to correct IS audit standards, successfully conveying audit results and suggestions, and following up.

  • Governance and management of IT

The efficiency of the IT governance structure and IT strategy are discussed here. This domain also looks at IT human resources, business continuity planning, and catastrophe recovery.

  • Information systems acquisition, development and implementation

This subject includes selecting IT suppliers and negotiating contracts that ensure optimal service levels. Subjects such as feasibility studies, business cases, total cost of ownership, and return on investment are all tested. Domain 3 also includes project management and risk management, project requirements analysis, success criteria, and post-implementation difficulties.

  • Information systems operations and business resilience

Knowledge of service management practises, enterprise architecture, systems resiliency, control mechanisms, and performance monitoring is included in this domain. Data backup, database management, data lifecycle management, incident management methods, and disaster recovery testing are all covered.

  • Protection of information assets

This domain’s topics revolve around the security of information technology assets. They have to do with data security, physical and environmental controls, and material verification in terms of confidentiality, integrity, and availability.

Candidate exam scores are reported as a scaled score, which is the result of converting a candidate’s raw exam score to a standard scale. The goal of a scaled score is to ensure that a consistent method of reporting results is utilised throughout different versions of the exam, ensuring that they are comparable and fair.

ISACA employs and reports a standard scale of 200 to 800 points.

  • A perfect score of 800 indicates that all questions were answered properly.
  • A score of 200 is the lowest attainable and indicates that just a tiny percentage of questions were successfully answered.
  • To pass the exam, a candidate must achieve a score of 450 or higher, which reflects the minimum level of knowledge.
  • If all other requirements are completed, a candidate who receives a passing score can apply for certification.

CISA Salary Information

CISA is frequently cited as one of the most sought-after and well-paid IT certifications. Assuming that job growth predictions are met, the picture for future employment is bright.

Rank and file accountants and auditors may expect to make over $70,000 a year and have a job growth rate of approximately 4%, according to the US Bureau of Labor Statistics. Managers of computer and information systems, on the other hand, earn over $150,000 a year and should expect a 10% job growth rate.

According to ISACA, CISA holders earn an average of $110,000 a year. This is significantly higher than the national average for accountants and auditors.

Final Thoughts

If you work as an IT auditor or want to work as one, obtaining and maintaining the ISACA CISA certification is likely to be beneficial. It is widely acknowledged as a trustworthy indicator of the presence of the skills required for success in the IS/IT field.

This qualification, like all professional credentials, comes at a cost in terms of both time and money, but the return on these expenditures is well worth it.

Professionals with the skills required to run IS/IT audit and assurance programmes are in high demand. Employers value the CISA professional credential and place a premium on individuals who have earned it. Obtaining this certification has been shown to be an effective means of advancing one’s career in information technology.

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://cybersguards.com/certified-information-systems-auditor-cisa/

Cyber Security

How to Start a Cybersecurity Company

Published

on

cybersecurity

How to Start a Cybersecurity Company- Start with the basics if you’re thinking about starting a cybersecurity company. To ensure your success, make sure you have the necessary credentials, money, structure, and business strategy.

It’s no wonder that cybercrime is on the rise in an increasingly digital society. The cost of doing business is also increasing. According to a 2019 IBM research, the typical data breach costs $3.92 million.

Because of the enormous financial risks, cybersecurity services are in high demand. Large corporations can afford to hire cybersecurity experts. Small and midsized organisations, on the other hand, can rarely afford full-time cybersecurity staff.

This is where your cybersecurity knowledge may be turned into a profitable security solutions company.

You can assist these smaller businesses in avoiding cyber hazards such as data breaches, cyberattacks, malware, phishing scams, and other online concerns.

Businesses are paying $150 per hour or more for experienced cybersecurity consultants to help defend systems and networks against cybercrime, according to PayScale statistics.

If you’re considering launching a cybersecurity company, you can put your abilities to work and get a piece of this lucrative market. But first, you should create the framework for a successful business by following these steps.

Table of Contents

Get the Right Professional Certifications

Someone must trust you to complete the task correctly before they will hire you. A bachelor’s degree in information technology, computer science, or a related discipline indicates that you have the necessary skills to launch a cybersecurity or IT-related company.

However, degrees do not provide the practical experience that clients seek. Certifications are another technique to establish credibility and demonstrate that your talents are useful and relevant.

Here are a few of the most well-known cybersecurity certifications:

  • Certified Ethical Hacker Certification: The EC-Council issues this certification to cybersecurity professionals who test networks or systems and look for security weaknesses. The exam costs $100 and takes around four hours to complete. It has 125 questions.
  • GIAC Security Essentials Certification (GSEC): This certification is offered by Global Information Assurance Certification (GIAC) and validates the information security knowledge of IT professionals. It takes roughly five hours to finish the test, which includes 180 questions and costs $150.
  • Certified Information Systems Security Professional (CISSP): (ISC)² issues the CISSP, which shows your ability to design, implement, and maintain an effective cybersecurity programme and security systems. The exam is limited to 150 questions, lasts three hours, and costs $699.
  • Certified Cloud Security Professional (CCSP): The (ISC)² also issues this certification, which shows potential clients that you have the skills to design, maintain, and secure cloud data, applications, and infrastructure. This exam costs $599 and takes four hours to complete. It has 125 questions.
  • CompTIA Cybersecurity Analyst (CompTIA CySA+): The CompTIA CySA+ exam assesses candidates’ threat detection skills, ability to analyse and interpret data, and ability to find security issues. The exam lasts just under three hours and includes up to 85 questions. It costs $359.
  • ISACA’s Certified in the Governance of Enterprise IT (CGEIT): The CGEIT certification demonstrates test-takers’ ability to audit, control, and secure information systems. The exam costs $760 for non-ISACA members and $575 for ISACA members. The exam is four hours long and consists of 150 questions.
  • ISACA’s Certified Information Security Manager (CISM): ISACA also issues the CISM. This certification verifies that you possess the necessary technical skills to manage information systems and IT security. Nonmembers will pay $760, while members will pay $575. It has 150 questions and will take you four hours to finish.

While skills and certifications are important, they are only one part of a successful cybersecurity startup strategy. You must also develop and implement a business plan.

Develop a Business Plan Tailored to Cybersecurity

A business plan serves as a foundation for your company. It should include information on your company’s structure, strategy, goals, and budget, among other things. The Small Business Administration (SBA) of the United States has put together some helpful guidelines for what should be included in your business plan:

  • an executive statement that explains your cybersecurity business and why you think it will succeed
  • a thorough description of your business
  • a competitive market analysis to define your target market and identify your competitors, who could be cybersecurity consultants or general IT service providers.
  • your marketing and sales strategy your legal framework for your business the products or services you plan to offer your legal structure for your business
  • your financial/budgetary strategy
  • financial forecasts on when your business will be profitable

Let’s look at some of the important elements of this business plan in more detail.

Define Your Target Market and Analyse it

You must decide on the emphasis of your cybersecurity firm early on.

Some companies choose to become experts in a specific subject or industry. Do you wish to target a specific industry, such as finance or healthcare, for example?

Others prefer to specialise in a certain area of cybersecurity. Regardless of industry, they may desire to be known for their extensive knowledge of access control or network security.

This choice should be based on both your skills and a market analysis. You can spot possible opportunities if you know who your competitors are.

These essential questions have been identified by Inc. to assist you in evaluating the competition:

  • Who are your current competitors?
  • What are your competitors’ strengths and weaknesses?
  • How are you different from the competition?
  • How can you take market share away from competitors?
  • How might competitors react when you enter the market?

A SWOT analysis, which stands for strengths, weaknesses, opportunities, and threats, can also be used. This is a tried-and-true approach of evaluating a business, product, or service in the market. It’s akin to conducting a risk analysis for your new cybersecurity solutions.

You must choose a legal structure for your business after deciding on a focus and researching the competitors.

Choose your Company’s Legal Structure

Your company’s legal framework is crucial. Everything from day-to-day operations to taxes and financial hazards is affected. Here are the five most prevalent business structures, as explained by the SBA:

  • Sole proprietorship: This is the most basic form, and it’s also the simplest to set up because there’s really nothing to set up. It’s a firm conducted by a single person who files a personal tax return to record the company’s income and losses. Because there is no legal distinction between you and your business, you might be held personally liable for its debts and responsibilities.
  • For businesses held by two or more persons, the most basic structure is a partnership. Profits are reported on personal tax returns by each individual. Limited partnerships (LPs) and limited liability partnerships (LLPs) are the most prevalent types of partnerships (LLP).
  • Except for at least one general partner, most LP partners can have limited liability. Limited liability partners, on the other hand, have limited control. In an LLP, each member has limited liability and is protected from the partnership’s debts.
  • L.L.C. (Limited Liability Company): A limited liability company (LLC) is a cross between a single proprietorship and a partnership. It restricts the liabilities of the owners and keeps your personal assets distinct from your firm. However, owners must record all business revenue and costs on their personal income tax returns.
  • S corporation: An S corporation is a business that pays itself a salary and is responsible for all payroll taxes. Any residual earnings can be transferred as payments to the owner(s). The benefit is a lower tax rate on distributions, but there are more costs, requirements, and paperwork with this option.
  • C corporation: A corporation is a separate legal entity that can make a profit, be taxed, and be held legally liable under this form. It can have an unlimited number of shareholders with limited liability for the company’s debts, but any earnings can be taxed.

Before deciding on a structure, consult with business advisors, accountants, and attorneys to determine which option is best for you.

Obtain a Business Licence, a Bank Account for your Firm, and a Credit Card for your Company

To launch your cybersecurity firm, you’ll need to check with state and local organisations to see what business licences or permits are required. Unlike many other professions, you don’t need a federal licence to work in this industry (yet).

Many jurisdictions will not offer you a licence unless you have general liability insurance. You must also maintain workers’ compensation insurance if you have employees.

You might be tempted to simply open an account with your personal bank when opening a business bank account. Not so quickly!

Consider fee-free bank accounts offered by internet, national, or local institutions. NerdWallet has a helpful guide to locating low-cost business bank accounts that will help you save money.

You might also want to think about getting a business credit card, which can help you keep your personal and business finances separate.

A company credit card usually has better conditions and limitations than a personal credit card. It will provide you with a revolving credit line and often includes benefits such as rewards points and cash back incentives.

Any small firm, regardless of its legal structure, can get a business credit card. However, sole proprietors and most new businesses’ credit scores will determine which cards and offers are available to them.

Secure Funding and Set a Budget

A variety of funding sources are available to assist you in getting your firm off the ground. You can look into loans, grants, and angel investors in addition to your own money.

These are choices that many cyber entrepreneurs pursue. In fact, according to a recent estimate, cybersecurity venture capital funding totaled $5.3 billion.

These investors advertise that they are looking for cybersecurity firms to invest in:

  • Strategic Cyber Ventures
  • ForgePoint Capital
  • AllegisCyber Capital
  • Cyber Capital Partners
  • TenEleven Ventures
  • Intel Capital

Setting and keeping to a budget is also crucial when launching a new cybersecurity company. The Balance has a wealth of money-management advice, including:

  • Set sales revenue goals.
  • Recognize your running costs.
  • Keep an eye on your cash flow.
  • Put money aside for an emergency fund.

Find the Right Location

Fortunately, businesses all across the country require cybersecurity services. Of course, Hawaii can only accommodate a certain number of cybersecurity specialists.

When determining where to set up shop, you should consider your start-up cash, whether or not you will need to hire, and the nature of your business. You have the following options:

  • Working from home has a number of advantages for small business owners. There are no long commutes or workplace interruptions, and you have a better work-life balance. However, it can be lonely, and staying on track necessitates self-discipline.
  • Coworking spaces: This alternative provides flexibility as well as a variety of perks and conveniences, as well as the workplace culture that working from home lacks. However, the predetermined hours, lack of solitude, and limited space for growth may not suit your needs.
  • Buying or leasing an office: Having a commercial office space for your company provides tax benefits and fixed costs, but the initial costs can be high. This solution also lacks the flexibility of a home office or a shared workspace.

If you rent or lease a place, you’ll need commercial property insurance as well. This policy is usually included in the rental agreement and protects your company’s facility, furnishings, supplies, and equipment.

If you or your workers go to your clients’ locations to provide on-site services, you may need commercial auto insurance, regardless of where your cybersecurity firm is located. If you use your car for business, your personal auto insurance may not be enough protection.

Market your Services

Customers are the one thing that your company cannot exist without. And marketing is the vehicle through which they are delivered.

Consider hiring or outsourcing marketing to specialists in the sector if you don’t plan to do it yourself. You’ll require their assistance in launching your product, brand, and services.

Start with the basics before moving on to more advanced marketing techniques. A well-designed website is only the beginning for a cybersecurity firm.

Because your website is likely your most valuable marketing tool, you need to do it correctly. Make sure to stay away from these typical website blunders. You’ll also need to choose the correct domain name, design an appealing user interface, and optimise the site for search engines, among other things.

If you don’t want to perform the work yourself, your in-house or outsourced marketing can help you. If you’re willing to put in the effort, Google can be your best buddy.

Search engines and social media outlets can help potential clients locate your website. On networks like LinkedIn, Facebook, and Twitter, you can develop an active social media presence. Make use of these to market your company and to share cybersecurity news and articles. You could engage a content expert to assist you develop a blog if your budget permits it.

Offline marketing should be explored by cybersecurity companies as well. For any new business, networking is an essential asset. Conferences on cybersecurity provide excellent opportunities to network with possible partners and clients.

The top cybersecurity conferences are listed in Security Magazine. RSA, Women in Cybersecurity, InfoSec World, and the National Cyber Summit are all good places to start.

Carefully Draught Client Contracts

Always execute a customer service agreement before starting a new project. This contract should spell out your and your client’s expectations. Even if it wasn’t your fault, a failing project without legal protection can jeopardise your career.

The agreement should specify the scope of work, intellectual property ownership, payment terms, and liabilities/indemnification to decrease the possibility of lawsuits. To protect both parties, have an attorney review or create client contracts with you.

Many client contracts may stipulate that you obtain cyber liability insurance to cover potential losses in the event of a data breach.

You should consider technological errors and omissions (E&O) insurance even if it isn’t stated in the contract. This policy will protect you if you are sued for a mistake at work. Cyber liability insurance is now included in most technology E&O policies.

Hire Quality Employees

Congratulations on growing your business to the point that you can hire others! The Small Business Administration gives helpful instructions for setting up your employee onboarding process without an HR representative.

To evaluate potential candidates’ credentials and expertise, conduct extensive interviews and background checks. Make sure to follow all federal and state requirements when conducting these audits. To protect yourself and your employees, you’ll need workers’ compensation insurance once you start employing.

To defend against employee theft, fraud, or unauthorised data access, you may want to obtain fidelity bonds.

Protect Your Investment and Your Future

Investing in yourself and your future with a new business is a wise decision. We specialise in assisting cybersecurity companies in protecting themselves and limiting their risk. Our licenced insurance agents would be pleased to talk with you about your company’s condition and determine the best solutions for you.

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://cybersguards.com/how-to-start-a-cybersecurity-company/

Continue Reading

Cyber Security

Vulnerabilities in the Drawings SDK Made by ODA Impact Siemens and Other Vendors

Published

on

Open Design Alliance SDK

Eight vulnerabilities discovered in the Open Design Alliance (ODA) Drawings software development kit (SDK) affect Siemens and presumably other vendors’ products.

ODA is a non-profit company that develops software development kits (SDKs) for engineering applications such as CAD, GIS, building and construction, product lifecycle management (PLM), and the internet of things (IoT). According to the organization’s website, it has 1,200 members globally, and its products are used by big corporations such as Siemens, Microsoft, Bentley, and Epic Games.

ODA’s Drawings SDK, which is designed to provide access to all data in.dwg and.dgn design files, is affected by several vulnerabilities that can be exploited by convincing the targeted user to open a specially crafted file, according to Mat Powell and Brian Gorenc of Trend Micro’s Zero Day Initiative (ZDI).

The weaknesses were uncovered by ZDI researchers in Siemens‘ JT2Go 3D JT viewing tool, however additional investigation indicated that the problems were caused by the Drawings SDK.

According to ODA’s website, the SDK is the “dominant technology for interacting with.dwg files,” with hundreds of organisations using it in thousands of applications. As a result, the flaws are expected to affect a wide range of products, but has yet to see any vendor advisories.

ZDI’s communications manager, Dustin Childs, said the business anticipates Siemens releasing updates soon.

“There may be additional suppliers who are similarly impacted,” Childs told SecurityWeek, “but we’re not sure how many others use the compromised SDK.”

Out-of-bounds, inappropriate check, and use-after-free concerns have been defined as the vulnerabilities, which have been classified high and medium severity. By convincing the intended user to open specially constructed DWG or DGN files with an application that uses the SDK, they can be used to cause a denial of service (DoS) condition, execute arbitrary code, or gather potentially sensitive information.

However, Childs pointed out that an attacker would need to combine one of the code execution flaws with a privilege escalation weakness in order to gain complete control of a system.

These weaknesses are listed on the security advisories area of ODA’s website, but it’s unclear if the company actively alerted customers about the flaws and patch availability – remedies are included in version 2022.5.

ODA has not responded to repeated requests for additional information or comments on these issues.

Companies that utilise the Drawings SDK should update to version 2022.5 or later, according to the US Cybersecurity and Infrastructure Security Agency (CISA).

CISA issued another notice in May for seven identical Drawings SDK vulnerabilities.

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://cybersguards.com/vulnerabilities-in-the-drawings-sdk-made-by-oda-impact-siemens-and-other-vendors/

Continue Reading

Big Data

World Mobile Token Ltd looks to raise $40M in Cardano-based native token sale

Published

on

World Mobile Token Ltd looks to raise $40M in Cardano-based native token sale

World Mobile Token Ltd, which is enabling a new global mobile network built on the sharing economy, announces the launch of its utility-based World Mobile Token (WMT) on the Cardano blockchain. The company aims to raise 40 million USD within the first five weeks of the public sale on top of the 5 million USD it has raised privately.

The KYC application opens on June 15th, when participants will be able to create their private WMT vaults. Applicants will be notified when they are approved and it’s their turn to purchase tokens with ADA, BNB, BTC, DAI, or ETH. Participants will need a Cardano address to make a purchase, and will have 24 hours to do so.

Globally 1.7 billion adults remain unbanked, according to the World Bank. Despite many of the technological advancements many of us take for granted, most traditional banks require a manual onboarding process and rely on credit bureaus to verify client identity. These manual, in-person procedures deny many demographics from basic services, such as the ability to open an account, apply for a loan and mortgage, or obtain access to other financial opportunities.

The World Mobile Network aims to bring sustainable connectivity to communities, in Africa and beyond, through the WMT sharing economy. The company sells affordable network nodes to local business owners and implements blockchain-based digital IDs, in turn empowering the African continent with greater economic freedom, digital inclusion, blockchain adoption, and connection to the Internet.

The World Mobile Network already operates in East Africa. Starting with Tanzania and Kenya, the company aims to bring sustainable connectivity to communities through the sharing economy. WMT will power the World Mobile Network ecosystem, allowing World Mobile Network users access to digital banking, healthcare, digital identification, and educational institutions.

“The launch of our native utility token on the most promising blockchain out there really pushes our vision forward,” says Sean Inggs, Director of World Mobile Token Ltd. “WMT will fuel our ecosystem to empower thousands to obtain access to basic necessities including identification, access to education, banking and other fundamental services.”

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://www.fintechnews.org/world-mobile-token-ltd-looks-to-raise-40m-in-cardano-based-native-token-sale/

Continue Reading

Big Data

BBVA Mexico claims first contactless biometric payment card from Visa issued in Latin America

Published

on

BBVA Mexico is launching a pair of new payment card offerings in collaboration with Visa, one of which features fingerprint biometrics for payment security.

The Smart Key is the first contactless Visa credit card with biometrics offered in the region, according to the announcement. It, along with the Aqua card is made with up to 86 percent recycled material. Both are issued without personalized data printed on the card, while the Aqua card also features a dynamic verification code (CVV).

The bank has 23.7 million customers, 54 percent of whom use the digital channel through the BBVA Mexico App. Of those customers, 5.4 million have credit cards, and 21.2 million have debit cards.

Contactless biometric payment cards from Thales with Fingerprint Cards sensors were certified by Visa last year.

Visa Senior VP and Head of Global Clients Mark Jamison says that “consumer expectations are getting higher and higher and they expect fast and frictionless payment experiences. They are embracing the speed, hygiene and security that contactless payments offer and are becoming more familiar with new forms of biometric authentication in their digital experiences.”

Smart Key biometric payment cards are expected to launch soon for its Patrimonial and Private Banking clients, before becoming available to all clients.

“It is more than a card, this new next-generation device will arrive to transform the means of payment,” states BBVA Mexico General Director of Customer Solutions Hugo Nájera Alva. “We are the first bank in Mexico and on the American continent to put in the hands of our clients a credit card with the latest technology in biometric identification. Through the fingerprint you have access to the most secure, personal and easy-to-use payment experience.”

BBVA has been rapidly adopting biometrics, adding Nok Nok technology to its mobile banking services and Veridas for onboarding across its global operations.

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://www.fintechnews.org/bbva-mexico-claims-first-contactless-biometric-payment-card-from-visa-issued-in-latin-america/

Continue Reading
Blockchain49 mins ago

SOL Attempts to Find Support After Breakdown

Publications1 hour ago

Obituary-Yuan Longping

Publications1 hour ago

News release: The Bank of England’s climate-related financial disclosure 2020/21

Cleantech1 hour ago

Small Wave Energy Power Plants Could Be Wave Energy’s Path Forward

Aviation1 hour ago

Air France Welcomes Its 10th Airbus A350

Blockchain2 hours ago

DGB Technical Analysis: Support Levels of $0.0489, $0.0468, and $0.0441 Will be Tested

Blockchain2 hours ago

Is Cardano Price Poised For 500% Rally? ADA Price to Hit $10 By 2021 End

Aviation2 hours ago

British Airways Announces 4 New Domestic Routes From Belfast

Blockchain3 hours ago

Ethereum’s London hard fork set to hit testnets on these dates

Blockchain3 hours ago

29% of Crypto Investors in the UK Check Their Balance Every day, Study Finds

Blockchain3 hours ago

Canadian Elite Basketball League to Pay Player Salaries in Bitcoin

Blockchain3 hours ago

KSM Technical Analysis: Expect Price to Fall Below the First Fibonacci Pivot Support Level of $259.69

Blockchain3 hours ago

Beyond the hype: NFTs’ actual value is still to be determined

Blockchain3 hours ago

This Little-Known Altcoin Could Be Next To Debut on Coinbase, According to Crypto Trader Tyler Swope

Blockchain4 hours ago

Secux Wallet: The Definitive Of Hardware Wallets

Startups4 hours ago

Investors say Eindhoven poised to become Netherlands’ No. 2 tech hub

Blockchain4 hours ago

Ethereum’s London Hard fork is Finally Ready to Hit Testnets

Blockchain4 hours ago

Chinese Authorities Order Sichuan-based Crypto Miners to Shut Down Operations

Blockchain4 hours ago

Dutch finance minister calls for crypto regulations.

Blockchain4 hours ago

What Are NFTs, and Should I Buy One?

Big Data4 hours ago

Former U.S. Ambassador throws support behind embattled Toshiba board chair

Big Data4 hours ago

China’s cryptocurrency-mining crackdown spreads to Sichuan

Aviation4 hours ago

The Story Of The Ethiopian Airlines 767 That Landed At The Wrong Airport

Blockchain5 hours ago

Bitcoin Whale Details Crypto Game Plan, Says He’s Loading Up on One Altcoin and Rotating Profits to Ethereum

Blockchain5 hours ago

Bitcoin (BTC) Is At A Major Downside Risk If the Equity Market Corrects Predicts Analyst

Cyber Security5 hours ago

How to Start a Cybersecurity Company

EdTech6 hours ago

Basic SAT Exam Details and Available Preparation Options such as Certbolt Practice Tests

Esports6 hours ago

Dignitas benches Dardoch, promotes Akaadian to LCS starting jungler

Blockchain6 hours ago

Kraken Daily Market Report for June 18 2021

Coinpedia6 hours ago

Exploring Provably Fair Mechanisms-The Key to Genuine On-Chain Gaming

Trending