Intelligent CIO North America Issue 11 | Page 10

NEWS

Saven Financial goes live with Temenos solutions

seamless digital experience . Saven used Temenos Infinity , a leading omnichannel digital banking solution , and Temenos Transact , to launch an end-to-end digital platform .
Temenos technology offers Saven the flexibility and agility to quickly roll out new products as it grows its offer .
Lloyd Smith , CEO , FirstOntario Credit Union , said : “ Strengthening our communities has always been a commitment of FirstOntario . Launching Saven allows us to have a greater reach to new digitally focused members with a community-centric mission that shifts the perspective of what it means to be a financial institution .
“ We ’ ve designed our digital brand to resonate with people who want anywhere / anytime banking . Our vision is to bring a no-nonsense , digital savings experience to those who want to achieve their financial goals through smart saving .
“ To do that we needed to make our online platform easy to use and enable our members to benefit from our competitive rates .

Temenos , the banking software company , has announced that

Saven Financial , a division of FirstOntario Credit Union , has gone live with Temenos Infinity and Temenos Transact . The digital-only greenfield credit union is leveraging Temenos technology to deliver a
“ Temenos has been a trusted technology partner of FirstOntario since 2015 , and their technology has enabled us to launch a competitive offering that will have a huge positive impact on our members and their communities .”

More than half of US companies hit with privileged credential theft and insider threats

ThycoticCentrify , a leading provider of cloud identity security solutions , has announced new research that reveals more than half of organizations have been grappling with the theft of legitimate , privileged credentials ( 53 %) and insider threat attacks ( 52 %) in the last 12 months .

In 85 % of the privileged credential theft instances , cybercriminals were able to access critical systems and / or data . In addition , two-thirds ( 66 %) of insider threats led to abuse of administrative privileges to illegitimately access critical systems and / or data .
The research , commissioned by ThycoticCentrify with CensusWide , surveyed 150 IT decision makers across the US on the most common privileged access risks and Zero Trust adoption trends . In addition to external and malicious insider threat attacks , the study found that nearly half ( 48 %) of organizations experienced a data breach as a result of giving an employee or contractor too much access in the last year .
“ IT administrators hold the keys to the most sensitive and mission-critical parts of the kingdom , and both internal and external attackers are taking full advantage ,” said
David McNeely , Chief Technology Officer at ThycoticCentrify . “ Abusing access to these systems can lead to full-scale breaches that grab headlines and impact trust in the organization . While there is no single solution that can eliminate every one of these risk factors , adopting Zero Trust principles is an excellent start .”
10 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com