There are many best cybersecurity practices that treasury executives can follow within treasury.

One easy step treasurers can take is to set up a dedicated computer on which treasury initiates all fund transfers, a computer that can't be used for email or surfing the Web, said Craig Jeffery, managing director at Atlanta-based consultancy Strategic Treasurer.

Treasury staffers should also practice "desktop hygiene," he said, which includes not keeping account information on employees' physical computers and making sure PCs and laptops have antivirus software and are regularly scanned and checked.

Complete your profile to continue reading and get FREE access to Treasury & Risk, part of your ALM digital membership.

Your access to unlimited Treasury & Risk content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Thought leadership on regulatory changes, economic trends, corporate success stories, and tactical solutions for treasurers, CFOs, risk managers, controllers, and other finance professionals
  • Informative weekly newsletter featuring news, analysis, real-world case studies, and other critical content
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical coverage of the employee benefits and financial advisory markets on our other ALM sites, PropertyCasualty360 and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.

Susan Kelly

Susan Kelly is a business journalist who has written for Treasury & Risk, FierceCFO, Global Finance, Financial Week, Bridge News and The Bond Buyer.