There are many best cybersecurity practices that treasury executives can follow within treasury.

One easy step treasurers can take is to set up a dedicated computer on which treasury initiates all fund transfers, a computer that can’t be used for email or surfing the Web, said Craig Jeffery, managing director at Atlanta-based consultancy Strategic Treasurer.

Complete your profile to continue reading and get FREE access to Treasury & Risk, part of your ALM digital membership.

Your access to unlimited Treasury & Risk content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Critical Treasury & Risk information including in-depth analysis of treasury and finance best practices, case studies with corporate innovators, informative newsletters, educational webcasts and videos, and resources from industry leaders.
  • Exclusive discounts on ALM and Treasury & Risk events.
  • Access to other award-winning ALM websites including PropertyCasualty360.com and Law.com.

Already have an account?

Susan Kelly

Susan Kelly is a business journalist who has written for Treasury & Risk, FierceCFO, Global Finance, Financial Week, Bridge News and The Bond Buyer.

More from this author

 

Treasury & Risk

Join Treasury & Risk

Don’t miss crucial treasury and finance news along with in-depth analysis and insights you need to make informed treasury decisions. Join Treasury & Risk now!

  • Free unlimited access to Treasury & Risk including case studies with corporate innovators, informative newsletters, educational webcasts, and resources from industry leaders.
  • Exclusive discounts on ALM and Treasury & Risk events.
  • Access to other award-winning ALM publications including PropertyCasualty360.com and Law.com.

Already have an account? Sign In Now
Join Treasury & Risk

Copyright © 2022 ALM Global, LLC. All Rights Reserved.