The Congressional Research Service recently released a report that provides an overview of state laws on identity theft. It discusses state laws that penalize identity theft, as well as state laws that assist identity theft victims, including those that permit consumers to block unauthorized persons from obtaining...
Discover how one time passwords can fit into a complete authentication and security plan
Learn what factors to consider when creating a security solution
Hear one financial institution's experience with implementing one-time password technology
Find out how to balance security with end-user experience
Phishing -- Itâ€™s not a matter of if it will occur at your institution -- expect phishing to happen at your institution. Phishers are not dumb. They head toward where the money is â€“ in the customer accounts at banks and credit unions.
So what does a typical attack look like? First, they swoop in, throw...
A phishing incident response plan for financial institutions isnâ€™t written just for good business practice, itâ€™s also a regulatory requirement too.
While it is a challenge to put an incident response plan that meets your regulatorâ€™s minimum requirements, you also want to have a well thought out...
Hear about the current state of call center authentication.
Learn how to apply voiceprint technology to strong authentication for your Financial Institution.
Find out how the FFIEC Guidelines apply to telephone banking and call centers.
In spite of doom-and-gloom predictions following the FFIECâ€™s guidance announcements, financial institutions are able to balance convenience with security
As many U.S. banks and credit unions turn a corner on two-factor authentication deployments precipitated by last yearâ€™s Federal Financial Institutions...
Why is insider fraud on the rise now? What are the trends?
What is the strategy of how to deal with it? Controls, analytics, etc.
What is the "day in the life" of a case/attack? What process does it typically go through?
How can one systemize the investigations? Technology, policy,
Given the high cost of containing information security breaches, financial institutions have invested lots of time and money into developing incident response programs. But how do they know if their program is working properly?
Lessons learned from TJX and previous data breaches to improve data protection
Outline data protection regulations financial institutions face
What regulators expect financial institutions to have in place for data protection
Best practices in data protection from a regulator, banker and processor
One of the recommendations from the Presidentâ€™s Identity Theft Task Force: Decrease the unnecessary use of social security numbers in the public sector by developing alternative strategies for identity management.
Deborah Platt Majoras, Chairman of the Federal Trade Commission and co-chair of the Identity...
The release of the President's Identity Theft Task Force report on April 23 with its 31 recommendations has implications for financial institutions.
While the report also focuses on increased law enforcement crackdowns on identity theft and the prosecution of the criminals who perpetrate this crime, the need for...
When identity theft occurs, 9 times out of 10 the source of where the personâ€™s identity was taken is never fully found. Trust and money are the two things financial institutions have as their products. Once a customer loses trust in your institutionâ€™s ability to protect their personal financial...
When it comes to compliance with the FDICâ€™s recent Supervisory Letter on Identity Theft, financial institutions need to â€œbeef upâ€ their consumer education programs, along with looking more closely at their existing risk assessment programs to mitigate current and potential areas of vulnerabilities.
Identity theft can strike anyone. Unfortunately, even BankInfoSecurity.comâ€™s staff have been past victims of identity theft. Luckily, the two stories have been resolved. Read on to hear first-hand, the pain of identity theft, and what lengths victims have to take to resolve the crime and restore their identity....