Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.
A colleague suggested we might experience yet another crisis in trust when consumers and merchants realize that EMV does not solve all their problems. I find it timely to talk about the limitations of EMV.
Financial Institutions already apply out-of-band security in many instances. The challenge is: How do we help protect payment cards when they are used at any number of online and brick-and-mortar retailers?
With the White House set to issue its cybersecurity framework next month, a former CIA chief information security information officer vividly explains why the set of best IT security practices won't necessarily protect the nation's critical infrastructure.
Termination of an employee after a breach should be reserved for repeat offenders, individuals who show a total disregard for the rules, those who seek to harm another or the most egregious incidents, security expert Mac McMillan contends.
Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking eight key steps, you can protect private information and lessen the impact of breaches when they occur.
Educating customers about financial fraud and scams is not a nice-to-have; it's a necessity. If your customers won't protect themselves, then no campaign your organization puts forward will succeed, says BankWest's Patti Broer.
While user education is valuable, needed and helpful, there is one problem with this approach - it only partially works, and partially working is simply not good enough, security expert George Tubin contends.