In the wake of today's evolving threat landscape, the FFIEC recommends a robust, layered security program that includes the use of dual customer authorization through different access devices. Strong authentication when combined with federated SSO (single sign on) standards can strengthen, accelerate, and provide key...
International communication and public-private partnerships are the keys to cybersecurity in the financial space, according to the Department of Homeland Security and the Financial Services - Information Sharing and Analysis Center.
To meet their risk management, compliance, and business objectives, financial services institutions must have a clear understanding of the critical security threats that exist today - and the most effective strategies for addressing them.
Download this paper to learn:
Main threats confronting financial...
Nessa Feddis of the ABA says increased investments in technology at the bank and consumer levels have fueled confidence in online banking. "I think the reason you see an uptick in use here is because the channel is more secure."
Layered security is one of the core tenets of the new FFIEC Authentication Guidance - and it's perhaps the most effective strategy for detecting and preventing banking fraud schemes. But what are some of today's most mature approaches to layered security, and how are banking institutions employing them to detect and...
"What banks need to be aware of is that much of this fraud is occurring on the consumer and business-customer side, and not all of them will invest in technology that catches these attacks," says Phil Blank of Javelin Strategy & Research.
Doug Johnson of the ABA and FS-ISAC says banks and commercial customers are improving efforts to catch and thwart incidents of corporate account takeover, a sign that the industry is moving in a positive payments direction.
The bright spot is that 36 percent of the takeover incidents reported in 2010 were stopped before fraudulent funds transfers were approved. That's an improvement from 2009, when only 20 percent were thwarted.
With the FFIEC Authentication Guidance update, regulators have raised the bar: Traditional security controls are insufficient. Banking institutions now must adopt a layered approach to securing high-risk online banking systems.
But how does one choose among all of the layered security options? And then, after...
For too long, banking institutions have paid only lip service to the need for developing information security awareness and education programs for their customers.
But now, as directed by the FFIEC Authentication Guidance, institutions as of January 2012 are expected to manage a robust awareness and education...
So, you've met with your key vendors and conducted a gap analysis of areas that need to be addressed prior to January 2012 to conform to the FFIEC Authentication Guidance. But how do you know if a specific vendor is sharing with you a complete picture of preparedness? Some vendors are upfront on their capabilities and...
As the use of mobile banking grows, banks and credit unions also should take steps to educate their customers and members about safe e-banking practices.
Banking regulators make no bones about it: Your third-party service providers aren't responsible for ensuring that you attain conformance with the FFIEC Authentication Guidance. You are. How do you ensure their ability to aid your efforts towards compliance? Learn the secrets of a vendor management expert, who will...
As banks and credit unions assess online risk, in light of the updated guidance from the FFIEC, financial fraud analyst Tom Wills says they should consider mobile as a viable layer for out-of-band authentication.
Today, financial institutions offering internet-based and mobile-banking services face increasing pressure to provide enhanced consumer protection against phishing, sophisticated malware and other fraudulent activities. The FFIEC's guidance for financial institutions took a strong stance in support of the deployment...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.