Today, we will be speaking with Stephen Northcutt, CEO of the SANs Technology Institute, a postgraduate level IT security college, and an acknowledged expert in training and certification. He founded the GIAC certification and is author and co-author of numerous books, including the seminal book in intrusion...
The deadline of June 30th has come and gone, and thousands of companies have demonstrated that they are incapable of complying with a set of security guidelines to prevent data breaches and protect credit card data against identity theft. These security guidelines are from the Payment Card Industry (PCI).
As an employee at your institution, you’re a cog in the great wheel that makes everything run. You’ve got responsibilities and work hard to answer all inquiries and requests that come over your desk. A major portion of your work is done on a computer, over the email system your institution gave you...
Here are some tips to follow to protect your personal and work related data.
Use and maintain anti-virus software and a firewall - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall.
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.
With the headlines announcing almost on a weekly basis another data breach at businesses, educational institutions and medical facilities, a recent study shows consumers are modifying their purchasing behavior, including online buying, out of concern for the security of their personal information.
The "2007 Consumer...
As the compliance date set for June 30, 2007 has passed, thousands of companies have yet to show that they are in compliance with the Payment Card Industry Data Security Standards (PCI-DSS). The Payment Card Industry set that date for all organizations that store, process or transmit credit card payments were to be...
Curtis Moroney, systems administrator at Mississippi-based Britton & Koontz Bank, had been dealing with spam-related issues for almost ten years and had seen the problem get progressively worse
It’s going to be a long hot summer for many U.S. financial institutions when it comes to online attacks. The RSA’s Anti-Fraud Command Center issued its monthly online fraud intelligence report for May, and the statistics point to attacks on U.S. nationwide banks account for 33 percent of all attacks on...
Financial institutions receive email from a wide variety of sources, and like other companies they’re facing the unwanted solicitation emails that range from replica watches to penny stock offerings. The employees at financial institutions are also faced with these emails that make it past filters and into...
Like comic book super villains, spam kingpins always seem to find new ways to thwart the technology heroes that fight against junk mail. Just as it seems that they’ve finally been vanquished, they manage to elude the traps laid by anti-spam technology vendors in order to flood the inboxes of innocent users.
Financial institutions need intrusion detection systems that incorporate wireless
The biggest credit-card hacking incident in history exploited a weakness in wireless network security that could have easily been fixed. The lesson for financial institutions is to plug all such weaknesses before wrongdoers discover...
I’m a social engineer. And no, you won’t recognize me or be able to spot me when I come into your bank or credit union. My job is to scope a target (it could be your institution) and probe potential weaknesses in the security, both physical and cyber. I’m paid to find the holes and potential...
Laptop and mobile security is part of any institution's physical computer security effort. For some people, a laptop is their travel buddy and losing it or any data on it would be disastrous to your institution as well as to the employee.
The science fiction movies from the 1960s had talking computers that interacted with humans. That was considered a far-fatched idea in its time, but the current state of technology for voice biometrics and voice recognition has brought the standard up to a level where banks, including major international entities as...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.