What if, while searching the Internet, you come across a Facebook profile of one of your employees, including inappropriate pictures and personal remarks on the supervisor? What does this mean to you as an employer? And what can you do about it?
"I'm not sure there is a way to protect a customer if their actions put their network at risk," says the president of a bank victimized by corporate account takeover.
One community bank shares its side of the corporate account takeover story, and a new survey finds that security compliance reduces long-term expenses.
Three senators discount suggestions their bill would empower the president to deny citizens Internet access. "Nothing could be further from the truth," say Sens. Joseph Lieberman, Susan Collins (both pictured) and Thomas Carper.
Securing data in the public cloud isn't much different from other types of IT security. "It's the same advice we give for almost any deployment of IT because it is still the right thing to do," NIST Senior Computer Scientist Tim Grance says.
Cyberthreats stem from the malware, but monetary losses stem from money mules. I've decided to coin a new term: eFraud. I cannot think of a better way to describe the wave of fraud incidents the financial industry is facing. It's electronic.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.