With the deadline passed for compliance with the Federal Financial Institutions Examination Council (FFIEC) guidelines, financial institutions are seeking cost-effective strategies that meet or exceed meeting regulatory and customer expectations.
According to the FFIEC, any system that permits the movement of...
Wish List from Financial Institutions to Our Customers
As the weather outside gets colder and the year draws to an end, we're thinking of what would be some of the things we'd like to give and receive as gifts during the holidays. While your personal list may be longer than this, here's the 12 things we wish all of...
Wish List from Financial Institutions to Our Customers
As the weather outside gets colder and the year draws to an end, we're thinking of what would be some of the things we'd like to give and receive as gifts during the holidays. While your personal list may be longer than this, here's the 12 things we wish all of...
With the December deadline approaching for implementing better authentication for online banking systems, financial institutions are hard-pressed to come up with technology solutions that will satisfy regulators. It's going to be a race to the finish line to meet the deadline set by the Federal Financial Institutions...
The FAQs recently published by the FFIEC on August 15, 2006, is an attempt by the FFIEC to answer questions asked of them about their guidelines on Internet Banking Authentication published October 12, 2005. The 2005 guidelines were an outgrowth of a previous guidance document issued in 2001.
As with all federal...
Learn how to protect your consumers' digital identities. Comply with FFIEC guidelines. Manage your reputational risk. Solidify your approach to consumer authentication. Learn more about VeriSign(r) Identity Protection Services. Get the white paper from VeriSign now!
With hundreds of millions of electronic transactions taking place daily, businesses and organizations have a strong incentive to protect the integrity of the data exchanged in this manner, and to positively ensure the identities of those involved in the transactions. This has led to an industry-wide quest for better,...
Exploitations that threaten security are on the rise. Every day, news stories document the rampant growth of attacks and exploits. The types of attacks vary - Denial of Service (DoS), buffer overflow, identity theft, session hijacking, website defacements, email viruses, worms, phishing scams, and the list goes on. ...
One of the biggest problems facing your Internet business today is the thorny issue of trust and security. The vast majority of consumers are concerned about the safety of their credit card and personal details. People simply don't trust the Web, fearing that their transactions might not be safe. Not only are...
Bank fraud and identity theft are a frightening reality, both for the banker and the consumer. The number of consumers affected by widespread debit card fraud may be a good thing. The impact on people's bank accounts may have increased acceptance towards "disruptive technologies", i.e., hardware tokens. This may be...
thawte's Starter Public Key Infrastructure (PKI) Program enables companies that require multiple security certificates to better manage their certificate needs without the red tape usually associated with this process.
This program will benefit organizations by helping to improve IT and business processes through...
Who knows? Maybe two and three–factor authentication will become a thing of the past and five–factor authentication will take its place. The same issue with encryption has been encountered over the years. With this example in mind, does it make sense for law to be involved in the technological details?...
Account fraud is frequently the result of single-factor (e.g.,ID/password) authentication exploitation. As a result, the FFIEC is now urging financial institutions to deploy multi-factor authentication and assess the adequacy of their authentication techniques in light of new or changing risks such as phishing,...
Strong authentication based on X.509 PKI (Public Key Infrastructure) is available in a number of protocols and provides both security and administrative benefits and drawbacks. This paper looks at the security and administrative benefits (and drawbacks) of using strong authentication. This paper looks at generic...
Organizations publish information online including confidential data. Data is rendered in varied formats; it can vary from simple HTML pages to documents in Adobe's PDF or Microsoft's Word/Excel formats. Confidential data is restricted to a set of users who have to login and be authenticated on the website. A common...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.