It’s going to be a long hot summer for many U.S. financial institutions when it comes to online attacks. The RSA’s Anti-Fraud Command Center issued its monthly online fraud intelligence report for May, and the statistics point to attacks on U.S. nationwide banks account for 33 percent of all attacks on...
Later this fall, the Treasury Department plans a multi-week test of the financial services industry’s ability to respond to a pandemic outbreak, the exercise will include scenarios predicted for the avian flu.
As with any information security threat, your institution needs to plan for them, and social engineering from outside of your institution needs to be expected.
A financial institution's customers don't always know what's available to them. Your job is to help them. Did you know that everyone is entitled to receive one free credit file disclosure every 12 months from each of the nationwide consumer credit reporting companies - Equifax, Experian and TransUnion. This once a...
The Financial Crimes Enforcement Network released its 11th issue of the Suspicious Activity Report (SAR) Activity Review Issue 11 last week. With guidance from the BSA Advisory Group (BSAAG), the review covers the suspicious activity reports issued by financial institutions...
When it comes to cracking into computers and networks, one of the most indispensable tools is “social engineering†and it has little to do with modern computing technologies. In the popular lexicon that predates today's computing technologies, a social engineer might have been called a flimflam man,...
Financial institutions receive email from a wide variety of sources, and like other companies they’re facing the unwanted solicitation emails that range from replica watches to penny stock offerings. The employees at financial institutions are also faced with these emails that make it past filters and into...
To create an effective information security incident response capability, banks need to first understand where they are in terms of security readiness. Benchmarking the information security program is one of the most difficult and important tasks a chief information security officer will face. That task has gotten...
Like comic book super villains, spam kingpins always seem to find new ways to thwart the technology heroes that fight against junk mail. Just as it seems that they’ve finally been vanquished, they manage to elude the traps laid by anti-spam technology vendors in order to flood the inboxes of innocent users.
Financial institutions need intrusion detection systems that incorporate wireless
The biggest credit-card hacking incident in history exploited a weakness in wireless network security that could have easily been fixed. The lesson for financial institutions is to plug all such weaknesses before wrongdoers discover...
If you ever thought that when you file a Suspicious Activity Report (SAR) that it is filed away with the other SARs, think again. SARs are an important and valuable part of the Bank Secrecy Act (BSA) data that law enforcement uses to build criminal cases. Financial institutions can read more on the enforcement actions...
I’m a social engineer. And no, you won’t recognize me or be able to spot me when I come into your bank or credit union. My job is to scope a target (it could be your institution) and probe potential weaknesses in the security, both physical and cyber. I’m paid to find the holes and potential...
Laptop and mobile security is part of any institution's physical computer security effort. For some people, a laptop is their travel buddy and losing it or any data on it would be disastrous to your institution as well as to the employee.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.