Like comic book super villains, spam kingpins always seem to find new ways to thwart the technology heroes that fight against junk mail. Just as it seems that they’ve finally been vanquished, they manage to elude the traps laid by anti-spam technology vendors in order to flood the inboxes of innocent users.
Financial institutions need intrusion detection systems that incorporate wireless
The biggest credit-card hacking incident in history exploited a weakness in wireless network security that could have easily been fixed. The lesson for financial institutions is to plug all such weaknesses before wrongdoers discover...
If you ever thought that when you file a Suspicious Activity Report (SAR) that it is filed away with the other SARs, think again. SARs are an important and valuable part of the Bank Secrecy Act (BSA) data that law enforcement uses to build criminal cases. Financial institutions can read more on the enforcement actions...
I’m a social engineer. And no, you won’t recognize me or be able to spot me when I come into your bank or credit union. My job is to scope a target (it could be your institution) and probe potential weaknesses in the security, both physical and cyber. I’m paid to find the holes and potential...
Laptop and mobile security is part of any institution's physical computer security effort. For some people, a laptop is their travel buddy and losing it or any data on it would be disastrous to your institution as well as to the employee.
Any good information security professional knows good passwords should be very easy to remember but hard to guess, and that’s because there are constant attempts to crack your passwords. A recent study by the University of Maryland's Clark School of Engineering is one of the first to quantify the near-constant...
The Chief Security Officer (CSO) oversees and coordinates security efforts across an organization including departments such as information technology, human resources, communications, legal, finance management and other groups, and identifies and establishes security initiatives and standards throughout the...
The Congressional Research Service recently released a report that provides an overview of state laws on identity theft. It discusses state laws that penalize identity theft, as well as state laws that assist identity theft victims, including those that permit consumers to block unauthorized persons from obtaining...
The science fiction movies from the 1960s had talking computers that interacted with humans. That was considered a far-fatched idea in its time, but the current state of technology for voice biometrics and voice recognition has brought the standard up to a level where banks, including major international entities as...
Phishing -- It’s not a matter of if it will occur at your institution -- expect phishing to happen at your institution. Phishers are not dumb. They head toward where the money is – in the customer accounts at banks and credit unions.
So what does a typical attack look like? First, they swoop in, throw...
A phishing incident response plan for financial institutions isn’t written just for good business practice, it’s also a regulatory requirement too.
While it is a challenge to put an incident response plan that meets your regulator’s minimum requirements, you also want to have a well thought out...
Ever since there have been banks, there have been bad guys trying to get the money out of them. With the rapid growth of technology, we need to not only look at our physical risks, but all of the technology we have come to live with, or that we can’t live without at our institutions.
Financial institutions need intrusion detection systems that incorporate wireless
The biggest credit-card hacking incident in history exploited a weakness in wireless network security that could have easily been fixed. The lesson for financial institutions is to plug all such weaknesses before wrongdoers discover...
Certifications are highly sought after by job seekers and employers. They are a major criterion for hiring qualified security professionals, a practice followed by most companies. The challenge for employers, and the key point, is to understand what a specific certification signifies- If a certification along with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.