If your institution is considering a move to “Voice over Internet Protocol†(VoIP) phone systems, you’ve already been doing some research on the subject. VoIP is on its way to becoming the default technology choice for many financial institutions’ voice services, maintaining call quality and...
Protecting Against Advanced Security Threats
Phishing. Man-in-the-Middle. Trojans. As security threats continue to emerge, so too does the quest for an effective and manageable solution: One that allows consumers to conduct business via the online channel without fear of fraud; and one that allows institutions the...
Feel like you're canned in by the spam emails in your inbox? Don't despair, here are some common sense tips to help stop spam from getting to your email inbox.
The latest report by the IT Policy Compliance Group finds that nine of ten companies are exposed to financial risk from data losses and thefts that can be cost-effectively avoided. The report, “Why Compliance Pays – Reputations and Revenues at Risk,†finds the majority of the 475 firms surveyed must...
The Federal Trade Commission’s second summit on Spam in the last four years addressed the growing problem of unsolicited emails that is creating costs for businesses and consumers alike.
FTC Chairman Deborah Platt Majoras addressed the summit held July 11-12 in Washington, D.C. “The volume of spam...
Evolution of identity fraud techniques, including man-in-the-middle
The authentication solution landscape for financial institutions - what are some of the choices banks have to fight fraud (e.g., risk-based authentication, strong authentication, PKI, OTP, smart cards)
Life in the trenches - Implementing FFIEC...
While consumers like the convenience of online banking, financial institutions need to be prepared to mitigate certain risks that may expose consumer information, says a leading authority on data security and privacy.
The recent announcement by Fidelity National Information Services, a financial processing company, that one of its employees at a subsidiary stole 2.3 million consumer records containing credit card, bank account and other personal information is yet another drop in the bucket of data leakage.
Research from McAfee’s Avert Labs shows threats including phishing web sites are on the rise, as expected. But other pests such as remote-controlled bots show unpredicted signs of decrease.
Today, we will be speaking with Stephen Northcutt, CEO of the SANs Technology Institute, a postgraduate level IT security college, and an acknowledged expert in training and certification. He founded the GIAC certification and is author and co-author of numerous books, including the seminal book in intrusion...
The deadline of June 30th has come and gone, and thousands of companies have demonstrated that they are incapable of complying with a set of security guidelines to prevent data breaches and protect credit card data against identity theft. These security guidelines are from the Payment Card Industry (PCI).
As an employee at your institution, you’re a cog in the great wheel that makes everything run. You’ve got responsibilities and work hard to answer all inquiries and requests that come over your desk. A major portion of your work is done on a computer, over the email system your institution gave you...
Here are some tips to follow to protect your personal and work related data.
Use and maintain anti-virus software and a firewall - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall.
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.
With the headlines announcing almost on a weekly basis another data breach at businesses, educational institutions and medical facilities, a recent study shows consumers are modifying their purchasing behavior, including online buying, out of concern for the security of their personal information.
The "2007 Consumer...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.