What happens if your institution suffers an ATM skimming attack and customer accounts have been compromised? Or if a payments processor is hacked and thousands of your credit/debit cardholders are potentially exposed to fraud?
These aren't hypothetical breaches; they've occurred. Repeatedly. And they prove that an...
The Federal Trade Commission has settled with discount retailer TJX, citing the retailer failed to provide "reasonable and appropriate security for sensitive consumer information."
This is the second settlement TJX has made as a result of the largest consumer breach in history. The first settlement, with VISA, came...
In response to the announcement that TJX was not levied any monetary fine as part of its settlement with the FTC, David Taylor, President of the PCI Security Vendor Alliance says this shows TJX's legal team is "a lot stronger than their security team."
OK, so not everybody's confidential information generates the same level of interest as Barack Obama's, Hillary Clinton's or John McCain's passport files.
But the latest State Department scandal nevertheless holds a relevant lesson for financial institutions: Be ever mindful of your customers' privacy....
Social networking sites have morphed into a mainstream medium for teens and adults. These sites encourage and enable people to exchange information about themselves, share pictures and videos, and use blogs and private messaging to communicate with friends, others who share interests, and sometimes even the...
Shopping online offers lots of benefits that you won't find shopping in a store or by mail. The Internet is always open - seven days a week, 24 hours a day - and bargains can be numerous online. With a click of a mouse, you can buy an airline ticket, book a hotel, send flowers to a friend, or purchase your favorite...
Voice over Internet Protocol - VoIP - is a new way to make and receive telephone calls using a broadband Internet connection rather than a regular phone line. A VoIP service may offer unlimited local and long distance calls for a fixed price, as well as features like integrated calls and email, and access to your...
Identity theft is a growing epidemic in the U.S. and worldwide. Chances are, if you haven't been directly impacted by it, you know someone that has.
In fact, identity theft led the Federal Trade Commission's (FTC) list of consumer fraud complaints for 2007 - and it's been at the top of the list for the past seven...
Join in this tactical discussion of how financial institutions are using new technologies to successfully prevent, identify and respond to security threats, no matter where they originate.
Learn how to identify, prevent and rapidly respond to user threats and data breaches
Find out how, while mitigating...
Most companies keep sensitive personal information in their files-names, Social Security numbers, credit card, or other account data-that identifies customers or employees. This information often is necessary to fill orders, meet payroll, or perform other necessary business functions. However, if sensitive data falls...
Despite your best efforts to manage the flow of your personal information or to keep it to yourself, skilled identity thieves may use a variety of methods to gain access to your data.
If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of all correspondence.
Once resolved, most cases of identity theft stay resolved. But occasionally, some victims have recurring problems. To help stay on top of the situation, continue to monitor your credit reports and read your financial account statements promptly and carefully.
When it comes to identity theft, you can't entirely control whether you will become a victim. But there are certain steps you can take to minimize recurrences.
The FTC estimates that as many as 9 million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft.
The crime takes many forms. Identity thieves may rent an apartment, obtain a credit card, or establish a telephone account in your name....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.