All organizations - including federal agencies - must leverage technologies that exist today to secure online transaction systems for E-Gov. Until now, fragmented silos of security technologies have been used to protect individual applications, data, or users. In a world of Webconnected smart phones and interactive...
Virtually every company has protection against email-based viruses and spam. But what about protection of email? Unsecured email travels across the Internet as plain test and can reside for months on multiple servers, vulnerable to interception by hackers and data thieves. You may as well have put it on a postcard...
Lengthy downtime, data losses, and security breaches can harm business results, bringing business to a halt: stopping the flow of orders, reducing sales revenue, and interfering with the supply chain. These downtimes could potentially impact a company's ability to compete with other organizations that were unaffected,...
Amarillo National Bank is a regional financial institution with 18 locations, and a robust IT infrastructure composed of 150 servers, 600 workstations, platforms, network devices, applications, databases, physical security devices, card readers, doorway entry devices, HVAC units, UPS systems, biometric scanners, video...
Insider theft and other malicious behavior are particularly difficult to detect and prevent because employees often have legitimate access to sensitive corporate data and tend to know the weaknesses in their organization's infrastructure. Over the course of hundreds of customer interactions, Prism Microsystems, a...
When deciding whether to invest in an email security solution - and which solution to opt for - businesses need to understand the extent of the costs they risk incurring if they have either no or inadequate protection in place. Symantec.cloud provides industry-leading email security capabilities that enable businesses...
Recovering deleted emails and locating old business records are two of the most cited reasons for needing an easily searchable email archive.
This white paper discusses some of the top challenges businesses can face when deciding to implement an email archiving solution and what to consider before moving forward.
Software-as-a-Service (SaaS) continues to gain traction over traditional on-premise software licensing models as organizations aggressively seek more cost-effective, flexible and robust computing solutions. Few would argue that SaaS holds a lot of promise as a cost-effective and robust model for...
Virtually every business acquires, uses and stores personally identifiable information (PII) about its customers, employees and partners. These organizations are expected to manage this private data appropriately and take every precaution to protect it from loss, unauthorized access or theft. Misusing, losing or...
A top concern for most financial institutions is how to add new members and strengthen current customer loyalty, especially when faced with competition from larger institutions and behemoths like Walmart. Read about how Altra Credit Union differentiated themselves with exceptional customer value, and increased their...
From making payments online to depositing checks via iPhones and communicating through Facebook, financial institutions have introduced many new services to make their customers' lives easier. To maximize the impact of trends such as mobility and social media while minimizing their risk, institutions must be...
2011 is the 20th anniversary of the RSA Conference, and the theme is "Giants Among Us," celebrating the luminaries who founded information security.
Here at ISMG, we've been around for about one-quarter of RSA's annual events, and we easily could declare 2011's theme as "Giant Challenges to Tackle." From the...
Why Banks Must Improve Fraud Detection
Interview with George Tubin of TowerGroup
Fraud detection and lack of cross-channel integration pose big security challenges for financial institutions. And according to results from Information Security Media Group's new Faces of Fraud Survey, a lack of resources and...
Professor Eugene Spafford of Purdue University on the forces shaping information assurance education
Could it be that schools, businesses and government are finally coming together to create a dynamic new impact on information assurance education?
Gene Spafford is optimistic. Having shared his reservations about the...
Payment cards, bogus checks and phishing/vishing incidents - these are the top forms of fraud experienced by banking institutions, according to the newly-released results of the Faces of Fraud survey conducted by Information Security Media Group.
But what are the emerging fraud trends? And how should...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.