It's well-known that network communication is susceptible to eavesdropping and packet sniffing software looking for sensitive information. To avoid these traps, there are secure methods for communicating in the workplace between employees and outside of the company network.
The "pump 'n' dump" stock scam has been around since the inception of stock sales. Today, however, after a series of fumbles by amateurs, serious Internet criminals are taking this scam to new levels, deploying it through:
Images
PDFs
Botnets
And more
In this white paper you will learn more about the...
No other industry faces governmental compliance scrutiny like the financial-services firms do. The increased number and frequent revision of federal, state, local, and international rules has created an unprecedented burden on companies to comply. Companies affected include:
Brokers/dealers
Mutual fund...
Institutions of all sizes struggle with staffing resources - having enough hands available to tend to information security matters. At America First Credit Union in Riverdale, Utah, Lane Gittins, the Systems Security Manager, has learned to overcome this challenge by working in a consultative style - directing a...
If there's one single notion common to financial institutions of all sizes, it is confidence -the need to have shared trust with employees, partners and especially customers. Without this confidence, banking institutions cannot succeed.
And if there's one common theme emerging from the inaugural State of Banking...
Most companies -- increasingly small to mid-size financial institutions -- outsource work at some point or the other, to some place or another.
But what about risks and rewards?
What Does Security Leadership Entail?
Information Security Media Group (ISMG) publishers of BankInfoSecurity.com and
CUInfosecurity.com, recently posed this and other questions to Debbie Wheeler, Chief
Information Security Officer for Fifth Third Bancorp. In her current role she is responsible
for...
"I wonder what it would be like to go home at 5 PM today?" says Bruce Coffing, an information
security officer responsible for identity and access management at LaSalle Bank, a large
Midwestern bank ($113 billion in assets) serving individuals and businesses with over 400 branch
locations. He cannot recall the...
Featuring Elan Winkler, Director of Messaging Product Marketing, Secure Computing
Listen to this interview for insights on how to create a "culture of compliance", building the right systems, processes and skills to solidify your regulatory compliance program today - and for the future.
Among the topics...
Feel like you're canned in by the spam emails in your inbox? Don't despair, here are some common sense tips to help stop spam from getting to your email inbox.
The Federal Trade Commission’s second summit on Spam in the last four years addressed the growing problem of unsolicited emails that is creating costs for businesses and consumers alike.
FTC Chairman Deborah Platt Majoras addressed the summit held July 11-12 in Washington, D.C. “The volume of spam...
Hiring and adding new members to the team is always a mixed feeling. Will this person work out? Should we keep looking for a back up candidate, If What? And so many other unanswered questions plague our mind.
Listen in to this Information Security Media Group podcast to hear from the CISO at Investors Bank & Trust talk about what makes successful training programs work. Jeff Bardin has a wealth of experience in developing training programs for a wide range of organizations.
Previously he held CIO and Director level...
As an employee at your institution, you’re a cog in the great wheel that makes everything run. You’ve got responsibilities and work hard to answer all inquiries and requests that come over your desk. A major portion of your work is done on a computer, over the email system your institution gave you...
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.