A new study details the psychological games and other tactics cyber criminals use in social engineering scams propagated through junk email. In a recently released study titled "Mind Games," Dr. James Blascovich, Professor of Psychology at the University of California,
Are you a trusting person? When dealing with people you don't know, don't give them sensitive information unless you're sure who they are, and can prove that they are who they say they are. You'll want to ask yourself if they should have access to the information.
It’s going to be a long hot summer for many U.S. financial institutions when it comes to online attacks. The RSA’s Anti-Fraud Command Center issued its monthly online fraud intelligence report for May, and the statistics point to attacks on U.S. nationwide banks account for 33 percent of all attacks on...
As with any information security threat, your institution needs to plan for them, and social engineering from outside of your institution needs to be expected.
A financial institution's customers don't always know what's available to them. Your job is to help them. Did you know that everyone is entitled to receive one free credit file disclosure every 12 months from each of the nationwide consumer credit reporting companies - Equifax, Experian and TransUnion. This once a...
When it comes to cracking into computers and networks, one of the most indispensable tools is “social engineering†and it has little to do with modern computing technologies. In the popular lexicon that predates today's computing technologies, a social engineer might have been called a flimflam man,...
Learn in detail the current financial scams in circulation from phishing and lottery scams, ATM and credit card skimming, among many others.
Learn proactive defenses to prevent consumers and employers from falling victim.
Phishing -- It’s not a matter of if it will occur at your institution -- expect phishing to happen at your institution. Phishers are not dumb. They head toward where the money is – in the customer accounts at banks and credit unions.
So what does a typical attack look like? First, they swoop in, throw...
A phishing incident response plan for financial institutions isn’t written just for good business practice, it’s also a regulatory requirement too.
While it is a challenge to put an incident response plan that meets your regulator’s minimum requirements, you also want to have a well thought out...
Given the high cost of containing information security breaches, financial institutions have invested lots of time and money into developing incident response programs. But how do they know if their program is working properly?
The best offense is a good defense, is the adage. For financial institutions part of the defense to protect your customers from becoming victims of identity theft is educating them. Here, CUInfoSecurity.com has compiled a list of some of the better known and newest Identity Theft web pages that contain easy to...
When identity theft occurs, 9 times out of 10 the source of where the person’s identity was taken is never fully found. Trust and money are the two things financial institutions have as their products. Once a member loses trust in your institution’s ability to protect their personal financial...
In this webinar, you will be privy to the following topics of discussion:
Describe malware, crimeware intrusions and how they relate to phishing;
Overview of current attacks and help to anticipate likely trends;
Describe different ways clients are attacked, understanding of proactive defenses;
Describe...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.