The Internet has become a strategic customer acquisition and services distribution channel for financial services companies. Consumers are able to apply and obtain credit online, transfer funds, trade commodities and pay bills by simply clicking a few buttons from anywhere at any time. Unfortunately, in the online...
Now reality sinks in.
With last week's long-awaited release of the federal ID Theft Red Flag rules, financial institutions nationwide are starting to figure out "What next?"
Many executives are still absorbing the information. Others are actively working on adding the new requirements to their compliance efforts.
The new Identity Theft Red Flag regulations announced last week are intended to make life tougher for criminals, but they are also expected to seriously complicate compliance efforts, according to financial industry experts.
By this time next year, all U.S. financial institutions will be required to have implemented an Identity Theft Prevention Program.
This is the mandate from Washington, D.C., where six federal agencies this week issued the Final Rules on Identity Theft Red Flags and Notices of Address Discrepancy. These final rules...
Since January 2005, over 167 million credit card numbers have been exposed due to security breaches. Many of the most damaging breaches were the result of hackers exploiting flaws in software. With the PCI Security Standard Council's regulations recently expanding to include specific mandates to assess software for...
Betsy Broder offers practical advice for financial institutions on best practices to protect their customer information, and explains the federal government's efforts to address ID theft. She also addresses possible legislation that could affect a financial institution's data security and identity theft prevention...
Private Data Vulnerable to Armies of Rogue PCs One hacker armed with one computer isn't going to make a dent in most financial institutions' network security perimeters. But imagine a faceless army of thousands of compromised PCs outside the walls of your institution. They are computer robots programmed to obey the...
Six Tips to Keep the Bots at BayFighting bots can seem like an unending battle. But there are some actions you can take to lower your risk. Among the steps:
New ID Theft Scam Targets the Really Big Fish Phishers are now setting their hooks on high-income individuals, and the term that information security researchers are using is “Whaling” -- or spear-phishing that really big fish.
Bad Guys Getting Better, Aiming HigherInformation Security Media Group took the opportunity to talk with Dean Turner, Director, Symantec Global Intelligence Network, about Symantec’s latest Internet Security Threat Report. He shared some of his insights re: the most important changes in the threats being seen...
Detailed user-level auditing for your UNIX and Linux environment is essential to achieving business-critical goals like regulatory compliance (e.g., GLBA, SOX, PCI, etc.), protection against insider attacks, and the ability to troubleshoot and diagnose system availability issues.
Centrify's auditing, access control...
While many computer users have sent them in the past, the future of E-cards (or electronic greeting cards) may be dimmed because of the recent use of them in scams targeting consumers. Financial institutions need to educate their employees and customers more about the dangers of opening electronic greeting cards....
With identity theft topping the Federal Trade Commission's list of US consumers complaints, the release of a new report issued by a leading consumer advocacy group that puts a price tag of more than $7 billion on the cost of cybercrime to the US consumers is not a surprise to many familiar with the identity theft...
Information about the threats of identity theft seem to be everywhere -- media headlines, websites, billboards, television ads, and your financial institution has probably warned its customers of the problem.
The real question is – how bad is the problem? When you compare studies and reports, it can yield...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.