When it comes to cracking into computers and networks, one of the most indispensable tools is “social engineering†and it has little to do with modern computing technologies. In the popular lexicon that predates today's computing technologies, a social engineer might have been called a flimflam man,...
Learn in detail the current financial scams in circulation from phishing and lottery scams, ATM and credit card skimming, among many others.
Learn proactive defenses to prevent consumers and employers from falling victim.
The Congressional Research Service recently released a report that provides an overview of state laws on identity theft. It discusses state laws that penalize identity theft, as well as state laws that assist identity theft victims, including those that permit consumers to block unauthorized persons from obtaining...
Discover how one time passwords can fit into a complete authentication and security plan
Learn what factors to consider when creating a security solution
Hear one financial institution's experience with implementing one-time password technology
Find out how to balance security with end-user experience
Phishing -- It’s not a matter of if it will occur at your institution -- expect phishing to happen at your institution. Phishers are not dumb. They head toward where the money is – in the customer accounts at banks and credit unions.
So what does a typical attack look like? First, they swoop in, throw...
A phishing incident response plan for financial institutions isn’t written just for good business practice, it’s also a regulatory requirement too.
While it is a challenge to put an incident response plan that meets your regulator’s minimum requirements, you also want to have a well thought out...
Hear about the current state of call center authentication.
Learn how to apply voiceprint technology to strong authentication for your Financial Institution.
Find out how the FFIEC Guidelines apply to telephone banking and call centers.
Why is insider fraud on the rise now? What are the trends?
What is the strategy of how to deal with it? Controls, analytics, etc.
What is the "day in the life" of a case/attack? What process does it typically go through?
How can one systemize the investigations? Technology, policy,
responsibility,...
Given the high cost of containing information security breaches, financial institutions have invested lots of time and money into developing incident response programs. But how do they know if their program is working properly?
Lessons learned from TJX and previous data breaches to improve data protection
Outline data protection regulations financial institutions face
What regulators expect financial institutions to have in place for data protection
Best practices in data protection from a regulator, banker and processor
One of the recommendations from the President’s Identity Theft Task Force: Decrease the unnecessary use of social security numbers in the public sector by developing alternative strategies for identity management.
Deborah Platt Majoras, Chairman of the Federal Trade Commission and co-chair of the Identity...
The release of the President's Identity Theft Task Force report on April 23 with its 31 recommendations has implications for financial institutions.
While the report also focuses on increased law enforcement crackdowns on identity theft and the prosecution of the criminals who perpetrate this crime, the need for...
The release of the President’s Identity Theft Task Force report on April 23 with its 31 recommendations has implications for financial institutions.
While the report also focuses on increased law enforcement crackdowns on identity theft and the prosecution of the criminals who perpetrate this crime, the need...
The best offense is a good defense, is the adage. For financial institutions part of the defense to protect your customers from becoming victims of identity theft is educating them. Here, CUInfoSecurity.com has compiled a list of some of the better known and newest Identity Theft web pages that contain easy to...
When identity theft occurs, 9 times out of 10 the source of where the person’s identity was taken is never fully found. Trust and money are the two things financial institutions have as their products. Once a member loses trust in your institution’s ability to protect their personal financial...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.