A financial institution's customers don't always know what's available to them. Your job is to help them. Did you know that everyone is entitled to receive one free credit file disclosure every 12 months from each of the nationwide consumer credit reporting companies - Equifax, Experian and TransUnion. This once a...
When it comes to cracking into computers and networks, one of the most indispensable tools is â€œsocial engineeringâ€ and it has little to do with modern computing technologies. In the popular lexicon that predates today's computing technologies, a social engineer might have been called a flimflam man,...
Learn in detail the current financial scams in circulation from phishing and lottery scams, ATM and credit card skimming, among many others.
Learn proactive defenses to prevent consumers and employers from falling victim.
The Congressional Research Service recently released a report that provides an overview of state laws on identity theft. It discusses state laws that penalize identity theft, as well as state laws that assist identity theft victims, including those that permit consumers to block unauthorized persons from obtaining...
Discover how one time passwords can fit into a complete authentication and security plan
Learn what factors to consider when creating a security solution
Hear one financial institution's experience with implementing one-time password technology
Find out how to balance security with end-user experience
Phishing -- Itâ€™s not a matter of if it will occur at your institution -- expect phishing to happen at your institution. Phishers are not dumb. They head toward where the money is â€“ in the customer accounts at banks and credit unions.
So what does a typical attack look like? First, they swoop in, throw...
A phishing incident response plan for financial institutions isnâ€™t written just for good business practice, itâ€™s also a regulatory requirement too.
While it is a challenge to put an incident response plan that meets your regulatorâ€™s minimum requirements, you also want to have a well thought out...
Hear about the current state of call center authentication.
Learn how to apply voiceprint technology to strong authentication for your Financial Institution.
Find out how the FFIEC Guidelines apply to telephone banking and call centers.
In spite of doom-and-gloom predictions following the FFIECâ€™s guidance announcements, financial institutions are able to balance convenience with security
As many U.S. banks and credit unions turn a corner on two-factor authentication deployments precipitated by last yearâ€™s Federal Financial Institutions...
Why is insider fraud on the rise now? What are the trends?
What is the strategy of how to deal with it? Controls, analytics, etc.
What is the "day in the life" of a case/attack? What process does it typically go through?
How can one systemize the investigations? Technology, policy,
Given the high cost of containing information security breaches, financial institutions have invested lots of time and money into developing incident response programs. But how do they know if their program is working properly?
Lessons learned from TJX and previous data breaches to improve data protection
Outline data protection regulations financial institutions face
What regulators expect financial institutions to have in place for data protection
Best practices in data protection from a regulator, banker and processor
One of the recommendations from the Presidentâ€™s Identity Theft Task Force: Decrease the unnecessary use of social security numbers in the public sector by developing alternative strategies for identity management.
Deborah Platt Majoras, Chairman of the Federal Trade Commission and co-chair of the Identity...
The release of the President's Identity Theft Task Force report on April 23 with its 31 recommendations has implications for financial institutions.
While the report also focuses on increased law enforcement crackdowns on identity theft and the prosecution of the criminals who perpetrate this crime, the need for...