Once resolved, most cases of identity theft stay resolved. But occasionally, some victims have recurring problems. To help stay on top of the situation, continue to monitor your credit reports and read your financial account statements promptly and carefully.
When it comes to identity theft, you can't entirely control whether you will become a victim. But there are certain steps you can take to minimize recurrences.
The FTC estimates that as many as 9 million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft.
The crime takes many forms. Identity thieves may rent an apartment, obtain a credit card, or establish a telephone account in your name....
Maybe you've taken steps to secure the data on your laptop: You've installed a firewall. You update your antivirus software. You protect your information with a strong password. You encrypt your data, and you're too smart to fall for those emails that ask for your personal information. But what about the laptop...
The Internet serves as a powerful tool for investors. But hackers and identity thieves can wreak havoc on your personal finances unless you take steps to protect the security of your account numbers, passwords, and PINs. And investment opportunities that sound like no-brainers all too often turn out to be frauds.
For Synovus, a $32 billion holding company with 5000 employees and 37 affiliated banks across the Southeast, it's a bit of an understatement to say that IT governance is done on a broad scale.
Early in the evening on Tuesday, Feb. 5, a powerful storm system hit the Jackson, TN., area. A total of 79 confirmed tornadoes touched down in 10 states over the course of two days, killing 57 people. Among the local businesses hit hardest was Jackson's Union University branch of BancorpSouth, ($13 billion assets,...
Institutions of all sizes struggle with staffing resources - having enough hands available to tend to information security matters. At America First Credit Union in Riverdale, Utah, Lane Gittins, the Systems Security Manager, has learned to overcome this challenge by working in a consultative style - directing a...
There's a lot to think about beyond the security cameras, guards and locks. That's why we made physical security one of our earliest priorities this year, and why you should give it equal consideration.
Following is a recap of the physical security stories we've presented so far this year.
It's a project that really represents about a year's worth of work and organization on our part, and on yours too. We started months ago. Information Security Media Group just started to visualize this project, the issues that we wanted to talk about - knowing the regulatory issues that were coming down, things that...
Vendor management and pandemic preparation are huge topics for financial institutions and regulators alike. On January 29, the National Credit Union Administration (NCUA) spotlighted these issues in a webinar, "Key Examination Issues for 2008." Following the session, we spoke to NCUA Board Member Gigi Hyland about the...
There are many people trying to scam you for your money, both on and off the Internet. Here are a few of the more common scams, what's at risk, and how to avoid them.
The "pump 'n' dump" stock scam has been around since the inception of stock sales. Today, however, after a series of fumbles by amateurs, serious Internet criminals are taking this scam to new levels, deploying it through:
Images
PDFs
Botnets
And more
In this white paper you will learn more about the...
No other industry faces governmental compliance scrutiny like the financial-services firms do. The increased number and frequent revision of federal, state, local, and international rules has created an unprecedented burden on companies to comply. Companies affected include:
Brokers/dealers
Mutual fund...
Say you're in a library, a school or an airport, using a public computer to catch up on email or the news. Here are some simple steps to follow to protect yourself from potential predators.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.