Steering Clear of Danger Takes Smart Tactics and Good Habits The best offense is a good defense, it’s often said, and keeping spyware from invading your computer is a solid combination of both offensive and defensive measures.Defense First To prevent spyware from installing on your computer, follow some good...
In this Information Security Media Group podcast Mark Lobel of PriceWaterhouseCoopers speaks to our audience and updates on recent trends in info security and the importance of effective benchmarking.
Mark Lobel is a nationally known expert in information security who leads the PriceWaterhouseCoopers annual survey...
Join Information Security Media Group's Richard Swart in a conversation with Nathan Johns, former Chief of Information Technology at the FDIC. Based on his years of experience with banks, technology and audits, Johns offers his thoughts on training (classroom, online and hands-on), as well as advice for people just...
Imagine the scene – it is the final battle of a prolonged war. No, we’re not talking about the Iraq war, this war is against your financial institution, and the last waves of enemy soldiers (hackers or other evildoers) are crashing in to take over customer data or computer networks. There are many...
Have you sat down in front of your screen and tried to discover why it is taking forever to download or you've found while troubleshooting there's been something added to the numerous operations that your PC computes? It may turn out to be that the source of your PC's slowing is spyware, software that was installed on...
The idea of having as many eyes and ears on the street is any police officer’s dream come true. The same idea applies to information security officers at financial institutions. What would you think if you could add to your headcount exponentially? Unless your senior management is on a spending spree that...
How would your employees respond to a phishing email? Would they immediately forward it to your information security officer, or would they shrug it off and hit the delete key? What if they receive a call or voice message from someone asking for what (at the time) seems to be innocuous information on a customer? Have...
Every time I see the movie “Rebel Without a Cause†I think what James Dean’s character would end up like when he went into the workforce. And I wonder how long he would last at most financial institutions.
Do you, as a information security professional feel like you’re surrounded by rebels...
Employees play an integral role in protecting the assets of an institution, and as such, need to be adequately trained and made aware of the basic security practices which are frequently overlooked. A set-it and forget-it approach "we're protected because we have a firewall" to information security ignores end-users,...
Do you see pieces of paper in your organization with usernames or passwords?
Do you see employee desks with customer sensitive files and data lying on them with no one around?
Do you see employee trashcans containing sensitive customer information?
Do you see employees opening an email from someone they don't...
Today, the information security field is not just about technology, it is about people and protecting information wherever it is while still being able to share that information with clients, partners and customers. Considering the security challenges organizations are facing today, more and more employers are...
Here’s a podcast from Information Security Media Group on a hot security topic: Web Applications. Listen as information security expert James Kist answers questions regarding how important web app security is for a financial institution.
James Kist, CISSP, CCSI, CCSE, CCSA, is a senior Information Security...
While technological solutions abound in financial institutions have installed firewalls, intrusion detection systems, robust anti-virus and anti-spyware solutions, and strengthened authentication methods, financial institutions have forgotten security awareness training. One reason? There isn’t a recognizable...
Developing a metrics measurement for your financial institution doesn’t have to be something that is dreaded or feared. Planning a metric program and implementing it to measure the effectiveness of your entire information security program can yield your group and your financial institution unseen benefits.
The original use of the term "firewall" was the description of the brick and mortar wall built in between houses to prevent a fire from spreading from one house to the next.
A computer firewall does basically the same thing, it prevents bad things from entering your computer. A properly installed firewall protects...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.