Today, financial institutions offering internet-based and mobile-banking services face increasing pressure to provide enhanced consumer protection against phishing, sophisticated malware and other fraudulent activities. The FFIEC's guidance for financial institutions took a strong stance in support of the deployment...
For many, the lack of security on mobile devices is a major inhibitor to their adoption of mobile banking. As banks look to address these issues and capitalize on the opportunities of the mobile environment, they are also challenged by the need to bolster customer confidence in online banking. With Entrust's...
This TowerGroup Research Note addresses the growing issue of targeted attacks by
cybercriminals on business banking customers. As the sophistication of cybercriminal organizations has developed, they have begun attacking businesses with techniques such as phishing and "man in the middle" Trojan horses, techniques...
The proliferation of mobile devices and mobile services engenders both threats and opportunities in the financial services market. Because they recognize the opportunity to find vulnerabilities in this nascent technology, cybercriminals are turning their focus to the mobile channel to launch new attacks. Yet, both...
The explosion in task-specific applications for mobile devices has gone
hand-in-hand with the growth in cell phones and other computing
tablets. Financial institutions are no exception to the pressure to extend their
services to the mobile channel.
In this whitepaper, readers will learn about:
The...
The Internet offers financial institutions the promise of delivering new services at a fraction of the cost of traditional channels. As more consumers move online, this migration helps reduce operating costs and increase their customer base. The challenge lies in being able to offer these services across new and...
Critical approaches to affordable fraud detection
Financial institutions are offering more and more online and self-service applications, as well as expanding the methods that consumers can use to access these applications.
But with the constant addition of new banking applications and access methods, financial...
Organizations are being driven to increase the strength of authentication across a much broader user population than ever before. The most common way of authenticating employees and partners - username and password - is also one of the weakest in use today. Traditionally, providing stronger authentication using...
A sophisticated type of phishing, man-in-the-middle attacks occur when an attacker attempts to intercept communications between two parties, such as a customer and a financial organization, without their knowledge. By doing so, the attacker becomes "the man in the middle." Both parties are unaware of the attacker's...
This guide has been developed to assist organizations in identifying their requirements for an authentication and fraud detection solution, and in selecting a solution that meets their security needs. It outlines key questions that should be considered during the selection process to ensure that the chosen solution...
This whitepaper presents an overview of the security options that can help thwart fraud today and into the future, including multi-factor authentication and fraud detection solutions. With a clear understanding of the tools available and a way to effectively begin and evolve, organizations can take the essential steps...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.