In January 2012, FFIEC examiners will be formally assessing financial institutions' adherence to the new FFIEC "Supplement to Authentication in an Internet Banking Environment" guidelines. Is your organization ready? The following check list outlines some of the fundamental requirements of the new FFIEC Authentication...
For many, the lack of security on mobile devices is a major inhibitor to their adoption of mobile banking. As banks look to address these issues and capitalize on the opportunities of the mobile environment, they are also challenged by the need to bolster customer confidence in online banking. With Entrust's...
This TowerGroup Research Note addresses the growing issue of targeted attacks by
cybercriminals on business banking customers. As the sophistication of cybercriminal organizations has developed, they have begun attacking businesses with techniques such as phishing and "man in the middle" Trojan horses, techniques...
The proliferation of mobile devices and mobile services engenders both threats and opportunities in the financial services market. Because they recognize the opportunity to find vulnerabilities in this nascent technology, cybercriminals are turning their focus to the mobile channel to launch new attacks. Yet, both...
Union Bank, a hallowed and service-oriented financial institution, relies on Good Technology to protect bank data on the mobile devices its employees prefer - while delivering the security and management the company requires.
Read this white paper to find out how Union Bank conquered the challenge and derived at...
Download this white paper to learn about key practices and technologies that organizations should pursue as they seek to improve their eDiscovery practices and technologies.
Find out how a proactive stance toward eDiscovery can help avoid court sanctions, reduce potential litigation costs, and improve regulatory...
The explosion in task-specific applications for mobile devices has gone
hand-in-hand with the growth in cell phones and other computing
tablets. Financial institutions are no exception to the pressure to extend their
services to the mobile channel.
In this whitepaper, readers will learn about:
The...
All organizations - including federal agencies - must leverage technologies that exist today to secure online transaction systems for E-Gov. Until now, fragmented silos of security technologies have been used to protect individual applications, data, or users. In a world of Webconnected smart phones and interactive...
Insider theft and other malicious behavior are particularly difficult to detect and prevent because employees often have legitimate access to sensitive corporate data and tend to know the weaknesses in their organization's infrastructure. Over the course of hundreds of customer interactions, Prism Microsystems, a...
Government agencies are currently using a variety of techniques to meet their fraud combating goals. But, while many feel strongly about their efforts, research shows there is room for improvement. This white paper reveals the results of a survey of 327 federal, state and local government officials on their specific...
When deciding whether to invest in an email security solution - and which solution to opt for - businesses need to understand the extent of the costs they risk incurring if they have either no or inadequate protection in place. Symantec.cloud provides industry-leading email security capabilities that enable businesses...
Recovering deleted emails and locating old business records are two of the most cited reasons for needing an easily searchable email archive.
This white paper discusses some of the top challenges businesses can face when deciding to implement an email archiving solution and what to consider before moving forward.
Attacks on online banking are escalating in scale and scope, and cyber criminals have developed numerous technologies and techniques to bypass many existing controls financial institutions have in place. Online business owners and information security experts need to proactively address this wide variety of threats,...
Invisible to many is the fact that check fraud is growing despite decreasing item volume. Accounting for more than half of the $2 billion in deposit account fraud losses that U.S. banks suffered in 2008, check fraud presents a relatively easy attack vector for increasingly sophisticated and well organized...
Determining whether returning customers are genuine or imposters can no longer rely upon just Positive Identity Verification solutions. Fraudsters simply use stolen identities, hidden proxies, botnets and scripted attacks to evade discovery. Today, there is a new generation of Negative Identity Verification solutions...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.