Easy Solutions' Ricardo Villadiego addresses how the digital revolution, millennials and the pervasive use of online communications affect financial fraud.
Cybercriminals are constantly and actively working to exploit weaknesses in your cybersecurity. Those folks involved with the daily operations of cybersecurity management know that their top priority every day is staying ahead of the hackers and attacks they face. By using Security Event Information Management (SIEM)...
Same-day Automated Clearing House (ACH) payment processing became a reality. While this represents a terrific opportunity for banks to be responsive to their customer's requirements for faster ACH payments, plus the ability to attract new customers from banks who choose not to offer the same level of responsiveness,...
It is more crucial than ever for companies in the financial industry to better manage risk and keep high-value data safe. In this case study of a regional bank, "Proactively Challenge Cyber Threats in the Financial Industry," you will learn how monitoring the appearance and price trends of specific Bank Identification...
Cybercriminals are constantly and actively working to exploit weaknesses in your organizations cybersecurity. Those folks involved with the daily operations of cybersecurity management know that their top priority every day is staying ahead of the hackers and attacks they face.
By using Security Event Information...
How will federal banking regulators respond to growing criticism of the FFIEC's Cybersecurity Assessment Tool? A new FDIC publication leads some experts to believe no new guidance is forthcoming. Here's why.
Securing sensitive emails isn't just a best practice - it's often the law. Compliance with
regulations is a priority for healthcare, financial services and government organizations; it may
also need to be a priority for companies that work with these organizations or practice business
in specific...
Easy, secure communication is a valuable asset in the financial services
industry. Sensitive information is circulating on a day-to-day basis to
customers, third-party organizations and strategic partners, and one
communication tool emerges above the rest when exchanging sensitive
personal information -...
The FFIEC's Cybersecurity Assessment Tool needs to be redesigned, as the tool's current design sets institutions up for cyber-risk assessment failure. Industry leaders say they're hopeful that change is on the way because the FFIEC is reviewing a second wave of comments about the tool's efficacy.
The number of threat vectors in today's enterprise computing landscape is staggering. Many financial services firms are using dated security and compliance tactics - and equally dated technologies - to adhere to regulatory compliance requirements and protect against data breaches.
The problem? The approach isn't...
A Tennessee utility has sued its bank after a $327,000 account takeover incident. This new case shows why institutions must go above and beyond when it comes to detecting and thwarting fraud losses.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
A Missouri-based escrow firm is considering taking its fraud case all the way to the Supreme Court now that an appellate court has denied a request to have its case involving a $440,000 account takeover loss reheard.
In 2011, the FFIEC issued guidance requiring financial institutions to beef up their online authentication and fraud prevention efforts. Yet today, account takeover is more rampant than ever. Professional cybercrime crews easily circumvent common anti-fraud measures to steal millions from banks and credit...
The most recent Federal Financial Institutions Examination Council (FFIEC) supplement states that "...controls implemented in conformance with the guidance several years ago [the 2005 original guidance] have become less effective," and clarifies that "...malware can compromise some of the most robust online security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.