spot_img

CATEGORY

Data Security

    Tips for Identity Theft Prevention

    Identity theft can happen to anyone at any time, and it is important to keep safety measures on the top of our minds as...

    How Technology is Facilitating Collaboration to Reduce Fraud

    Organized fraud rings are growing more sophisticated, sharing technology, data and insights designed to defraud financial institutions. FinCEN is now encouraging banks and credit...

    The Growing Importance of Secure Remote Document Signing

    As a result of shutdowns throughout the country and the rest of the world, remote work surged in 2020. And while many companies have...

    SIM Swap Fraud: How to Stop Criminals from Stealing Your Phone Number and YourMoney

    Chances are you’ve tried logging into a mobile app with a password and received a six-digit one-time passcode (OTP) via text message (SMS), which...

    SOC Certified Technology Partners: Keeping Financial Institutions Secure

    With more people working remotely, financial institutions are looking to offer more secure and flexible connections to their data and services, which often leads...

    10 Steps Retail Banks Can Take to Assess and Mitigate Data Security Risk

    When the FTC introduced proposed changes to GLBA’s Safeguard Rule last year, security experts sat up and took notice. The updates marked the first...

    Four Steps to Creating a Data-Centered Culture (But Don’t Forget Step Zero)

    Running a financial institution in today’s market can feel like a never-ending game of catch up. As soon as a bank adapts to one...

    Phishing for Dollars – what can a bank do?

    The email in your inbox may look like a legitimate email from your bank or credit union, complete with a logo and website address....

    Defining Digital Banking

    The definition of digital banking has changed significantly over the years. In 1994, Microsoft Money personal finance software, which supported online banking, changed how...

    How Financial Organizations Can Begin Their Journey Towards Secure Edge Operations

    Financial services organizations have traditionally utilized virtual private networks (VPNs) to connect remote locations and/or to deploy new apps.  Until rather recently, VPNs were...

    Data Breach Deluge: Here’s How to Get Ahead of Your Vulnerabilities

    No organization, regardless of size or Information Security (InfoSec) resources, can consider itself data-breach-proof. However, by implementing best practices and investing in cyber defenses,...