Have you asked yourself, "What threats (new and old) is our institution going to have deal with this year?"
What data security threats will be most prevalent for banking institutions?
The volume of attacks from international sources has and will continue to increase.
Data security breaches tied to theft...
This is an example of the heightened insider threat that financial institutions now fear.
A federal grand jury in Maryland has indicted a disgruntled software programmer for planting a virus on mortgage giant Fannie Mae's servers in late 2008. Had the malware not been discovered shortly after the programmer's...
Information security experts are bracing for the law of unintended consequences to swing into action in 2009 as layoffs, downsizing and low morale bring the worst out of trusted insiders looking to profit off of proprietary intellectual property, customer contact lists, trade secrets and any other sensitive...
Reported data breaches increased by nearly half in 2008, and 12 percent of the total hacks were at financial institutions - up from 7 percent in 2007.
This is the news from the Identity Theft Resource Center's (ITRC) 2008 breach report, which shows that 2008's 656 reported breaches were up 47 percent over 2007's...
In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their customers and critical financial/informational...
A former Countrywide Financial Corp. employee was arrested by the Federal Bureau of Investigation earlier this month in Los Angeles for stealing and selling sensitive personal information, including social security numbers on an estimated 2 million mortgage loan applicants from around the country for the last two...
Interview with Cyber Crime Expert Eric Fiterman
In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their...
Eighty-seven percent of major data breaches could have been avoided through reasonable security measures.
This is the conclusion of a new report from Verizon Business Security Solutions, analyzing 500 forensic investigations of data breaches. Financial institutions made up 14 percent of all companies included in...
Workplace violence - it's one of the most common but least understood risks to all organizations.
From robberies gone awry to bullies in the workplace to domestic anger spilling over from home, the financial institution is rife for violent situations. In this interview, Kim Matlon, COO of R&A Crisis Management...
More than 220 million private records have been breached in the last three years. With the average cost of a data-leak incident reaching $6.3 million in 2007, organizations of all sizes must act to protect sensitive data.
One industry that is keenly aware of the importance of safeguarding personal information is...
Financial organizations must effectively manage a broad array of potentially damaging events caused or made possible by inadequate governance of user access to an enterprise's information assets. Such events range from policy and compliance violations of various regulations and measures, such as Sarbanes-Oxley Act...
The insider threat - it may be the hardest to detect, yet it poses the greatest risk to information security and regulatory compliance. And with recent, high-profile data breaches resulting from insider abuses, the topic is hotter than ever.
Register for this webinar to learn:
How to identify and mitigate...
While governments and industry watchdog groups are mandating security measures over privacy, healthcare and financial data, enterprises have their own business priorities and concerns that are equally vital to their ongoing success.
Companies are complex entities that create, modify, store, and move vast amounts of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.