The deadline of June 30th has come and gone, and thousands of companies have demonstrated that they are incapable of complying with a set of security guidelines to prevent data breaches and protect credit card data against identity theft. These security guidelines are from the Payment Card Industry (PCI).
Here are some tips to follow to protect your personal and work related data.
Use and maintain anti-virus software and a firewall - Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall.
To create an effective information security incident response capability, banks need to first understand where they are in terms of security readiness. Benchmarking the information security program is one of the most difficult and important tasks a chief information security officer will face. That task has gotten...
Laptop and mobile security is part of any institution's physical computer security effort. For some people, a laptop is their travel buddy and losing it or any data on it would be disastrous to your institution as well as to the employee.
Given the high cost of containing information security breaches, financial institutions have invested lots of time and money into developing incident response programs. But how do they know if their program is working properly?
Lessons learned from TJX and previous data breaches to improve data protection
Outline data protection regulations financial institutions face
What regulators expect financial institutions to have in place for data protection
Best practices in data protection from a regulator, banker and processor
The revelation by TJX Companies, owner of T.J. Maxx and other retail brands, that at least 45.7 million credit and debit cards were compromised over several years highlights anew the risks associated with processing card transactions and the need to protect the information they contain.
What are some of the constants - - and you’ve obviously, with your years of experience, seen many of them, but what are we still dealing with, the problems you had back in the early days, in terms of information, security and risk? And is the TJX data breach that just recently hit the headlines a glimpse of...
Banks are attracted to Voice over Internet protocol (VoIP) as an alternative to traditional telephone networks because of the potential cost savings, including elimination of long distance charges and the need for only one network to manage both voice and data. However, VoIP entails increased data security risks,...
Securing the network against intrusion is more than complying with the Federal Financial Institutions Examination Council’s mandate for strong authentication—although it’s certainly that. It also makes good business sense. Financial institutions that implement information security technology and...
Prior to joining the American Bankers Association, Doug spent ten years as Assistant Director of the Florida Division of banking where he oversaw the supervision and regulation of Florida’s domestic and international banking industry. During that time, Doug served as an advisor to the US Congressional Office...
Are financial institutions implementing the multifactor authentication laid out in the FFIEC Guidance? That was one of the issues discussed at the RSA panel presentation, "37 Days After the FFIEC Guidance Deadline." The panel of banks, credit unions and industry experts talked about what it took to get this far, and...
LINDA MCGLASSON: Welcome to another podcast in our podcast series. I’m Linda McGlasson with BankInfoSecurity.com, and today we’re speaking with Catherine Allen, CEO of BITS, the financial services roundtable. Catherine Allen is a noted innovator and visionary in the financial services industry. Named...
Information Security Media Group recently attended the RSA Conference 2007, the premier information security conference representing more than 200 comprehensive educational sessions and close to 400 of the top vendors in the infosec industry. The following audio is a selection of recordings taken on the expo floor...
Voice verification is a form of biometrics that involves using voice prints and recognition of the user's phone, a combination known as a voice token. It is regarded as a next-generation authentication technology.
The more-advanced voice recognition systems record and store combinations of sounds and notes. For...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.