Why EMV cards won’t stop CNP fraud

As U.S. banks deploy chip-enabled EMV debit and credit cards, most articles on the subject imply the new cards will dramatically reduce fraud. According to a 2014 report by Aite Group, 37% of all U.S. credit card fraud involved theft of credit card numbers and...

Protecting your virtual infrastructure just got easier

With the release of version 8, Veeam introduced Cloud Connect. This new feature allows you to easily send your backup data off-site to a third party data center. As opposed to on-line backup systems like Carbonite or Mozy, Veeam allows you to maintain complete control...

Can you afford HIPAA non-compliance?

According to the American Medical Association, your company may be fined up to $1.5 million per year for HIPAA non-compliance. The first step of HIPAA compliance is making sure all of the companies who have access to your systems are, themselves, compliant. If you...

Is teller capture hurt by fewer branches?

Teller capture – also known as teller scan or front counter capture – is a processing workflow designed to take advantage of shifts in retail banking: the decrease in transaction volume performed at brick and mortar locations coupled with the prevalence of the x9.37...

Worst Security Breaches of 2014

There is a familiar theme in all security breaches, regardless of scale: careless oversight and failure to act proactively. Let these cautionary tales help ensure your organization does not fall victim to cyber criminals who will always exploit those who fail to...

More regulatory oversight of HIPAA is coming. Are you ready?

The Office of Civil Rights has delayed the implementation of Phase 2 of the HIPAA audit program until 2015 due to complications with their new web portal.  While this may be a welcome reprieve from the threat of an OCR audit, you should use your time wisely.  Phase 2...

IT Security – be sure to lock the doors!

Physical security is an often overlooked aspect of IT security. Don’t let your company fail to enact the simplest security measures of all! According to the FFIEC IT Examination Handbook, physical security is an examined aspect of your network security posture....

SIEM – Going Beyond Log Management

Do you log all critical events?  Do you archive them somewhere? The best practice for maintaining log data integrity is to centrally store all pertinent log data somewhere isolated from your network. In the event of an intrusion or a malicious insider attack, the logs...

Three caught embezzling half million

Charges have been formally filed against three former employees of the Oahu Transit Services Employees Federal Credit Union who were recently charged with embezzling nearly $500,000 over several years. An investigation to the thefts determined the actions of each were...

Target Data Breach – Slowly Getting Back Consumer Confidence

As of February, Target began reporting that in-store traffic and retail sales had started to recover following the data breach which impacted up to 40 million cardholders during the holiday season. However, the company still has a long way to go before it will reach...