A Real-World Example of Social Engineering

A social engineering test presents a challenge to your IT security team like no other.  Typically, advanced systems can manage technical points of entry into your environment with firewalls, logging, SIEM systems, malware scanners, etc.  However, when the point of...

Integrating Instant Issuance Cards

Instead of sending a debit card in the mail, many banks and credit unions are providing debit cards using “instant issuance” technology. Instant issuance produces a debit card – including personalization options – to the bank customer in minutes. Some financial...

How to protect yourself from ransomware

You have a top-flight antivirus solution deployed and managed on your system. Your hardware firewall is automatically updated and continuously monitored by a great security team. You’ve blocked access to all known malicious and questionable web sites. Your email...

Why EMV cards won’t stop CNP fraud

As U.S. banks deploy chip-enabled EMV debit and credit cards, most articles on the subject imply the new cards will dramatically reduce fraud. According to a 2014 report by Aite Group, 37% of all U.S. credit card fraud involved theft of credit card numbers and...

Protecting your virtual infrastructure just got easier

With the release of version 8, Veeam introduced Cloud Connect. This new feature allows you to easily send your backup data off-site to a third party data center. As opposed to on-line backup systems like Carbonite or Mozy, Veeam allows you to maintain complete control...

Can you afford HIPAA non-compliance?

According to the American Medical Association, your company may be fined up to $1.5 million per year for HIPAA non-compliance. The first step of HIPAA compliance is making sure all of the companies who have access to your systems are, themselves, compliant. If you...

Is teller capture hurt by fewer branches?

Teller capture – also known as teller scan or front counter capture – is a processing workflow designed to take advantage of shifts in retail banking: the decrease in transaction volume performed at brick and mortar locations coupled with the prevalence of the x9.37...

Worst Security Breaches of 2014

There is a familiar theme in all security breaches, regardless of scale: careless oversight and failure to act proactively. Let these cautionary tales help ensure your organization does not fall victim to cyber criminals who will always exploit those who fail to...

More regulatory oversight of HIPAA is coming. Are you ready?

The Office of Civil Rights has delayed the implementation of Phase 2 of the HIPAA audit program until 2015 due to complications with their new web portal.  While this may be a welcome reprieve from the threat of an OCR audit, you should use your time wisely.  Phase 2...

IT Security – be sure to lock the doors!

Physical security is an often overlooked aspect of IT security. Don’t let your company fail to enact the simplest security measures of all! According to the FFIEC IT Examination Handbook, physical security is an examined aspect of your network security posture....