Crushing the Compliance Burden with Artificial Intelligence

Posted by Hannah Day

Nov 28, 2018 11:00:00 AM


Fraudster tactics that target financial institutions (FIs) continue to evolve at a dizzying pace. Compliance departments are being brought to a breaking point as they work to sort through the mountain of transactions, data, and false positives each day. Compliance staff employees at FIs large and small are looking for a solution to bring efficiencies to the FI in an effort to save time, money, and ensure they protect their end users against fraud. Artificial intelligence (AI) may just be the solution they are searching for.

Read More

Topics: artificial intelligence, Regulatory Compliance, compliance, Anti-Money Laundering, Information Security, Fraudster

Holiday Shopping Safety

Posted by Strategically Speaking

Nov 14, 2018 11:00:00 AM

Naughty or nice! A perfect holiday line to summarize what cardholders, financial institutions, and merchants wonder about each credit and debit card transaction this time of year.

We know once fall arrives that the holiday season is close behind. Physical stores and online sites begin promotions and holiday décor early, well before Thanksgiving arrives. Consumers start shopping early. We move fast. Fraudsters count on that.

Read More

Topics: retail, financial institution, Cybersecurity, Information Security, credit cards, Thanksgiving, Christmas, cyber monday

Are You Ignoring Your Core?

Posted by Pete Major

Jun 20, 2018 11:00:00 AM


All systems require some type of regular investment (time, money, sweat, and maybe even some tears) and this is particularly true for your core system. Whether you use a service bureau or you have an in-house system, it’s easy to think that once you convert to a new system your job is done. But with any system, it’s important that you stay up to date. Things are changing at a dizzying pace in this industry and your financial institution (FI) needs to stay at the forefront. Here are some tips and tricks to help you stay current with your core.

Read More

Topics: Core, technology, banking, software, Information Security, Cybersecurity, Risk Mitigation, financial institution

The Future of Security Biometrics: You Knew Me at “Hello”

Posted by Hayley Turpen

Aug 30, 2017 12:01:00 PM

In today’s world, it is not just the younger generation (or Gen Z in my case) that are becoming more comfortable talking to their smartphones, Google® Home, and Alexa for everyday functions. These types of major technology companies are defining consumers’ expectations and behavior, and it won’t be long until this trickles down to the financial services sector and for consumers to expect banks to provide voice recognition technology.

Read More

Topics: Tomorrow's Technology, Information Security

Question: When Does “It” End? Answer: “It” Doesn’t.

Posted by Craig Laures

Mar 1, 2017 11:30:00 AM

Generalities aside, the “it” referenced is representative of the constant and difficult movements financial institutions (FIs) must accomplish. Movements that protect the FI and its customers from a wide array of current cyber-criminal threats, evolving threats, and the constant evolution of regulatory compliance for direction in how to manage these potentially devastating attacks.

The menace of cyber-crimes against FIs and their customers continues to evolve in frequency, on-the-surface simplicity, and behind-the-scenes complexity. Ransomware, malware, and phishing tactics are now new lines of business for criminals. In fact, criminals like to call their victims “customers,” and they work hard to provide great service to their customers in order to receive payment/ransom for returning stolen data.

Now that FIs are required to address the role of Information Security Officer (ISO), the hero-of-the-day role is filled.

Read More

Topics: Cybersecurity, Information Security

Security in the Financial Services Industry

Posted by Stephen Gilmour

Oct 12, 2016 10:15:00 AM

Have you heard of Sutton’s Law?

It’s the principle of focusing on the obvious answer to a problem. You might recognize it better from its source, the convicted bank robber Willie Sutton, who is alleged to have answered, “Because that’s where the money is,” when asked why he robbed banks. In his autobiography, Sutton says that while he probably would have said it if asked, he actually robbed banks because he enjoyed it, loved it even. Well, that’s where the money still is – in financial institutions – and it stands to reason that the attackers targeting them enjoy what they do and find it profitable. The methods used by the attackers may have moved on, with cybercrimes rising at an alarming rate, but the end result is the same: financial loss. So what is security in the financial services industry? More to the point, how do you know if you’re being effective with your approach to security?

Read More

Topics: Information Security, Cybersecurity

Identifying Gaps in your Cyber Resilience Strategy

Posted by Jackie Marshall

Oct 5, 2016 10:30:00 AM

According to the 11th Annual Global information Security Survey conducted by PWC and CSO, 84% of CEOs, 82% of CIOs and 78% of CISOs are confident in their organization’s formal cybersecurity program. However, the number of organizations reporting losses of more than $10 million per incident is up 75% since 2012. Why do these C-level members believe their cybersecurity programs are doing more than an adequate job? Perhaps it’s because their organizations are most likely spending more of their annual budget on cybersecurity defenses and applying more internal resources to manage cybersecurity controls.

Read More

Topics: Cybersecurity, Information Security

How Can I Improve My Incident Response Plan?

Posted by Jennifer Roland-Vlach

Jul 6, 2016 10:05:00 AM

Incident Response Plans have been a critical component for financial institutions (FIs) for quite some time now.

The foundation was outlined as part of GLBA and guidance was later issued on the requirements for these response programs where customer information had been accessed. So this raises the question, if Incident Response Plans have been a necessity for so long, why do so many FIs continue to have ineffective plans in place? I can only speculate as to the reasons why; however, I do know that the expectations for Incident Response Plans are beginning to change. I have spoken with a number of institutions who have shared that their examiners are honing in on Incident Response Plans. With this increasing focus on plans, I want to share with you a few of the most critical pieces that I often see missing from Incident Response Plans.

Read More

Topics: Information Security, Risk Mitigation

Am I Really Expected to Remember My Password - N@mE61520?

Posted by Hayley Turpen

Jun 8, 2016 10:00:00 AM

It has been reported that the average internet user has approximately 20 passwords. I must not be average, because when I sat down to try to count mine I came up with 75... and I probably forgot a few! That is a lot of passwords to remember. I can’t even fathom a guess as to what the password was for half of these sites. So when I try to login, I will cycle through the passwords that I “think” I used. If none of them work, then I will click the link stating I forgot my password.

Read More

Topics: Information Security, Cybersecurity

Business is About People (and Their Data)

Posted by Eric Flick

Aug 19, 2015 4:08:47 PM

While it may sound cliché, our customers and employees are people.  Without them, our business doesn’t exist.  And, in this always on world, we live in, its mind boggling the amount of data that any one individual can generate.  Do an internet search of your name, your phone number, and your home address.  You may be astounded at what comes up.  There is data about you everywhere.  If you work for a financial institution (FI), your customers and members expect the data that you have related to them to be safe, secure, and available.  Surprisingly, of those three, secure may be the most straightforward, but that’s a different conversation.  We work with dozens of prospects and customers each and every week as they look at the gigabytes and terabytes of data they have across a myriad of platforms.  Beyond secure, how do they keep that data safe and available should they experience a business disruption to their data center? 

Read More

Topics: Information Security, Risk Mitigation

Subscribe to Email Updates

Recent Posts


see all