Links in “Technology”
- You’ll Be Breached. Here’s What to Do When It Happens
If recent headlines have taught us anything, it is that it's not a question of whether your institution will be breached, but when. Here are five steps to implement before the inevitable occurs. [12/23/14]
- It’s the Little Things: Simple Security Slip Results in JPM Breach
Though JPMorgan spends an estimated $250 million per year on cyber security, the weak spot that resulted in a breach of customer data appears to have been a very basic one involving a network server that had not been upgraded to require two-factor authentication. [12/23/14]
- Payment Security Task Force Recommends Multi-Layered Approach to Card Security
A report issued by the Payment Security Task Force recommends a layered approach to protecting the security of card payments that includes a combination of chip technology, point-to-point encryption, and the use of tokenization to replace account numbers. [12/17/14]
- When Fraudsters Mimic Transaction History, What’s Next? Voice!
Fraudsters recognize that they need to pay attention to transaction history in order to make their transactions escape detection for as long as possible. Adding voice biometric analysis into the equation may be not only a way to thwart them, but detect who they are when calls are made to confirm their transactions. [12/16/14]
- Biometrics Ushering in the Post-Password Era
Alliance of 150 companies seeks to create a common standard for authentication, relying instead on fingerprints and other biometrics to usher out the "old world order of passwords and PINs." [12/16/14]
- EMV Train Building Up Steam
Merchant reluctance to invest in the technology and other obstacles are being steadily overcome, and the "EMV train has finally left the station and is building up steam." [12/15/14]
- 2014: The Year of the User
Employees, not the IT department, are leading financial institutions to the use of cloud apps, leading 2014 to be dubbed "the year of the user." [12/15/14]
- OCC on Cyber Security
Speech by OCC's senior critical infrastructure officer highlights rapid world of changing technology, rising risks, and response requirements needed to face those risks. Testimony provides a baseline of activities needed by financial institutions to promote compliance as well as recommendations for Congressional consideration regarding cyber security. [12/12/14]
- Considering Apple Pay? Better Know the Rules!
If you are considering offering Apple Pay through your credit union, you need to be aware of the regulatory requirements, including compliance with vendor management requirements, as well as the regulatory requirements under Regulation Z and Regulation E. [12/12/14]
- Baltimore CU Pioneering Use of Facial Biometrics
Securityplus FCU in Baltimore, MD, will be participating in pilot program to test a new biometric ATM that will use facial scanning technology to authenticate a cardholderâs identity. Securityplus has been using other forms biometric identity technology for employee verification for over ten years. [12/12/14]