Skip to content
Tips for Tech

Tech Alert Briefing for 3/23/2007

March 23, 2007
Update covering March 16 - March 22, 2007

Welcome to Tech Talk! In this week's edition of Tech Talk, BOL Guru Jeff Patterson writes about a perception that U.S. institutions choose customer service over security.


Jeff Patterson,
BOL GURUYou'll also learn:

  • Where most cyber attacks originate
  • The cost of unrecovered backups and the value of paper
  • Arrest in TJX stolen data
  • Increase in Bot Net controlled PCs
  • Greatest risk of data loss
  • Must-read documents for security professionals
  • The latest US-CERT Vulnerability Summary

Get the details below.
Free Secure Instant Messaging White Paper

Introducing
WebEx AIM Pro Business Edition


Osterman Research?s semi-annual tracking survey reveals that IM is found in over 93% of businesses.However, IT departments have a difficult time halting the proliferation of unsecured and unmanaged IM in their organization.

Learn more about securing IM

FREE Webcast: Trends in Commercial Credit Risk Management
Join Harland Financial Solutions for a free Webcast on Trends in Commercial Credit Risk Management. Learn about the relationship between risk and profitability, and how the proposed Basel risk-based capital rules will affect institutions of all sizes. Click here to register! Call 800-815-5592 or email moreinfo@harlandfs.com for details.

Webcast: SecureWorks talks about Managing Network Security Logs

Log files are a treasure trove of security data. Collecting, understanding and acting on this data is very difficult and time consuming. In this free Webcast look at log aggregation and monitoring, discuss what technology and resources are required and examine best practices.

Register today or formore info info@secureworks.com
Is it a choice between customer service or security?
Are U.S. financial institutions more attuned to customer friendliness and European institutions more concerned about security?That's one of the cultural differences pointed out by Paul Raines in CSOOnline.Read the full article and catch a glimpse of where banking security may be heading.

Where do most cyber attacks originate, China, Russia, or the United States?
While Chinese and Russian hackers frequently make the news, the largest number of cyber attacks originate from right here.Read the story on Silicon.com and find out what the threats are and where they are coming from.

Backup, Backup, Backup and Keep the Paper
You're backing up all your important data on a daily basis.But are you testing the backups to make sure you can recover when something goes wrong.Find out what it cost the Alaska Department of Revenue to recover when they couldn't restore from their backup tapes in SFGate.

Six Arrested After Using Data Stolen from TJX
Six people have been arrested for using credit card information from the TJX Companies data heist.CSOOnline reports that the six alleged fugitives used stolen credit card information to purchase Wal-Mart gift cards and then purchased computers, game systems and big screen televisions with the gift cards.The losses from the use of these cards are estimated at $8 million.

Bot Net Controlled PCs Increase. Are You Protected?
SecurityFocus reports that the number of computers centrally controlled in a bot net has tripled in the past two weeks. Nearly 1.2 million computers are infected members of a bot net.Make sure your anti-virus and anti-spyware software is up to date.

Risk of Data Loss is Greater from the Caretaker, than the Hacker
According to one university professor, you're much more likely to have your personal identity information lost by corporate America than stolen by hackers.The report referenced in InformationWeek suggests that businesses in the U.S. are losing 6 million electronic identity records a month.Are you protecting your customer records adequately?

Two Must-Read Documents for the Security Professional
SANS has two new papers every security professional should read:Web Application Auditing Over Lunch discusses the basics of testing the security of in-house web applications and CyberLaw 101:A Primer on U. S. Laws Related to Honeypot Deployments discusses how to properly deploy a decoy server designed to fool and catch hackers.

US-CERT Vulnerability Summary
The US-CERT Vulnerability Summary for the Week of March 12, 2007 lists fifty-six High, nineteen Medium and thirty-four Low severity vulnerabilities.Many of the reported vulnerabilities were from Apple's massive patch release and the Month of PHP Bugs.Additional flaws were found in DLINK's TFTP Server, Macromedia Shockwave, Oracle 10g, OpenBSD, Computer Associates eTrust Admin, MySQL and the Linux Kernel.


Subscribe to Tech Talk and BOL Tech Advisories.
CD ROM Training & Information Security Supplies
CD ROM Training
CD ROM Training
CD ROM TrainingPolicies/Job Descriptions & Related Sites
Information Technology Specialist

Information Systems Security PolicyArchived Technology and eBanking You have access to previous Tech Talk pages and Tech Alerts on BankersOnline's Technology & eBanking page.

First published on 03/22/2007

Briefing type: 

Banker Tools View All

A collection of useful resources for various areas of the bank which have been developed by members of the BankersOnline staff or have been created and contributed by users of the BankersOnline site.

Banker Tools

Penalties View All

Banker Store View All

From training, policies, forms, and publications, to office products and occasional gifts, it’s available here:

Banker Store

hot right now

image description

Looking for effective, convenient training on a particular subject?

BOL Learning Connect offers more than 200 courses ON-DEMAND or on CD ROM from AML to Reg Z and every topic in between.

Search Briefings

Briefing Archives