Most Popular Security Content
Sharing SAR information within the institution
05/01/2016
Our Compliance Division has taken the position of not letting us know if a SAR has been filed on a matter that we refer to them for a potential SAR filing. Is there some sort of regulatory requirement prohibiting the confirmation of a SAR filing?
ATM Fraud: Skimming vs. Shimming
04/25/2016
For several years now, the most prevalent form of ATM fraud has been “Skimming”, where a device is attached to an ATM that captures magnetic stripe data as the card passes into a machine. We recently heard of a new ATM fraud technique called “Shimming”. Are they the same thing?
How did scammers find our customer?
04/24/2016
We operate a small bank yet we experienced losses to criminals from Eastern Europe attacking our account holders. How did they know the information on our account holders and that they banked with our institution?
Beware the “invisible” workman
04/17/2016
Our computer penetration company compromised our financial institution by dressing like our local fire inspectors and taking an inspection tour of our branch. How do we detect those types of sneaky tactics by social engineers?
Differentiating ID Theft Protection Programs
04/10/2016
Are all ID theft protection programs offering basically the same services?