Similar Articles |
|
Bank Director 2nd Quarter 2010 Glascock & Gaulke |
Are We Covered? 12 Critical Areas Directors Should Question Asking a few key questions ahead of time about IT risk may save enormous headaches later on. |
Global Services June 1, 2008 Imrana Khan |
Five Most Popular Outsourcing Risks As the practice of outsourcing matures, new risks emerge. Some call it next generation outsourcing risks. Let's take a look at the topic of managing risks in an outsourcing engagement. |
Insurance & Technology November 1, 2006 Maria Woehr |
Message Mania For insurers, e-mail and instant messaging provide easy ways to share information with distributors and employees, communicate effectively with customers and agents, and help claims adjusters transfer files to turn around claims - all in real time. |
Insurance & Technology March 16, 2004 Peggy Bresnick-Kendle |
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies. |
OCC Bulletin May 15, 2000 |
Infrastructure Threats -- Intrusion Risks This bulletin provides guidance to financial institutions on how to prevent, detect, and respond to intrusions into bank computer systems... |
OCC Bulletin November 1, 2001 |
Third-Party Relationships This bulletin provides guidance to national banks on managing the risks that may arise from their business relationships with third parties... |
Insurance & Technology September 14, 2004 Peggy Bresnick Kendler |
Framework for Security Insurers need effective security infrastructures to withstand online threats from hackers and cyber criminals, as well as lapses by unaware internal users. |
Information Today May 2005 Phillip Britt |
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. |
Wall Street & Technology October 23, 2007 Melanie Rodier |
Financial Firms Continue to Struggle to Plug Security Loopholes New technologies, such as pattern analysis, as well as awareness and training can help financial services firms keep hackers at bay. |
Bank Systems & Technology February 18, 2009 Ashfield & Shroyer |
Security Management: An Ongoing Challenge for Banks Banks face a difficult challenge in the area of security management. |
CIO October 15, 2008 Kim S. Nash |
Why Technology Isn't The Answer To Better Security You've beefed up your IT security arsenal, and you're focused on compliance. But you're still vulnerable. Here's why. |
CRM September 2012 Kelly Liyakasa |
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. |
Wall Street & Technology April 27, 2004 Ivy Schmerken |
Offshore Outsourcing: Is Your Data Safe? Financial-services firms are taking extra security measures at their offshore outsourcing facilities. Are security-related fears valid, or are they hype? |
Bank Systems & Technology June 1, 2005 Deena M. Amato-McCoy |
Virtual Lock-Down Although executives are well aware of the risks surrounding the security of their internal information, companies around the globe still fail to safeguard themselves from potential threats. |
Bank Systems & Technology August 24, 2006 Peggy Bresnick Kendler |
Identity Management Addressing the biggest threats to information security for banks. |
Bank Technology News September 2008 Tom Kellermann |
The Cyber Security Quagmire It's becoming essential that on a quarterly basis financial institutions conduct penetration tests on service providers. These tests should assess their network security posture, and verify whether they have layered security beyond firewalls, virus scanners and encryption. |
Entrepreneur September 2008 Mark Henricks |
On The Defensive Lock up employee data, or face the consequences. |
Investment Advisor June 2008 Irace & Mehta |
Security in a New Age How to protect your firm from 21st century online criminals |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
Bank Systems & Technology March 5, 2010 Penny Crosman |
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. |
CIO September 15, 2005 Scott Berinato |
The Global State of Information Security 2005 A worldwide study reveals a digital landscape ablaze, with thousands of security leaders fighting the flames. But amid the uncertainty and crisis management, there's an oasis of strategic thinking. |
HBS Working Knowledge June 30, 2003 Austin & Darby |
Computer Security is For Managers, Too Computer security isn't just an IT headache, say two Harvard professors. Here are eight to-do items for managers to protect their digital assets. |
CFO August 1, 2005 Kris Frieswick |
Background Checks Worries about personnel integrity are creating a few worries of their own. Apart from the philosophical question of whether the practice violates an applicant's right to privacy, widespread use of elaborate background checks poses several problems for employers. |
Entrepreneur December 2006 Chris Penttila |
Just Checking Should you conduct ongoing background checks on your employees? |
Bank Technology News September 2009 Mike Scheuerman |
Outsource the Small Stuff Small financial institutions typically struggle with their IT infrastructure. Often, the answer is outsourcing. |
Bank Systems & Technology May 7, 2007 Peggy Bresnick Kendler |
Bank Tech Experts Discuss Vendor Relationships Here, these industry experts talk about outsourcing and offshoring along with other areas of bank tech concerns. |
CIO June 1, 2002 Sarah D. Scalet |
Dr. Crime's Terminal of Doom Most computer attacks come from the outside. But the costliest ones come from the inside. Here's how to manage the risk without making honest employees feel like crooks |
PC Magazine February 3, 2004 Leon Erlanger |
IM and P2P Security The explosion of IM and P2P in the workplace can be a security nightmare. Here's how to keep your network--and your company--safe. |
CFO August 1, 2002 Scott Leibs |
First, Who's On? Hackers and viruses make for good copy, but the most significant threat may come from within. |
IndustryWeek August 1, 2005 John Teresko |
Protecting Intellectual Capital Strategic initiatives such as nanotechnology heighten the need for intellectual property safeguards. Here is a list of steps you can take to protect your company. |
T.H.E. Journal September 2003 Roger Del Russo |
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. |
InternetNews January 17, 2007 Ed Sutherland |
Less Data, More Security Will data minimization be the key to enhancing data security? Experts say it's a trend to watch. |
Entrepreneur May 2007 Chris Penttila |
Play It Safe Protect your business information when you subcontract. |
Bank Systems & Technology August 30, 2005 Maria Bruno-Britz |
Maximum Security Although all industries are susceptible to data theft, the costs in terms of reputation and dollars are particularly steep in financial services, and most banks are taking measures to reduce the risks associated with handling consumer data. |
Global Services May 28, 2008 |
The U.S. Presidential Race: Impact on Global Services-II Legal expert William B. Bierce predicts the expected changes in foreign direct investment, legal framework for global services, free trade agreements, and the overall implications for enterprise customers and service providers, after the November U.S. Presidential elections. |
Insurance & Technology November 17, 2004 Wendy Toth |
A Human Approach A recent study found that more than 70 percent of respondents failed to list training and raising employee awareness of information security as a top initiative. Yet communication among management may be the best security asset. |
CIO March 9, 2012 Stephanie Overby |
IT Service Providers and Customers Battle Over Data Breaches IT outsourcing providers and their customers are fighting hard over data security liability limits at the negotiating table, and the issue is going to get more contentious in the cloud. |
Insurance & Technology August 12, 2005 Wendy Toth |
Best Line Of Defense While insurance companies must secure their systems against ever-more-sophisticated attacks, they also must provide safe access to these systems for customers and business partners. |
CFO April 1, 2008 Scott Leibs |
Firewall of Silence Data security breaches are rampant, and costly. So why don't C-level executives talk about them? |
Searcher November 2005 Carol Ebbinghouse |
Another Phine Kettle of Phish: Identity Theft Prevention Ten things to do today to protect yourself against identity theft. |
Managed Care November 2006 Ed Silverman |
Loss of Protected Patient Information Real Danger for Health Care Plans There are plenty of ways that confidential data can escape managed care organizations, and the consequences can be major. Can you trust your employees? |
Insurance & Technology January 5, 2007 Larry Greenemeier |
The Threat From Within Insiders represent one of the biggest security risks because of their knowledge and access. To head them off, consider the psychology and technology behind attacks. |
T.H.E. Journal March 1, 2010 Charlene O'Hanlon |
Identity Scramble An identity management system can catch potential mistakes that could put your district at risk. |
CIO September 24, 2009 Matt Karlyn et al. |
Identity Theft: 7 Tips for Complying with FTC Red Flag Rules The FTC's Red Flag Rules for reducing fraud due to identity theft take effect on November 1. Here's what you need to do to make sure you comply. |
HRO Today Mar/Apr 2008 Kerry Ann Vales |
Compliance Outsourcing Gaining New Ground in HRO Contracts In a world of changing regulations, employers are increasingly looking to service providers to help ensure they meet all applicable mandates. Expect more contracts, especially mid-market ones, to tack on compliance as part of the service delivery. |
Bank Systems & Technology June 26, 2006 Peggy Bresnick Kendler |
Outsourcing Questions and answers about bank outsourcing. |
PC Magazine August 22, 2008 Matthew D. Sarrel |
Thwarting Identity Theft Identity theft has been a federal offense since 1998. But are we getting any better at dealing with it? Actually, we are. Here are several tips to prevent financial loss from identity theft. |
U.S. Banker December 2006 Karen Krebsbach |
Inside the Outsourcing World of India India's outsourcers are offering ever-more specialized services, giving banks added reasons to say "yes" to outsourcing. |
IndustryWeek April 1, 2002 Patrick Hernan |
Looking For Trouble Employees' backgrounds face closer scrutiny in the wake of Sept. 11... |
Wall Street & Technology November 26, 2007 Melanie Rodier |
Data Security: An Increasingly Daunting Task With breaches on the rise, consumer confidence waining, more data privacy regulations in the pipeline and a focus on outsourcing, financial services institutions must ensure they are protecting customer data -- both internally and externally. |