Category: Uncategorized

  • Community Relationships and Banking

    We live in Angel Fire, New Mexico most of the year, a small resort town of about 2000 in off-season, which mushrooms to 10,000 at peak season. It’s a small community with a handful of banks and retail shops and a few good restaurants. We have become active in several community groups, and I noticed recently while making arrangements for another group meeting, that there is ONE place in town that is used over and over again for meetings by EVERYONE in town — the community room at the local Bank of America branch. In talking with one of the branch managers, they are well aware of the fact that this alone brings in MANY new customers for them, because of the proximity and people walking in their doors for meetings. The cost of adding this extra room has been paid for by the new business and community awareness of their branch and brand. So this set me to thinking about banks and how they can and SHOULD become a part of the community, which pays off in lots of ways. Community relationships must be a major part of any marketing plan for banks wanting to conserve advertising dollars, and yet get their name recognition boosted and out there so people will recognize it.

    (more…)
  • Have You Googled Yourself Lately?

    Weber Shandwick, a Bloomington integrated marketing firm, just released a study called “Risky Business: Reputations Online,” analyzing the impact of online reputations on corporations. Researchers found nearly seven out of 10 global executives fear for their corporate reputations as online risks grow.

    (more…)
  • 5 Common Programming Languages That Cause the Most Software Vulnerabilities

    Over the last couple of years, many cybersecurity problems have come to light. There has been a wave of WordPress and Drupal vulnerability warnings and patches, and SQL injection bugs are being found left and right in Web applications. Many of the bugs can be traced back to PHP, but other common programming languages can also cause vulnerabilities. Using cloud-based scans and code analysis of more than 50,000 applications over 18 months, Veracode found that the following five programming languages cause the most software vulnerabilities.programming languages

    (more…)

  • WordPress and Health Applications Are Now the Most Popular Web Attack Targets

    Research shows that WordPress and health applications are the most popular targets for online attacks. If you’re currently using WordPress for your website or offering a healthcare app, here are some key facts and figures you should know.blogging platform content management system

     

    Content Management Systems Are Most Vulnerable

    A new report by Imperva revealed that content management systems (CMSes) like WordPress, Drupal and Joomla were attacked three times more often than other web applications. They’re often targeted by remote command execution (RCE) attacks. Out of the most popular CMSes, WordPress is a particularly favorite mark of hackers.

    (more…)

  • 6 Secure Password Management Systems for Your Business

    Protecting the passwords of all your employees is a key part of IT risk management. Password management systems, in combination with other cybersecurity systems, can help to protect workers from becoming victims of hacking. Here are six of the best secure password management systems for businesses.secure password management

    (more…)

  • Is the Firewall Becoming Irrelevant? Here’s How to Move Forward

    Firewalls were created to protect and secure company data. Unfortunately, firewalls protect only company data well when it is kept within the confines of company networks. Today’s business data is rarely confined to the perimeters of a corporate network but is shared and transmitted widely through the cloud, presenting the firewall with some big security issues.computer network security

    (more…)

  • How to Build a Stronger Compliance Management Program in Your Bank

    While a successful and robust compliance management program in banks has a few basic components, there are no “one size fits all” rules. However, here are the vital elements that make up the backbone of an effective compliance management program.bank

    (more…)