Blog
-
Moving toward Compliance 2.0
Regulatory Compliance and Risk Management continue to be focal issues in the board rooms of our financial institutions.
(more…) -
Bank IT – Ancillary Applications are in
I don’t believe it’s news anymore when I tell you core system sales have tapered off in the past ten years. But here’s proof. In the year 2000, 7.3% of the FI population acquired a new core system. In 2009, the rate was approximately 2%. Going forward, it may stay at 2% or it may continue to decline, but it won’t increase.
via banktech.comGreat to see a couple categories in there that RiskKey applies to although I’m a little concerned when Art, who I really enjoy reading, says that core systems have done a “superb job of keeping their core systems up-to-date.” What? Really?
If you mean up and running, ok, but really trying to address the real problems that core systems have in regards to knowing, protecting, and helping their customers I’d say NO.
– Brad
-
Live Science: How to Avoid the FDIC Email Scam
By Leslie Meredith
(more…) -
One Quarter Of Enterprises Admit To Intrusion Attempts: Survey
From The Security Pipeline:
(more…) -
Banking Crisis for Dummies via Elizabeth Warren
Elizabeth Warren is the chairman of the oversight committee on TARP and was on the Daily Show with Jon Stewart last night. She does a good job of looking at the banking crisis in a very concise and simple way.
(more…) -
A Closer Look: How Secure Are Account Recovery Security Questions?
While businesses attempt to protect private and sensitive information from cyber attack in many ways, one of the most common methods is passwords. Passwords are considered a good strategy for protecting information on devices and Internet-based accounts because they require specific knowledge to gain access.
The drawback to using passwords for identity access management, however, is that they are often forgotten. Companies commonly deal with password recovery by using recovery questions that, when answered correctly, allow a user to obtain or change a forgotten password. But are account recovery questions secure?
(more…) -
Avian Flu…Why Plan? Part IV (final)
TGG has discussed the Avian Flu on several previous blogs. This is fourth and final article in a series of ideas to consider when planning a Business Continuity Plan that includes the Avian Flu.
(more…)
This article will address items to consider in Outsourcing, Supplies and Testing sections with this article.

