The New FFIEC Guidance – Five Tips to Ensure Compliance

By now, the new FFIEC guidance should have found its way onto your desk and to the top of your ‘To Do List”. After all, the January compliance deadline is fast approaching, so it’s time to get busy. The question everyone is asking is no longer “What is this?”, but “How do I do this? Where do I begin?” To help you, we’ve identified five key starting points for financial institutions. 1. Enforce strong step-up [...]

By | August 15th, 2011
Compliance & Business Continuity, Network Security & Solutions|Comments Off on The New FFIEC Guidance – Five Tips to Ensure Compliance

InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

What is this? A new "TDLv4" version of the TDSS rootkit, which was first discovered in 2008, has infected over 4.5 million machines world-wide as of April 2011. Infected machines are joined to a botnet which can be used for malicious purposes such as mounting network/endpoint attacks, allowing installation of more malware on the infected systems, distributing "spam" emails, and exfiltrating user data. The Dirty Details... TDLv4 uses a number of sophisticated components including rootkit [...]

By | July 18th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

InfoSight Made It to the Major Leagues!

Personalize funny videos and birthday eCards at JibJab!

By | July 8th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on InfoSight Made It to the Major Leagues!

Security Alert: W32/Zbot Malware (also known as Zeus)

InfoSight has detected a flood of phishing emails that are propagating through the Internet and targeting small community banks.  This spam campaign is delivering hundreds of thousands of messages that masquerade as a failed wire transfer, while delivering the password-stealing Zeus banking Trojan.  The hackers were very aware of who to target; they went after the individuals in the bank responsible for wire transfers. A snapshot of a sample email is provided below. The <From:> [...]

By | July 5th, 2011
Network Security & Solutions|Comments Off on Security Alert: W32/Zbot Malware (also known as Zeus)

6 Sure-Fire Ways to Increase Mobile Security

6 Sure-fire Ways to Increase Mobile Security Mobile threats have risen by more than eight times over the past five years, with a sharp increase in 2010. After some 200,000 users downloaded infected mobile apps from the official app store Android Market, Google pulled more than 50 infected programs from the Market. In an effort to protect information on mobile devices, IT managers are increasingly becoming aware of the need to not only apply security [...]

By | March 26th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on 6 Sure-Fire Ways to Increase Mobile Security

Data Loss Prevention: Should You Trust Your Employees?

Stolen identities, bank accounts and credit card numbers are sold in bulk every day in shadowy online forums, often for pennies on the dollar. Cyber criminals can easily make a few hundred to a few thousand bucks a day from selling this stuff. Data can be breached in many ways including intercepting it as it travels across the network, stealing data that is stored in file shares, databases and endpoints, and spying on data that’s [...]

By | March 22nd, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on Data Loss Prevention: Should You Trust Your Employees?

What Are the Odds of a Security Breach at Your Institution?

If your home has ever been burglarized, you know the unnerving feeling of being violated and how the experience can haunt you for a long time. Obviously, locks and bolts are only as strong as the door and the frame they’re fitted to. This is also true of the security posture of financial institutions. Outdated software applications, misconfigured devices, and ineffective security policies are much like the weak or rotten woodwork framing the door of your home ...

By | March 31st, 2009
Network Security & Solutions|Comments Off on What Are the Odds of a Security Breach at Your Institution?

How Does Your Security Strategy Rate?

Much to the chagrin of IT professionals who face the constant onslaught of threats and problems, security tests can never prove that you are secure. That’s because security is a process, not a final destination. As such, security testing should be applied with a well thought-out strategy...

By | March 31st, 2009
Compliance & Business Continuity, Network Security & Solutions|Comments Off on How Does Your Security Strategy Rate?

What Are the Top Security Threats for 2009?

Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers. Security threats are propagating more rapidly, becoming increasingly difficult to detect, and are exploiting technological and human vulnerabilities. Learn about the top security threats for 2009.

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on What Are the Top Security Threats for 2009?