Call Now : 888.433.2666 or Contact Us

UK Bank Announces Bitcoin Acceptance

September 15, 2015 – When many people hear the term “Bitcoin,” the mind immediately conjures images of the dark underbelly of the Internet, rife with drug dealers, hackers, smugglers, and money launderers.

But, as a New York Times article points out, the “innovations that helped turn Bitcoin into the most popular virtual currency are now being viewed as a potentially enormous disruptive force” for many industries.

The flame of interest around Bitcoin flared up late last month when Barclays, one of Britain’s largest high-street banks, announced that it would help charities accept Bitcoin payments. This would make the bank the first to support the currency, setting a precedent for banks and other financial institutions to follow.

For some time, banks have been exploring the uses of Bitcoin, trying to determine the possibilities behind digital currency and its underlying blockchain technology. Many financial institutions are discussing how Bitcoin can be used to change foreign currency trading, speed up and lower the cost of consumer payments, and more.

Opponents of the blockchain, a technology that validates transactions made in Bitcoin, believe that Bitcoin could potentially strip financial institutions of their control over the flow of money. 

Meanwhile, the cryptocurrency seems to be gaining steam in parts of the world where users don’t often have bank accounts but typically have smartphones and want to shop online, such as developing nations including India, Russia, Brazil, and Indonesia.

It remains to be seen if Bitcoins can become a viable global digital currency trusted by the mainstream financial communities and industries. This first foray by a serious player perhaps signals the “beginning of the beginning” of that transition.

Sources

Popper, Nathaniel. “Bitcoin Technology Piques Interest on Wall St.” The New York Times. The New York Times, 28 August 2015. Web. 9 September 2015.

Cloud Strategies Showing Upward Trend Even While Encryption Still a Risk

September 14, 2015 –Cybersecurity is a hot topic in today’s intricately interconnected virtual world, especially in the financial sector where the risk of information and identity theft is still high and can be dangerous.

A CNN writer noted that while state and federal laws are meant to act in the interest of public safety, an emerging technology poses a “serious threat” – that is to say, newer and more advanced methods of encryption protect user privacy in such a way that law enforcement is prevented from accessing the content, even in times of extreme need for the good of the individual, company, or nation at large.

The technology industry and many Americans have an absolute right to absolute privacy, but many argue that if technology firms build encryption systems where only they retain access, law enforcement should also be able to follow the appropriate legal process to obtain the suspected “bad actors’ records.”

Even though encryption is still spoken of as a risky business, the cloud strategies of financial firms appear to be rapidly maturing, according to a new report published by CipherCloud in July. The report states that financial firms have an increased confidence in cloud technologies, showing that 100% of respondents said they put certain personally identifiable information (PII) in the cloud, while 40% of organizations polled say that for the most sensitive information, they use tokenization and strong encryption. Tokenization typically uses randomly-generated codebooks to encode the data. These strategies demonstrate a clear trend to improve security as the sensitivity of data increases.

With more and more organizations using the cloud to store sensitive information, one of the main issues they face is data security compliance, as the risks of non-compliance are well-known: CipherCloud points out that analysts estimate total cloud spending will reach $28 billion in 2018, making cloud service providers a prime target for hackers.

Edcomm Group Banker’s Academy helps financial institutions and other organizations to navigate the ins and outs of cybersecurity news and trends. We offer popular and expansive course offerings on related topics and subjects such as risk management, common fraud schemes, information security, and cybersecurity.

Sources

Bourne, James. “New report shows finance sector becoming more comfortable with cloud adoption.” CloudTech. TechForge, 30 July 2015. Web. 31 August 2015.

Rogers, Mike. “Encryption a growing threat to security.” CNN. Cable News Network, 1 August 2015. Web. 31 August 2015.

Wheatley, Mike. “Financial firms’ cloud strategies ‘rapidly maturing.’” SiliconAngle. SiliconAngle, 4 August 2015. Web. 31 August 2015.

Commercial Cybersecurity Falls to FTC Amidst Growing Information Security Concerns

September 11, 2015 – According to an August 2015 survey issued by the Federal Reserve Banks of Atlanta, Boston, Dallas, Minneapolis, and Richmond, mobile banking has begun to outpace consumer adoption of the technology, while a March 2015 report from the Federal Reserve notes that about 52% of smartphone users use mobile banking and other apps to help them budget and track their money. Many banks, credit unions, and related financial institutions have continued to up their mobile offerings, driven by the need to attract and retain customers while competing with other services and institutions. Indeed, earlier in the summer several reports cropped up concerned with bank closings due to a general migration over to mobile and online banking.

The concern over the security of using our mobile phones for transactions where our personal identifying information is flying through the cloud has been mounting in recent years.

Indeed, according to a study conducted by MarketResearch.com, global cybersecurity is forecasted to jump from $106.32 billion in 2015 to $170.21 billion by 2020. With the hacks on Ashley Madison and Established Men still fresh on our minds, and the Target and WalMart hacks not far behind them, it’s no wonder that many companies and financial institutions are nervous.

Interestingly enough, late last month, an appellate court affirmed the Federal Trade Commission (FTC)'s role in “policing the cybersecurity of commercial companies, a role some have argued is an overreach of the regulator's authority.” As the costs of cybersecurity rise and the number of people using cloud-based and related technologies rise with it, many see the affirmation of the FTC’s governance as a step in the right direction. Others disagree, citing government oversight as an egregiously interloping regulator.

According to a Federal Times article, the FTC “is making major decisions about what constitutes strong cybersecurity for the private sector — decisions the commissioners themselves aren't always educated about.”

Whether or not that is true remains to be seen, but either way, the fact remains: cybersecurity threats are stronger and more prevalent than ever, and continue to increase exponentially with every new piece of technology that is introduced to the unwary consumer. There needs to be a driving force behind improvement in effective cybersecurity.

Sources

Boyd, Aaron. “Should FTC regulate commercial cybersecurity?” Federal Times. Tegna Co., 25 August 2015. Web. 8 September 2015.

Lawsuit Filed Against IRS for Massive Cybersecurity Breach

September 9, 2015 – On August 25th, two taxpayers filed a lawsuit against the Internal Revenue Service (IRS), alleging that the agency “didn’t do enough to protect their personal information from hackers.” The plaintiffs are seeking class-action status for the lawsuit.

This doesn’t come as a surprise after the agency reported in late May that the tax return information of approximately 114,000 U.S. taxpayers had been illegally accessed by cyber criminals over the preceding four months.

Worse yet, it came to light that rather than the original 114,000 victims, there might have been as many as, and possibly upwards of, 600,000 people targeted, while 300,000 were confirmed victims of the hack.

In an age where cybersecurity is at the forefront of everyone’s minds, and should be at the forefront of a government agency’s mind, it’s particularly disconcerting to note the ease with which security researchers reportedly hacked into the IRS’s website back in March.

The plaintiffs have claimed that the illegal access of records was preventable. More information will be forthcoming on the lawsuit.

Sources

Williams, Kate Bo. “Taxpayers sue the IRS over data breach.” The Hill. Capitol Hill Publishing Corp., 25 August 2015. Web. 8 September 2015.

Lawder, David, Emily Stephenson, and Sandra Maler. “IRS says cyberattacks more extensive than previously thought.” Reuters. Reuters, 17 August 2015. Web. 8 September 2015.

User-Targeted Techniques Still Favored Among Cyber Hackers

September 8, 2015 – A recent article discussed the continued prevalence of “tried-and-true” techniques and methods used by cybercriminals to gain unlawful access to a victim’s information. A mid-year report released by the cyber risk intelligence solution provider, SurfWatch Labs noted that, “the most common enabler for cybercrime methods was user interaction points with websites, applications, accounts and endpoints - accounting for 77% of all evaluated cyber intelligence collected and analyzed by SurfWatch Labs.”

One would think that with the increasing sophistication of cybercrime capabilities, these methods would fall, outdated, to the wayside. However, attackers still appear to go after “soft targets,” exploiting the numerous decision-points faced by end-users when interacting with technology. SurfWatch cautioned financial institutions and other organizations with an online presence to treat cybersecurity concerns with the same urgency and importance as other aspects of risk and security.

This is important to keep in mind when another report has found that half of all federal employees access government email and documents from their personal smartphones and mobile devices.

The lack of emphasis on cybersecurity concerns is alarming at the commercial level, and dangerous at the government level, particularly when considering the array of tools a cybercriminal has access to in order to steal sensitive information. Human carelessness is just another tool to add to that belt.

Sources

Kelly, Erin. “Federal workers’ personal devices pose security risk.” USA Today. MSN News, 20 August 2015. Web. 25 August 2015.

  • We switched to Banker’s Academy over a year ago from a different online training program. The cost savings was tremendous - which has been very helpful in this time of budget cuts. We found that the training content is precise, to the point, and always current. It doesn't have a lot Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129