Call Now : 888.433.2666 or Contact Us

Cloud Strategies Showing Upward Trend Even While Encryption Still a Risk

September 14, 2015 –Cybersecurity is a hot topic in today’s intricately interconnected virtual world, especially in the financial sector where the risk of information and identity theft is still high and can be dangerous.

A CNN writer noted that while state and federal laws are meant to act in the interest of public safety, an emerging technology poses a “serious threat” – that is to say, newer and more advanced methods of encryption protect user privacy in such a way that law enforcement is prevented from accessing the content, even in times of extreme need for the good of the individual, company, or nation at large.

The technology industry and many Americans have an absolute right to absolute privacy, but many argue that if technology firms build encryption systems where only they retain access, law enforcement should also be able to follow the appropriate legal process to obtain the suspected “bad actors’ records.”

Even though encryption is still spoken of as a risky business, the cloud strategies of financial firms appear to be rapidly maturing, according to a new report published by CipherCloud in July. The report states that financial firms have an increased confidence in cloud technologies, showing that 100% of respondents said they put certain personally identifiable information (PII) in the cloud, while 40% of organizations polled say that for the most sensitive information, they use tokenization and strong encryption. Tokenization typically uses randomly-generated codebooks to encode the data. These strategies demonstrate a clear trend to improve security as the sensitivity of data increases.

With more and more organizations using the cloud to store sensitive information, one of the main issues they face is data security compliance, as the risks of non-compliance are well-known: CipherCloud points out that analysts estimate total cloud spending will reach $28 billion in 2018, making cloud service providers a prime target for hackers.

Edcomm Group Banker’s Academy helps financial institutions and other organizations to navigate the ins and outs of cybersecurity news and trends. We offer popular and expansive course offerings on related topics and subjects such as risk management, common fraud schemes, information security, and cybersecurity.


Bourne, James. “New report shows finance sector becoming more comfortable with cloud adoption.” CloudTech. TechForge, 30 July 2015. Web. 31 August 2015.

Rogers, Mike. “Encryption a growing threat to security.” CNN. Cable News Network, 1 August 2015. Web. 31 August 2015.

Wheatley, Mike. “Financial firms’ cloud strategies ‘rapidly maturing.’” SiliconAngle. SiliconAngle, 4 August 2015. Web. 31 August 2015.

Commercial Cybersecurity Falls to FTC Amidst Growing Information Security Concerns

September 11, 2015 – According to an August 2015 survey issued by the Federal Reserve Banks of Atlanta, Boston, Dallas, Minneapolis, and Richmond, mobile banking has begun to outpace consumer adoption of the technology, while a March 2015 report from the Federal Reserve notes that about 52% of smartphone users use mobile banking and other apps to help them budget and track their money. Many banks, credit unions, and related financial institutions have continued to up their mobile offerings, driven by the need to attract and retain customers while competing with other services and institutions. Indeed, earlier in the summer several reports cropped up concerned with bank closings due to a general migration over to mobile and online banking.

The concern over the security of using our mobile phones for transactions where our personal identifying information is flying through the cloud has been mounting in recent years.

Indeed, according to a study conducted by, global cybersecurity is forecasted to jump from $106.32 billion in 2015 to $170.21 billion by 2020. With the hacks on Ashley Madison and Established Men still fresh on our minds, and the Target and WalMart hacks not far behind them, it’s no wonder that many companies and financial institutions are nervous.

Interestingly enough, late last month, an appellate court affirmed the Federal Trade Commission (FTC)'s role in “policing the cybersecurity of commercial companies, a role some have argued is an overreach of the regulator's authority.” As the costs of cybersecurity rise and the number of people using cloud-based and related technologies rise with it, many see the affirmation of the FTC’s governance as a step in the right direction. Others disagree, citing government oversight as an egregiously interloping regulator.

According to a Federal Times article, the FTC “is making major decisions about what constitutes strong cybersecurity for the private sector — decisions the commissioners themselves aren't always educated about.”

Whether or not that is true remains to be seen, but either way, the fact remains: cybersecurity threats are stronger and more prevalent than ever, and continue to increase exponentially with every new piece of technology that is introduced to the unwary consumer. There needs to be a driving force behind improvement in effective cybersecurity.


Boyd, Aaron. “Should FTC regulate commercial cybersecurity?” Federal Times. Tegna Co., 25 August 2015. Web. 8 September 2015.

Lawsuit Filed Against IRS for Massive Cybersecurity Breach

September 9, 2015 – On August 25th, two taxpayers filed a lawsuit against the Internal Revenue Service (IRS), alleging that the agency “didn’t do enough to protect their personal information from hackers.” The plaintiffs are seeking class-action status for the lawsuit.

This doesn’t come as a surprise after the agency reported in late May that the tax return information of approximately 114,000 U.S. taxpayers had been illegally accessed by cyber criminals over the preceding four months.

Worse yet, it came to light that rather than the original 114,000 victims, there might have been as many as, and possibly upwards of, 600,000 people targeted, while 300,000 were confirmed victims of the hack.

In an age where cybersecurity is at the forefront of everyone’s minds, and should be at the forefront of a government agency’s mind, it’s particularly disconcerting to note the ease with which security researchers reportedly hacked into the IRS’s website back in March.

The plaintiffs have claimed that the illegal access of records was preventable. More information will be forthcoming on the lawsuit.


Williams, Kate Bo. “Taxpayers sue the IRS over data breach.” The Hill. Capitol Hill Publishing Corp., 25 August 2015. Web. 8 September 2015.

Lawder, David, Emily Stephenson, and Sandra Maler. “IRS says cyberattacks more extensive than previously thought.” Reuters. Reuters, 17 August 2015. Web. 8 September 2015.

User-Targeted Techniques Still Favored Among Cyber Hackers

September 8, 2015 – A recent article discussed the continued prevalence of “tried-and-true” techniques and methods used by cybercriminals to gain unlawful access to a victim’s information. A mid-year report released by the cyber risk intelligence solution provider, SurfWatch Labs noted that, “the most common enabler for cybercrime methods was user interaction points with websites, applications, accounts and endpoints - accounting for 77% of all evaluated cyber intelligence collected and analyzed by SurfWatch Labs.”

One would think that with the increasing sophistication of cybercrime capabilities, these methods would fall, outdated, to the wayside. However, attackers still appear to go after “soft targets,” exploiting the numerous decision-points faced by end-users when interacting with technology. SurfWatch cautioned financial institutions and other organizations with an online presence to treat cybersecurity concerns with the same urgency and importance as other aspects of risk and security.

This is important to keep in mind when another report has found that half of all federal employees access government email and documents from their personal smartphones and mobile devices.

The lack of emphasis on cybersecurity concerns is alarming at the commercial level, and dangerous at the government level, particularly when considering the array of tools a cybercriminal has access to in order to steal sensitive information. Human carelessness is just another tool to add to that belt.


Kelly, Erin. “Federal workers’ personal devices pose security risk.” USA Today. MSN News, 20 August 2015. Web. 25 August 2015.

Senior Scams and Elder Abuse Rampant

August 31, 2015 – Among the many concerns of the Consumer Financial Protection Bureau (CFPB) is the subject of elder financial abuse prevention. Back in July, Cordray indicated that the CFPB “will release an advisory later this year to help financial institutions prevent, recognize, and report financial abuse.” The CFPB recently launched state-specific guides for elder financial caregivers, which are needed due to differences in state laws and services, according to CFPB Director Richard Cordray. The CFPB has a page, with a variety of resources, referring to the financial protection of older Americans.

Even with this extra attention on an issue that is much bigger than most think, vulnerable seniors are consistently scammed out of hundreds of thousands of dollars every year. 

The 2010 Investor Protection Trust Elder Fraud Survey said one in five Americans over 65 has been victimized by a financial fraud and a 2011 MetLife Mature Market Institute study stated that financial exploitation costs seniors at least $2.9 billion annually. More recently, the San Francisco-based financial services firm, True Link Financial, released a report estimating that $36.5 billion is lost nationwide to elder financial abuse, with nearly 37% of seniors across the United States being affected by financial abuse in any five-year period. Without tens of thousands of baby boomers turning 65 every day in the United States, the problem is projected to get worse.

One of the ways that the CFPB and other financial authorities recommend assuaging the issue is for financial institutions and caregivers of those susceptible to abuse to watch for signs, including but not limited to:

  • Reviewing bills, bank statements, and Medicare/insurance Explanation of Benefit's (EOBs) on a regular basis
  • Title changes in real property or wills when a person is incapable of understanding nature of transaction
  • Suspicious withdrawals of cash or other unusual activity in bank accounts
  • Sudden "friends" with undue influence or control over a senior's decision-making

Edcomm Group Banker’s Academy seeks to help financial institutions and other organizations combat elder financial abuse. Raising awareness is important, and Banker’s Academy is prepared to assist with efficient eLearning delivery systems and informational course offerings, such as Elder Financial Abuse and Recognizing Elder Financial Abuse.


Thomas, Jeremy. “Senior scams: Financial elder abuse rampant and grossly underreported, prosecutors say.” Contra Costa Times News. Bay Area News Group, 12 August 2015. Web. 18 August 2015.

  • We switched to Banker’s Academy over a year ago from a different online training program. The cost savings was tremendous - which has been very helpful in this time of budget cuts. We found that the training content is precise, to the point, and always current. It doesn't have a lot Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129