Using digital technology like a big bank How was your holiday? Are the chargebacks rolling in yet? It’s no secret - digital technology like mobile device usage has increased significantly over the years, making it a breeding ground for fraudsters. As credit unions continue to grow their membership, their fraud security treatments need to grow as well. Bigger banks are constantly updating their fraud tools and strategies to fight against cybercrime and, therefore, fraudsters are setting their eyes on credit unions. Even as I write this, fraudsters are searching and targeting credit unions that don’t have their mobile channel secured. They attempt to capitalize on any weakness or opportunity: Registering stolen cards to mobile wallets Taking over an account via mobile banking apps Using a retailers’ mobile app to make fraudulent payments Disabling the SIM card in the victim’s phone and diverting the one-time password sent through text message to their own phones These are clever ways to commit fraud. But credit unions are becoming wise to these new threats and are serious about protecting their members. They are incorporating device intelligence with a solid identity authentication service. This multi-layered approach is essential to securing mobile channels, and protecting your Credit Union from chargebacks. To learn more about our fraud solutions, click here.
An employee who never uses a mobile device – personal or company-supplied – for business purposes is becoming a rare creature, indeed. Use of mobile devices is prevalent across virtually every industry, and the convenience and flexibility these devices offer professionals can be great for business. Provided, that is, those devices are secure. Mobile devices continue to be a significant source of data breaches, and a particular concern for anyone engaged in cyber security, according to eSecurity Planet’s Data Breach Roundup. Mobile-related data breaches stem from a range of circumstances, including loss or theft of devices, failure to use anti-malware, or failing to password-protect a device being used for business purposes. Devices can put your data at risk if an employee stores any proprietary information on a mobile device, or if workers use unsecured devices to access your network – even if you’ve taken steps to secure the network itself. Managing mobile devices can be one of the most challenging aspects of your overall cyber security program, but it’s imperative and – fortunately – not impossible. Minimizing mobile device risks CTIA, The Wireless Association, offers some guidelines for mobile device cyber security in its whitepaper “Today’s Mobile Cybersecurity: Blueprint for the Future.” The organization points to five cornerstones of mobile cyber security: Education about the importance of mobile security Devices with security features like anti-malware and anti-spam settings Strong, enforced network security policies Authentication for all network users Secure connections, from cloud to network Many tools exist to help your organization ensure secure footing on each of those cornerstones. CTIA cites options like risk management, security policies and monitoring. We would add to that list, and emphasize the importance of a data breach response plan that addresses the specific challenges and risks associated with a mobile-spurred data breach incident. While your organization can take strong, reasoned steps toward minimizing risks, it’s equally important to be ready to respond when a breach occurs. Mobile device security is sure to be a growing issue throughout 2014, as more people than ever use smartphones, tablets and other mobile devices to work more efficiently. With the right precautions, you can help ensure your employees work safely, as well. Learn more about our Data Breach solutions