The Risks and Rewards of Mobile Banking Apps

| April 26, 2016

article image
"Mobile banking technology may be one of the best retention tools available to banks - a differentiator. Mobile banking customers are 53 percent less likely to leave; and if customers use both mobile banking and bill pay the retention rate increases to 82 percent. The challenge banks face is increasing the security of mobile banking to reduce the number of people who will not use mobile banking due to security concerns - 48 percent. Increasing mobile banking app security is attainable, and the retention and operational cost savings should make it a priority.

This white paper highlights:

App-based mobile banking is now the fastest growing delivery channel and offer banks huge operational savings over branches and ATMs;
The high risk behaviors of mobile device users exposes banks to an extensive variety and amount of malware, malicious apps, and data leakage;
Mobile banking app security is key to managing the risk and reaping the rewards of customer adoption and retention, and fraud reduction."

Spotlight

CompliancePoint

CompliancePoint delivers the governance, protections and assurances organizations need to succeed in an interconnected and data-driven world. CompliancePoint's privacy, security and compliance services help organizations understand and manage complex requirements and standards such as Cyber Security, GDPR, HIPAA, PCI, SOC, FISMA, Cloud Compliance, TCPA, TSR, Do Not Call, CAN-SPAM, CASL, and more.

OTHER ARTICLES

What You Need to Know About the Cybersecurity Solarium Commission Report

Article | March 20, 2020

The Cybersecurity Solarium Commission's recently released report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and prepare for resiliency and response before a major cyber incident occurs, not after. Unlike the original Solarium Commission, which operated in a classified environment, the Cybersecurity Solarium Commission chose to release its report publicly out of recognition that cybersecurity involves everyone. “In studying this issue,” begins the letter from Sen. Angus King and Rep. Mike Gallagher, the chairmen of the commission, “it is easy to descend into a morass of classification, acronyms, jargon, and obscure government organization charts. To avoid that, we tried something different: an unclassified report that we hope will be found readable by the very people who are affected by the very people who are affected by cyber insecurity – everyone. This report is also aimed squarely at action; it has numerous recommendations addressing organizational, policy, and technical issues, and we included an appendix with draft bills that Congress can rapidly act upon to put these ideas into practice and make America more secure.”

Read More

New Cyber Threat Index Shows Industries Are Under Attack in Uncertain Times

Article | April 16, 2020

It has been more than a month since businesses around the world started to implement contingencies in response to the Coronavirus. The Cyber Threat Index Report by Imperva Research Labs tracks changes in traffic and attack trends across multiple industries and countries. This month’s edition looks at how COVID-19 is affecting all industries across the globe. Our researchers have found that while some sectors are experiencing a dip in the number of attacks, on the whole they remain consistent. As the chart below shows, certain sectors have experienced a significant increase in attacks over the past few months: attacks on gaming are up seven percent, food & beverages are up six percent, and financial services are up 3 percent.

Read More

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | June 16, 2021

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

Wormable, Unpatched Microsoft Bug Threatens Corporate LANs

Article | March 11, 2020

Microsoft is warning on a wormable, unpatched remote code-execution vulnerability in the Microsoft Server Message Block protocol – the same protocol that was targeted by the infamous WannaCry ransomware in 2017.The critical bug (CVE-2020-0796) affects Windows 10 and Windows Server 2019, and was not included in Microsoft’s Patch Tuesday release this week. The bug can be found in version 3.1.1 of Microsoft’s SMB file-sharing system. SMB allows multiple clients to access shared folders and can provide a rich playground for malware when it comes to lateral movement and client-to-client infection. This was played out in version 1 of SMB back in 2017, when the WannaCry ransomware used the NSA-developed EternalBlue SMB exploit to self-propagate rapidly around the world.

Read More

Spotlight

CompliancePoint

CompliancePoint delivers the governance, protections and assurances organizations need to succeed in an interconnected and data-driven world. CompliancePoint's privacy, security and compliance services help organizations understand and manage complex requirements and standards such as Cyber Security, GDPR, HIPAA, PCI, SOC, FISMA, Cloud Compliance, TCPA, TSR, Do Not Call, CAN-SPAM, CASL, and more.

Events