Wireless (Mobile) Banking Tools
Whether we’re offering fully engaged Mobile Banking solutions, dipping our toes in the water with text-based notifications, or are simply waiting proudly to be safe, late majority adapters . . . . we all know that the many technologies under the umbrella called “Mobile” present interesting and new risks. How are we going to respond when our customers blame US for their lost smart phones? What new attack vectors come with the rise of scary ideas like Consumer Capture or websites like Mint? What quick and cost-effective steps can banks take now, regardless of where we are in adoption, to identify and respond to this risk? In this presentation, Dan will walk us through the top five controls . . . . and illustrate the risks they are intended to mitigate.
Here are some FREE boilerplates that can be used to customize a wireless banking security program to any size financial institution.
- Wireless Banking Vendor Due Diligence Kit
- Alternative Vendor List
- Threshold Analysis
- Vendor Due Diligence Checklist
Leave a comment
Some small organizations continue to use customer data to generate initial passwords, Read more
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
Risk isn’t the only thing to consider when planning a decision tree. Another one of t Read more
While we’re not a news service, we often use current events to comment on trends and Read more