Access "Blanca Guerrero: Online banking security is a balancing act"
This article is part of the October 2010 issue of Security 7 Award winners and the latest on effective security awareness
Addison Avenue Federal Credit Union serves over 140,000 members, a good percentage of whom don't live or work near a branch. As people move away from the area or change jobs, they would rather continue to do business with Addison Avenue online than change to a local bank. So it's important that we offer secure online and mobile access. Sounds simple, right? But finding the right mix of security and convenience can be a bit tricky. The convenience of our online banking is a big draw for our "remote" members. They appreciate having access to their money from any computer, 24 hours a day, every day. Our goal is for all of our members to feel that banking with us online is not only convenient but absolutely safe, just as safe as doing their banking at a branch. Behind the scenes, of course, is an infrastructure designed to keep our members' money and confidential information as safe as it can be. Specialized hardware, software, and a dedicated staff of information security specialists are hard at work to keep information in and intruders out. But the truth is ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Nick Mankovich: Maintaining health care privacy and security
by Nick Mankovich
In the world of health care, the more we value privacy, the harder we work to protect it.
-
Information Security magazine Security 7 Award winners
Information Security magazine annouces the winners of its fifth annual Security 7 Awards.
-
Learn about database security auditing tools
by Adrian Lane, Contributor
Database administrators are overcoming their distaste for database auditing tools; compliance and security are turning the tide.
-
Brian Engle: An effective information security program requires ongoing monitoring
by Brian Engle
A successful information security program uses ongoing oversight and monitoring to manage risks.
-
Christopher Ipsen: Government transformation through technological innovation
by Christopher Ipsen
The economic crisis gives government entities the opportunity to change for the better.
-
Nick Mankovich: Maintaining health care privacy and security
by Nick Mankovich
-
-
How to build an effective information security awareness program
by Lance Spitzner
The "people problem" continues to hamper information security efforts; what can be done about it?
-
Ezzie Schaff: Fighting online fraud requires delicate balance
by Ezzie Schaff
Countermeasures for thwarting Internet fraudsters must be balanced with customer service.
-
Blanca Guerrero: Online banking security is a balancing act
by Blanca Guerrero
Online banking security requires providing users with choices in order to minimize risk without becoming intrusive.
-
Julie Myers: Implementing an information security strategy in a decentralized environment
by Julie Myers
Implementing data security in a decentralized organization requires a collaborative approach.
-
Information security market consolidation
Flurry of acquisitions in information security industry expected to continue through 2011.
-
How to build an effective information security awareness program
by Lance Spitzner
-
Columns
-
Information security risk tolerance
by Susan L.T. Neubauer
Has regulatory and other guidance missed the most important aspect of information security?
-
A career in information security is often best served by staying put
by Lee Kushner and Mike Murray
Sometimes the best job is the one you have; it's the best place to build skills and develop new ones.
-
Information security professionals offer insight
This year's Security 7 winners offer advice for tackling enterprise security challenges.
-
Information security risk tolerance
by Susan L.T. Neubauer
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...