E-Theft Isn't the Only Way Banks Can Lose Data

Adams, John
September 2005
Bank Technology News;Sep2005, Vol. 18 Issue 9, p18
Trade Publication
Reports on data theft risk for banks related to improper disposal of computers and other electronic infrastructure. Removal of data from old computers and legacy systems; Services offered by CDI Corp. in computer disposal.


Related Articles

  • READERS' LETTERS. King, David; Dobbins, Julian // Computer Weekly;7/29/2008, p12 

    Several letters to the editor are presented in response to articles in previous issues including "Time to recognize security of data is a human problem" by Mike Gillespie and another on Banking's legacy systems.

  • Banks to overhaul legacy systems.  // Data Strategy;Oct2005, Vol. 2 Issue 1, p5 

    Reports on the results of a study conducted by Accenture and Systems, Applications and Products in Data Processing regarding the legacy systems of banks in Great Britain 2005. Decision of the banks on their legacy systems; Cost of running the systems.

  • Keeping pace with data security needs. Proffitt, Emily // Journal of Business (10756124);1/24/2008, Vol. 23 Issue 3, pB1 

    The article reports on the continued investment of banks in information security to keep pace with data security needs in Spokane, Washington. According to bankers, the importance of information security has risen significantly due to online banking and the tightening of information-security...

  • Behavior That's Abnormal. Kite, Shane // Bank Technology News;Sep2005, Vol. 18 Issue 9, p10 

    Reports on the efforts of banks in the U.S. to protect consumer data from internal and external threats. Real-time monitoring of the behavior of both the employee and customer users who access Web-based applications; Companies offering consumer data protection products.

  • The 4 C's of Core Banking. BOGAERTS, ERIK // Journal of Internet Banking & Commerce;Apr2011, Vol. 16 Issue 1, Special Section p1 

    Finding the best way to tackle legacy core systems has re-emerged as a key topic of debate among banks, from top tier global players to smaller, domestic institutions. With their vast, fragmented architectures, banks' legacy systems are typically cumbersome and lack the agility required to adapt...

  • COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION. Rizvi, Syed S.; Riasat, Aasia; Elleithy, Khaled M. // International Journal of Network Security & Its Applications;2010, Vol. 2 Issue 1, p82 

    This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this...

  • Staying a Step Ahead. CROSMAN, PENNY // Bank Technology News;Oct2013, p4 

    In this article the author focuses on the service attacks that cyberhacktivists began launching against banks. The author states that cybercriminals planning to steal money or information when no one's watching closely and hijacking an employee's computer or stealing a legitimate user's network...

  • CYBER WARFARE. Leon, Mark // Bank Technology News;Oct2013, p6 

    In this article the author focuses on the main types of cyber attacks and their impact on banks. Carlos Morales, vice president of global sales engineering and operations at security vendor Arbor Networks, states that they have seen an increase in the Al Qassam Cyber Fighters' botnet activity....

  • Legacy systems: The tireless workhorses of an industry. Teixeira, Diogo // American Banker;8/2/1993, Vol. 158 Issue 146, Management Strategies p12A 

    Discusses the problems and benefits of legacy systems in banking. Attributes of a legacy system; Slow progress in modernizing legacy systems; Computer Power Inc.'s system; Hogan system; Factors which lead to decline in the number of legacy systems; Need for banks to plan a future for their...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics