Sisk, Michael
September 2006
Bank Technology News;Sep2006, Vol. 19 Issue 9, p24
Trade Publication
The article discusses the security concerns of wireless connectivity in the U.S. Financial service executives are worried about the wireless access of laptops, pocket computers and cellular phones due to its vulnerability to hackers and thieves. This concern has appeared due to the increasing incidence of commercial fraud and identity thief. The SANS Institute, in their research, has expressed that the only way to assure security of the files is only by not letting others use the device.


Related Articles

  • LOCKING IT DOWN.  // SC Magazine: For IT Security Professionals;Aug2005, p31 

    This article provides tips on protecting personal data from phishers and identity thieves. Unless there is a specific reason that personal information is being stored, dispose of it. If data needs to be there, set a timetable for its length of stay and when it can be disposed of. Make sure that...

  • Protect your ID.  // Computer Shopper;Feb2013, Issue 300, p150 

    The article discusses the developments in computer security. It focuses on the so called phishing attacks, as well as identity theft, and how to protect one's account against them. It claims that phishing is among the major threats on the Internet that involves the theft of important information...

  • Scams. Lindenmayer, Isabelle // American Banker;2/10/2006, Vol. 171 Issue 28, p5 

    This article presents news and developments of scams and fraud involved in computer security and data protection. Impersonating dead people has become the fastest-growing type of identity theft in Britain. Fraudsters target the homes of people who have just died, collecting their mail and...

  • Taking Identity Security to the Next Level. Ruth, João-Pierre S. // njbiz;8/22/2005, Vol. 18 Issue 34, p3 

    Reports on the identity security systems, GuardedID and VerifyID, released by StrikeForce Technologies in August 2005. Features of the identity security systems; Recognition of the mode of operation of identity thieves; Cost of the systems; Views of security expert Bruce Schneier on digital...

  • Study: Breach-Related Fraud Rarer than Thought. Lindenmayer, Isabelle // American Banker;12/8/2005, Vol. 170 Issue 234, p11 

    The article looks at a report by ID Analytics Inc. on the number of data security breach-related frauds. The study suggests that such frauds are rarer than many assumed. The study analyzed four large breaches announced in 2005. Only in one data breach case was stolen information actually...

  • Online ID Authentication.  // Financial Executive;Mar/Apr2001, Vol. 17 Issue 2, p15 

    The article reports on the launching of IDshield by Safewww.Inc., a online banking security authentication system. The programs attempts to reduce identity theft and online fraud with an low-cost authentication algorithm that recognizes user's computers. It is also easily integrated into any...

  • Beware of pirates. Szala, Ginger // Futures: News, Analysis & Strategies for Futures, Options & Deri;Aug2005, Vol. 34 Issue 10, p10 

    Focuses on the issue of identity theft in electronic trading. Cases of account identification theft; Protection of trading accounts from hackers; Use of phising by hackers to obtain accounts on the Internet.

  • Use Technology to Protect Personal Information. SKILES, DAN // Investment Advisor;Mar2013, Vol. 33 Issue 3, p63 

    The article discusses the importance of protecting personal information on the Internet through reducing the amount of personal information that are available. Several reasons as to why lessening the amount of information on the Internet is important were mentioned including to prevent fraud,...

  • Threats. Lindenmayer, Isabelle // American Banker;12/2/2005, Vol. 170 Issue 230, p5 

    The article reports on various methods of fraud, forgery and identity theft discovered recently. The holiday shopping season has provided new opportunities for criminals. Moreover, because 90% of babies are issued a social security number before they leave the hospital and because they do not...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics