FFIEC-mobile-financial-Guidance

The debate over the relative importance of mobile banking was settled long ago. Mobile banking is already the number one channel for many customers of financial institutions, it is being used by about half of those with a banking relationship, it has grown to become the number two preferred channel overall and will soon become number one, and there is nothing on the horizon that can reverse these trends. Unlike… Read more


The impact of data breaches within the Healthcare Industry

The integration of technology within the healthcare sector continues to create seismic changes in how individuals receive medical care. Yet in their rush to adopt technology designed to improve the consumer’s experience, organizations within the healthcare industry face the very real threat of sensitive patient data ending up in the hands of cybercriminals. When it comes to the value of stolen data within the criminal underground, the more personal the… Read more


May 31, 2016 - Jodi Schechter
Face Recognition for Mobile Apps – As Easy As Taking a Selfie

Next time you take a selfie, it could be used for your own protection. Face Recognition is a simple, secure and user-friendly security feature that utilizes multiple facial data points to accurately authenticate end users and next generation likeness detection to defeat hacker spoofing techniques. The basic premise of biometric authentication is that everyone is unique and an individual can be identified by their intrinsic physical or behavioral traits. Much like fingerprints, face… Read more


A Shift in the Wind – Securing Patient Portals

I thoroughly enjoyed my time at HIMSS16 in Las Vegas. It was great to be back, see old friends and make new ones. The landscape, as it relates to security has certainly changed since my first HIMSS Conference in 2008. I recall walking the exhibit hall discussing multi-factor authentication and identity management only to receive blank stares or interesting comments from prospective partners and customers.   I heard, “we use usernames and… Read more


On the road to trusted identities in healthcare, or just more compliance work?

On Feb 9th, the Senate health committee unanimously (22-0) approved wide-ranging legislation designed to improve health IT by modifying requirements relating to the development and use of electronic health records (EHR). Senate Bill S. 2511, “To improve Federal requirements relating to the development and use of electronic health records technology” is clearly a result of Congress’ displeasure with the lack of interoperability, data sharing and security in our healthcare system… Read more


Electronic Signatures Vs. Digital Signatures – Defining the Difference

To satisfy the expanding need for esignatures in every industry, VASCO recently acquired a leader in the electronic signature space—eSignLive. With many of our clients asking for digital signature services, we wanted to make sure that YOU know the difference between digital signatures and electronic signatures—and how the two should work together to provide a secure and legally binding solution to your document-signing needs. eSignLive’s Defining the Difference blog is… Read more


Top 5 Security Stories in 2015

2015 was a remarkable year in the IT security area. There was never a dull moment with novel attack methods, new enemies, massive breaches of healthcare organizations and the OPM, Hacking Team’s embarrassing takedown, and cars and toys becoming targets. Hard to imagine it all fit into just 365 days and it doesn’t look like it will slow down one bit with the New Year. Below is a brief look… Read more


Touch ID

Biometrics – specifically the use of fingerprints, iris scans and facial recognition as a means of authentication – increasingly has become an accepted part of daily life. Several governments, including the United States, Canada and United Kingdom, have adopted biometrics, as the technology continues to improve. In 2013, Apple introduced Touch ID, a fingerprint scanning technology embedded in the company’s new (at the time) iPhone 5s. Touch ID signaled the… Read more


What does the new Directive on Payment Services (PSD2) Mean for PSPs?

On October 8th, the European Parliament adopted the revised Directive on Payment Services, also known as PSD2. This new directive, which is the long awaited successor of the first Payment Services Directive from 2007, aims to harmonize the European retail payments market, which is very much fragmented along national borders, and foster the adoption of innovative, easy-to-use and secure payment schemes. PSD2 is the latest development in a series of… Read more


Social Engineering

A famous Warren Buffet quote starts with this statement, “It takes 20 years to build a reputation and five minutes to ruin it…” For financial institutions, few things are as potentially damaging as customers suffering losses because of social engineering schemes. These types of attacks undermine consumer confidence in a bank’s brand, put customers at great risk of financial loss, and collectively cost the financial industry countless millions of dollars… Read more