09/04/2016
Does the new mobile financial service (MFS) guidance included in Appendix E to the FFIEC IT Examination Handbook for Retail Payment Systems provide any direction we’re supposed to take to meet expectations?
05/01/2016
Our institution is reviewing procedures for our wire room and call center to respond to inquiries or actual wire transfer requests. Do you have any suggestions?
04/24/2016
We operate a small bank yet we experienced losses to criminals from Eastern Europe attacking our account holders. How did they know the information on our account holders and that they banked with our institution?
04/17/2016
Our computer penetration company compromised our financial institution by dressing like our local fire inspectors and taking an inspection tour of our branch. How do we detect those types of sneaky tactics by social engineers?
01/24/2016
We have out of band authentication procedures already for payments. Won’t those work during a cyber-attack?
10/13/2008
On What do Red Flag Examiners Focus ?
09/01/2008
08/15/2005
Our organization uses a vendor to service our mortgage loans. The vendor emails trial balance data, (loan numbers, names, balances, etc.) to us. The emails are password protected. Is this sufficient under GLBA or must the emails be encrypted?
01/01/2005
This sample confidentiality agreement was provided by Dana Turner, Security Education Systems. BIO AND CONTACT INFO
10/04/2004
What are the privacy issues related to having a contract person providing loan analysis as opposed to a full-time employee? This person would be required to see financial statements, credit reports, and other personal information about existing customers.