Security

Two-Step Verification (2SV)

A majority of sites and applications typically require the use of a username, as an identifier, and a password, as a primary authentication method. Depending on assessed risks and the sensitivity of data accessed through the login form, a more secure login posture may be required. A MultiKey authentication system provides the opportunity to configure [...]

Three Steps to Reduce Your Attack Surface

As more and more malicious actors are roaming into the wild trying to gain access to any system they can, it is important that banks review and reduce their “attack surface.” An attack surface is simply, the number of possible ways a malicious actor can get into a device or network and extract data. This [...]
secured mobile phone on desk next to air pods, glasses, a pencil, and a succulent

Mobile Banking Security

There is little doubt that mobile apps have made the banking process more convenient for people. According to the FBI, United States financial providers estimate more than 75% of Americans used some form of mobile banking in 2019. And since the beginning of 2020, there has been a 50% surge in mobile banking. With this [...]
internet of things, computer on table

Securing Your Bank’s Internet of Things

I recently heard about a number of stories circulating in regard to malicious actors using everyday devices you have installed and connected in your businesses and homes to hack you. This article provides some further expertise and knowledge on the subject matter. The Internet of Things (IoT) consists of almost anything electronic, nowadays. What determines [...]