Secure your wireless router before it is too late

Most of us use wireless routers at office and home. While the office routers are generally secured (hopefully), most home routers are provided by broadband operators wih default configurations and passwords.  In a worst case it may happen that these are set as unsecured. There is increasing risk of an intruder using an unsecured network or hacking into a home wireless network and sending out malicious mails. Continue reading “Secure your wireless router before it is too late”

Data Breach Involving Financial Data

Financial Institutions have always been highly susceptible to data breaches and as per indicators the first half of 2010 has not been any different. Already 39 breaches have been reported by Financial Institutions, and considering that reported breaches form a tip of the iceberg in relation to total breaches, actual breaches are expected to be significantly higher. Continue reading “Data Breach Involving Financial Data”

Smart Phones – Convenience or Threat?

The use of smart phones to access sensitive corporate information away from the office is creating huge security gaps for enterprises. Smart phones are being used to access company mails and applications. Atleast one major breach involving theft of application code has been attributed to malware from smart phones. So how do we benefit from the technology while addressing the risks Continue reading “Smart Phones – Convenience or Threat?”

Responding to Authentication challenges in Online Banking

Traditional authentication mechanisms for online banking have been password and/or a one time password from a dedicated token. Variants or a combination of these two authentication types have been deployed by most banks across the globe. Increasingly these traditional customer authentication methods are being challenged and defeated. Continue reading “Responding to Authentication challenges in Online Banking”