Operations

Proactive Endpoint Security a Must for Online Banking

With this approach, consumers’ sensitive information is never present in the data stream until the point of encryption.

September 23, 2010
KEYWORDS data , endpoint , security
/ PRINT / ShareShare / Text Size +

Despite traditional online security methods, credit card fraud happens every day, costing the financial industry millions of dollars and affecting thousands of consumers.

Many of these consumers hold misconceptions about shopping and banking online that leave them vulnerable to exploitation. With hackers becoming more sophisticated, anti-virus software is no longer enough to protect consumers.

Now, financial institutions can help protect the end-user with proactive endpoint security technology.

The Problem with SSL Security

Since its introduction in 1994, Secure Socket Layer (SSL) has been the de facto standard for Internet transaction security. It’s a low-cost, widely accepted technology that doesn’t require elaborate customization.

Once data has been SSL-encrypted, it’s virtually impossible to crack. SSL was specifically designed to protect information in transit only at the point where information leaves a computer.

Therefore, one of its inherent weaknesses is that it leaves information vulnerable and unprotected while it resides on the personal computer prior to encryption.

Given the tremendous effort required to break into modern corporate networks, organized cybercriminals have shifted their focus away from highly protected corporate servers and focused instead on the weakest link in the online security chain: the end user’s personal computer.

The typical computer user's failure to install and maintain even basic security measures such as antivirus software and security updates has made it increasingly easy for organized cybercriminals to steal their sensitive data for financial gain.

According to Symantec, “Antivirus and anti-spyware software, primarily reactive in nature, may have been sufficient to protect vital resources a few years ago, but not today. Proactive endpoint security measures that protect against zero-day attacks as well as unknown threats are now vital.”

Through proactive endpoint security, sensitive data is secured at the point of origin, before it ever reaches the computer, and transferred securely to an organization’s existing server.

It consists of a simple software component that’s installed on a personal computer or workstation, which interacts with the computer’s existing SSL engine to eliminate endpoint vulnerabilities and provide comprehensive protection of sensitive information during an SSL transaction.

Without requiring changes to existing systems, the technology successfully defends against man-in-the-middle and man-in-the-browser attacks, keyjacking, keylogging, spyware, malware, viruses, and other intrusions.

Next: How proactive endpoint security works

Post a comment to this story

heroes

What's Popular

Popular Stories

Recent Discussion

Great article! Unfortunately, most employees don’t feel valued or appreciated by their supervisors or employers. In fact, research has shown that the predominant reason team members quit their jobs is because they don’t feel valued. This is in spite of the fact that employee recognition programs have proliferated in the workplace – over 90% of all organizations in the U.S. has some form of employee recognition activities in place. But most employee recognition programs are viewed with skepticism and cynicism – because they aren’t viewed as being genuine in their communication of appreciation. Getting the “employee of the month” award, receiving a certificate of recognition, or a “Way to go, team!” email just don’t get the job done. How do you communicate authentic appreciation? We have found people have different ways that they want to be shown appreciation, and if you don’t communicate in the language of appreciation important to them, you essentially “miss the mark”. Additionally, employees need to receive recognition more than once a year at their performance review. Otherwise, they view the praise as “going through the motions”. A third component of authentic appreciation is that the communication has to be about them personally – not the department, not their group, but something they did. Finally, they have to believe that you mean what you say. How you treat them has to match the words you use. If you are not sure how your team members want to be shown appreciation, the Motivating By Appreciation Inventory (www.appreciationatwork.com/assess) will identify the language of appreciation and specific actions preferred by each employee. You then can create a group profile for your team, so everyone knows how to encourage one another. Remember, employees want to know that they are valued for what they contribute to the success of the organization. And communicating authentic appreciation in the ways they desire it can make the difference between keeping your quality team members or having a negative work environment that everyone wants to leave. Paul White, Ph.D., is the co-author of The 5 Languages of Appreciation in the Workplace with Dr. Gary Chapman.

Your Say: Who should be Credit Union Magazine's 2014 CU Hero of the Year?

View Results Poll Archive