Remove Banking Remove Conference Remove Network Remove Social
article thumbnail

57,000 Bank of America Customers' Data Compromised in Breach

SecureWorld News

Bank of America is notifying customers that their personal information was compromised in a data breach impacting Infosys McCamish Systems (IMS), a third-party vendor. According to breach notification letters , the exposed customer data includes names, addresses, Social Security numbers, dates of birth, and financial account details.

Banking 93
article thumbnail

Research: The acceleration of Australian banks’ use of social media

Trends in the Living Networks

Financial services is one of the most industries in which the use of social media is the most relevant, not least because customer service is a critical differentiator between highly commoditized offerings. Social media, used well, provides an opportunity to build relationships in a world in which most financial services are executed online.

Banking 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Spotlight on Cybersecurity Leaders: Donna Ross

SecureWorld News

Donna Ross is a senior security and compliance executive with over 20 years of diverse risk, compliance, cybersecurity, technology, and operations experience within the manufacturing, insurance, banking, financial services, healthcare, and retail sectors. A : Learning, networking, and meeting with partners. A : Information Security.

article thumbnail

From cybersecurity to social justice, Rubica CEO Frances Dewing is an agent of unexpected change

GeekWire

I’ve always had a social justice kind of pull.”. I often say that I want Rubica to be a platform for social change,” Dewing said, as much as a business selling cybersecurity. Current location: I’m currently typing this while sitting on the bank of the Snoqualmie River. Your preferred social network?

Social 129
article thumbnail

Understanding the Essential Pillars of Phishing Mitigation

SecureWorld News

These attackers have criminal intent, as they'll lure in victims by claiming to be a friend, family member, bank, or other well-known companies and websites. These attacks can come from malicious instructions, social engineering, or authentication attacks, as well as heavy network traffic.

article thumbnail

CIO Fletcher Previn on designing the future of work

CIO Business Intelligence

Then, we quickly shifted our attention to the next phase, which was solving the security challenge of employees working in homes with smart thermostats, online classes, and video games all potentially on the same network. How do you define ‘best-in-class’ from a social perspective?

Network 128
article thumbnail

How CIOs can be pillars of stability in an uncertain world

CIO Business Intelligence

Several economists, a bank president, and a couple of reporters walk into a bar. The bank president wails, “ Economic hurricane.” minutes of downtime per year), and expanding digital capabilities in a world characterized by massive economic, political, social, and technological uncertainty. Give them a call.

CTO Hire 107