Preventing Financial Data Drain

By Britt, Phillip | Information Today, January 2007 | Go to article overview

Preventing Financial Data Drain


Britt, Phillip, Information Today


The mortgage lending industry has encountered the same data breaches as in other parts of the economy, which have resulted primarily from lost tapes and missing and stolen computers rather than outright hacks into data systems.

The potential for data loss is becoming more of a problem as more business turns electronic and moves away from the paper-based system that many baby boomers used when they bought their first homes. The lenders are now under pressure from regulators, business partners (e.g., loan funding sources), and customers to protect customer records.

Protection for a Prime Target

"The financial services industry is a prime target for data thieves and legislators," said Art Tyszka, senior product manager for Wolters Kluwer Financial Services. Financial services firms handle critical elements of a customer's data, including his or her name, address, phone numbers, and other personal data such as account information. With such data constantly under siege from external attacks, financial services providers that store this data also have to protect themselves against internal attacks.

Financial services firms also face overlapping legislation for customer data protection, including the Gramm-Leach-Bliley Act, the Sarbanes-Oxley Act, the Bank Secrecy Act, Federal Financial Institutions Council (a group that coordinates rules for different banking regulators, including the Federal Deposit Insurance Corp., Credit Union National Association, and others) guidelines, and various state rules. Each has its own minutiae and fines, so financial institutions need to keep pace with the parameters of these overlapping laws. Finding a single process to meet these overlapping requirements is critical, according to Tyszka and Alan Horton-Bentley, director of financial services worldwide marketing for FileNet (a company that manages content and processes for financial services and other firms).

"When you take a siloed approach to databases, it's more difficult to keep all of the data safe," Horton-Bentley said, explaining that multiple data sources increase the chances of having multiple potential weaknesses in data protection. It's also more cumbersome to ensure that multiple data sources comply with pertinent financial regulations for data security.

The Importance of Encryption

Another part of the solution is encrypting data that is in transit and at rest, according to some security experts. However, encryption usage is still in its infancy in financial services as well as in other industries.

According to a Wolters Kluwer Financial Services poll conducted in 3Q 2006, nearly one-fifth of financial institutions (18.75 percent) do not encrypt documents with sensitive data in storage or in transition. One-quarter of survey respondents also said that they didn't know if they actually encrypted sensitive data when it was stored or in transit. The largest percentage of respondents (37.5 percent) use a secure document delivery service, while 12.5 percent use a digital vault and 6.25 percent use a proprietary solution.

Phishing continues to be one of the most prevalent problems for mortgage lenders and financial services providers, according to Tyszka. Consumers who recover some of their losses to phishers are reimbursed by financial institutions about 42 percent of the time, according to Gartner in Stamford, Conn. Gartner predicts that businesses across the board will sustain phishing losses that will increase from $600 million in 2006 to $2.8 billion in 2007.

Phishing for Financial Rewards

Financial institutions are one of the main targets of phishers because of the potential high value to the fraudsters since customer accounts can be drained quickly.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Preventing Financial Data Drain
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.