Preventing Financial Data Drain

By Britt, Phillip | Information Today, January 2007 | Go to article overview

Preventing Financial Data Drain


Britt, Phillip, Information Today


The mortgage lending industry has encountered the same data breaches as in other parts of the economy, which have resulted primarily from lost tapes and missing and stolen computers rather than outright hacks into data systems.

The potential for data loss is becoming more of a problem as more business turns electronic and moves away from the paper-based system that many baby boomers used when they bought their first homes. The lenders are now under pressure from regulators, business partners (e.g., loan funding sources), and customers to protect customer records.

Protection for a Prime Target

"The financial services industry is a prime target for data thieves and legislators," said Art Tyszka, senior product manager for Wolters Kluwer Financial Services. Financial services firms handle critical elements of a customer's data, including his or her name, address, phone numbers, and other personal data such as account information. With such data constantly under siege from external attacks, financial services providers that store this data also have to protect themselves against internal attacks.

Financial services firms also face overlapping legislation for customer data protection, including the Gramm-Leach-Bliley Act, the Sarbanes-Oxley Act, the Bank Secrecy Act, Federal Financial Institutions Council (a group that coordinates rules for different banking regulators, including the Federal Deposit Insurance Corp., Credit Union National Association, and others) guidelines, and various state rules. Each has its own minutiae and fines, so financial institutions need to keep pace with the parameters of these overlapping laws. Finding a single process to meet these overlapping requirements is critical, according to Tyszka and Alan Horton-Bentley, director of financial services worldwide marketing for FileNet (a company that manages content and processes for financial services and other firms).

"When you take a siloed approach to databases, it's more difficult to keep all of the data safe," Horton-Bentley said, explaining that multiple data sources increase the chances of having multiple potential weaknesses in data protection. It's also more cumbersome to ensure that multiple data sources comply with pertinent financial regulations for data security.

The Importance of Encryption

Another part of the solution is encrypting data that is in transit and at rest, according to some security experts. However, encryption usage is still in its infancy in financial services as well as in other industries.

According to a Wolters Kluwer Financial Services poll conducted in 3Q 2006, nearly one-fifth of financial institutions (18.75 percent) do not encrypt documents with sensitive data in storage or in transition. One-quarter of survey respondents also said that they didn't know if they actually encrypted sensitive data when it was stored or in transit. The largest percentage of respondents (37.5 percent) use a secure document delivery service, while 12.5 percent use a digital vault and 6.25 percent use a proprietary solution.

Phishing continues to be one of the most prevalent problems for mortgage lenders and financial services providers, according to Tyszka. Consumers who recover some of their losses to phishers are reimbursed by financial institutions about 42 percent of the time, according to Gartner in Stamford, Conn. Gartner predicts that businesses across the board will sustain phishing losses that will increase from $600 million in 2006 to $2.8 billion in 2007.

Phishing for Financial Rewards

Financial institutions are one of the main targets of phishers because of the potential high value to the fraudsters since customer accounts can be drained quickly. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Preventing Financial Data Drain
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Author Advanced search

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.