​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​

The National Banks of Central Texas honor their promise

by

A Tradition of Security

For more than a century, The National Banks of Central Texas have been helping customers build their financial security. Now they’re helping protect their sensitive financial and personal data online as well.“We are very aware of our customers’ privacy and were determined it wouldn’t be breached, especially in this day and age of identity theft,” said Barry Birchard, the banks’ Information Security Officer. “That’s why we chose Zix Corporation for our email encryption solution.”

With close to 30,000 customers — a significant number of them overseas on active military duty — The National Banks of Central Texas felt it was imperative they provide a top-notch level of security that would make their customers feel at ease when conducting online transactions from such far-flung postings as Afghanistan and Germany or as close to home as Copperas Cove or Gatesville, Texas.

“Having ZixCorp Email Encryption Services in place was a way we could guarantee our customers’ confidential information was protected,” said Birchard. “Before we implemented this solution, we were getting privacy questions from customers all the time. Now they can see right away that our email is encrypted and that makes them feel safer. They also like that they can ask us questions about their accounts by sending us a secure email themselves.”Birchard set up specific criteria that encrypt such personal data as account information, loan and mortgage applications, and Social Security numbers. “Anything of a sensitive nature is automatically encrypted,” he said.

Birchard says the ZixCorp® solution is easy to use and requires minimal maintenance. “The ZixCorp solution is a workhorse that keeps plugging away. I don’t have to do anything with it. I can set it and forget it, because it’s so reliable,” he said. “And when you’re a network administrator, you’re very grateful for that.”

Desktops targeted for complex slow targeted attacks.

by

Risk Level: MODERATE

Method of entry:

Small Application / script payload / website link / email or spam

How it works:

Small every changing random payload scripts are carried in and quietly usually on the back of an email, usb file, freeware program, facebook looking invites, shared movie files, shared audio torrents etc.

Method of deployment:

Slow deployment will not replicate itself and send off warning signals. Instead it sits quietly in its random form listing, learning, keying every website and keystroke. Eventually the most complex can initiate simple web sessions and “post” the data in the background using open web ports to the hackers servers. From there data is sourced and filtered, used and sold depending on the quality.

Target:

Desktops and Laptops contain user logon information to what matters; Data, bank information, credit information, identity. Hackers know this and realize the complexity of network hacks becomes difficult. Hackers are like electricity….they date the path of least resistance, and right now it seems the end-point is the place. Why try to hack through huge defenses, when you can ride in and learn all the passwords through an unprotected trusted employee?

Who is doing it:

Out of country hackers primarily, open source software. Thousands of faceless hackers work to develop and implement cross border attacks as enforceability is non-existent.

Why it can be a substantial threat:

It’s not defended using traditional methods of black list AV and malware. Anti technologies must first identify a “match” before it can block a threat. What if the threat keeps changing, keeps morphing, and randomizes?

How to mitigate:

The trillion dollar question is how to mitigate. Ironic that’s the kind of numbers in loss we are talking about if not handled. Impact on every organization is significant and should be top of mind. Technical Recommendations – We recommend software that limits payload deployment. Identifying what payloads or applications can run via a whitelist is a safe layer of defense as most other randomly created threats and applications fly right through AV. Executable white listing is simple and easy managed from a simple server software.

A switch from SonicWall – gateProtect

by

Security on an international level: Ameropa protects its global business with gateProtect

The Swiss company Ameropa AG was founded in 1948 and trades on an international basis. It currently manages the business of 22 Sectors located throughout the world from its headquarters in Binningen near Basel and is steadily expanding on all continents. Ameropa AG, which is not stockmarket listed, sees organic growth as instrumental in achieving this. Its core business is global trade in cereals and artificial fertilisers and also in petrochemicals and metals. Around 2,300 people work for the company, many of them in the field.

At the Ameropa headquarters in Binningen in Switzerland, administration of IT security is outsourced to the German service provider Computer Löwe. „In 2003, we put out 2 calls for tenders: for the replacement of the SonicWALL solution and an upgrade of the security infrastructure at Ameropa‘s international locations. In a direct comparison between SonicWALL and gateProtect, the Hamburg supplier clearly came out on top,“ says Markus Keller, Managing Director of Computer Löwe„This was mainly because the gateProtect firewall is so easy to operate, but also because SonicWALL were unable to offer German-speaking support.“ The intuitive and process-oriented front-end to the gateProtect administration client, the ergonomic Graphic User Interface (eGUI®), is the reason why it is so easy to operate.

The project has grown steadily over the last five years. Two gateProtect GPA 400 solutions have been implemented at Ameropa headquarters and guarantee high availability and failure safety. The foreign branches have acquired four GPA 250 and four GPO 125 solutions, which can be maintained remotely; however, the administrator can also make changes to the configuration locally, as required.

Conclusion

As operation has been trouble-free, the gateProtect implementation is being steadily extended. For example, there are plans to deploy more gateProtect solutions at the locations in the UK, Brazil and the Czech Republic. The existing Cisco VPN solution is also set to be replaced by the equivalent gateProtect product.

Banking on Zix Corporation for Secure Email

by

When you’re protecting the financial assets of millions of Americans, your key currency is trust.

That’s why leading banks and federal regulators, like the Federal Financial Institutions Examination Council (FFIEC) agencies, choose ZixCorp encrypted email Services to secure their customers’ sensitive financial and personal data.“Having ZixCorp Email Encryption Services in place was a way we could guarantee our customers’ confidential information was protected,” said Barry Birchard, The National Banks of Central Texas’ Information Security Officer. “Before we implemented this solution, we were getting privacy questions from customers all the time. Now they can see right away that our email is encrypted and that makes them feel safer.”

Focus on the Customer – Not Just Compliance

While Zix Corp Email Encryption Services provide compliance with federal and state regulations by automatically securing all non-public personal information (NPPI), they also offer an added bonus – peace of mind.

“Securing the delivery of information to our customers is a very high priority for us, not only from a legal and regulatory point of view but, more importantly, from the peace of mind it gives to all involved,” said Don Smith, STAR Financial Group’s Security Information Officer. “We had been receiving email from customers that contained unencrypted confidential information. Thanks to ZixCorp, when we respond, the data gets encrypted. It demonstrates our commitment to taking that extra step to protect our clients’ privacy.”

Don Morash, Vice President and Information Security Officer for Bank Rhode Island, agrees. “Protecting our clients’ information is our top priority. Regardless of the regulations out there surrounding privacy, it just makes good business sense to do that,” he said.

Bank Rhode Island looks to Zix Corporation for email encryption

by

When Bank Rhode Island was looking for an email encryption service for communicating with customers and business partners, it turned to Zix Corporation (ZixCorp) for the answer.

“I wanted an encryption solution targeted to the financial services market that needed very little investment in human capital and resources to set it up and minimal maintenance after that. Ease of use and ease of installation were key,” said Don Morash, Vice President and Information Security Officer for Bank Rhode Island. “That’s what ZixCorp delivered.”The fact that the Federal Financial Institutions Examination Council (FFIEC) agencies rely on ZixCorp for their email encryption was icing on the cake.

“What sold me was that ZixCorp has the federal regulators as customers,” said Morash. “If they’ve chosen ZixCorp, then obviously their email encryption service really works.”

Bank Rhode Island, founded in 1996, is a full-service financial institution with 16 branches across the state. With $1.5 billion in assets and 270 employees, it’s a mid-sized bank with a business focus priding itself on meticulous customer service. “We’re a community bank that really understands our clientele,” said Morash. “And in terms of protecting their information, we err on the side of caution.”ZixCorp®

Email Encryption Services allow the bank to leverage the efficiency of email communication while ensuring the appropriate controls to protect sensitive information as it’s in transit. “With this solution, we can permit electronic exchange of data, because we know it’s secure,” said Morash.

“If everybody were using the ZixCorp solution – if it became the world standard for email encryption – that would be great,” said Morash. “Then nobody would have to worry about whether their email is secure.”

Copyright © 2012 BorderLAN. All rights reserved.
Privacy policy | Terms of service
Find us on Google+