<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=905697862838810&amp;ev=PageView&amp;noscript=1">


SWBC's LenderHub blog is a one-stop resource for lenders.


How EMV Technology Affects Financial Institutions

We hear a lot about EMV technology these days. In the U.S. alone, 13,000 U.S. financial institutions issue EMV-enabled cards and 450 million EMV cards were in use as of last year. EMV technology—which stands for Europay, Mastercard, Visa, the developers of the chip technology—was created to help reduce card fraud, which was a growing threat every year.

Read More

Threat and Vulnerability Management: Sometimes You See the Bullet Coming

Cybersecurity risk management is complicated. Threats, both known and unknown, are omnipresent. We are compelled to evaluate the likelihood of a threat exploiting a vulnerability in our organization and the possible impact the threat may have on our operations. When vulnerabilities are disclosed, leaders must act to lower their risk and ensure any residual risk is accepted at the appropriate level. In many cases, we may see the proverbial bullet coming and should not wait until it strikes us. Leaders may help address this risk by leveraging threat intelligence, enforcing patch management, and managing third-party risk.

Read More

CEO Fraud: An Interview with SWBC's Chief Information Security Officer

IT security is making headlines more frequently as cyber attacks increase around the world. More companies are being targeted, and it’s becoming more and more profitable for the criminal organizations behind the attacks. I sat down with Jeffrey Julig, Chief Information Security Officer at SWBC, to get answers about what we all need to know and how we can protect ourselves.

Read More

Four Payment Processing Best Practices to Deploy with Your Employees

We all know that any process involving humans is subject to human mistakes. When your staff works with and processes credit and debit card payments, as many employees in financial institutions do, there's room for human error—in addition to intentional fraud—in the event that employees mishandle card data with no ill intent. However, these careless actions are data security violations, which can lead to fraud and improper charges to your customers' accounts.

Read More

Detecting Suspicious Activity in Loan Payments

It's an unfortunate fact of life that as we proceed through our days and focus on our to-do list, we may get so engrossed in our work that we miss other items that need our attention. Also, unfortunately, in the financial institution world, missing the importance of a transaction or two can cost our businesses big money.

When it comes to finding ways to move money, opportunists are nothing if not inventive, continually devising new ways to infiltrate accounts and bring financial benefits to the perpetrators. As you update your practices and payment methods, individuals move just as quickly to adopt new ways to exploit those new opportunities. To stop these activities and retain the streams of money pilfered from our systems and account holders, we must be militant—not only when it comes to our own side of the loan and payment process—but watchful on our many partners' and vendors' sides as well.

Read More

Introduction to the Payment Card Industry Data Security Standard (PCI DSS)

Many of the lenders we partner with often feel like there's a never-ending list of regulatory and compliance requirements to meet. However, if you're lending, you're most likely accepting borrower payments, and you need to be informed about the intricacies of PCI DSS, or the Payment Card Industry Data Security Standard.

Read More

5 Useful Tips to Protect Your Financial Institution from Cyber Attacks

Everyone knows that fraud, in all its forms, is expensive. According to the Association of Certified Fraud Examiners, the typical organization loses 5% of its revenue any given year to fraud. Assuming you don't want to hand over 5% of your financial institution's revenue to fraudsters each year, here are some tips to tighten your electronic controls and prevent cyber attacks, which affect the majority of companies on a daily or weekly basis.

Read More

4 Ways to Minimize Employee Fraud and Theft

Unfortunately, we live in a world where businesses, and people in general, have to be prepared for the possibility of a robbery or theft. For a business owner, it can be hard to think about your trusted employees engaging in dishonest or fraudulent activities that could harm your company, but the fact of the matter is, it happens more often than you think. Here are some of the cold hard facts from the 2016 Report to the Nations on Occupational Fraud and Abuse:

Read More

How Getting "Hacked" Can Make You Look Like a Terrorist

Krebs on Security is a daily blog that provides detailed insight for information and cyber security, authored by Brian Krebs, an American journalist and investigative reporter. A couple weeks ago, I ran across the blog post below and thought I should pass it along to everyone I knew. The post outlines Krebs' recent brush with cyber crime, where a hacker hijacked his PayPal account and then attempted to send his PayPal funds to an organization tied to ISIS.

Read More

Cyber Threats to Look Out for This Holiday Season

It seems like every day we hear about another company with a cyber security breach. Cyber-attacks have become so prevalent, they've lost their shock value; same thing different day, right?

It's easy to shrug off the news of yet another cyber-attack when it's not your company making the headlines.

But what if it was your company? What if it was actually you that caused a security breach and allowed cybercriminals to steal customer data? More than likely it would be devastating and hard to recover. That's why it's important to always be aware of cyber threats faced by employees and companies.

Read More