11:47 AM
Connect Directly

Report Says Banks' Online Fraud Mitigation Strategies Matter to Customers

A new report from the Aite Group suggests that fraud-prevention capability is increasingly becoming a competitive differentiator for financial institutions.

Boston-based independent research and advisory firm Aite Group released a report today that examines the online fraud mitigation environment for financial institutions in North America. The report, titled "Online Fraud Mitigation: Tools of the Trade" indicates that both banks and customers are concerned with the prevention of cyber fraud and the fraud-fighting strategies that banks have in place.

Based on recent Aite Group interviews with 32 fraud-management and business-line executives at financial institutions, the report identifies cybercrime and malware as the cause of the greatest amount of pain for North American financial institutions today. Most of the institutions interviewed feel that behavior analytics is an effective strategy for fighting online fraud, but the report suggests that balancing effective fraud protection with usability is key to combatting threats while maintaining a positive user experience.

The report also notes that customers are beginning to become more interested in a prospective bank's fraud-prevention strategies. "Financial institutions' fraud-prevention capabilities are increasingly becoming a competitive differentiator," said Julie Conroy McNelley, senior analyst with Aite Group and author of the report. "Prospective commercial customers have begun to ask financial institutions about their fraud-prevention capabilities, and customers who perceive the approach to be inadequate often take their business elsewhere."

"Online Fraud Mitigation: Tools of the Trade" is the second in a five-part series examining online fraud mitigation. Visit Aite Group's website to purchase the report or to get additional details.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.