article thumbnail

Understanding the Cyber Risks in Video Communication

VISTA InfoSec

Additionally, consider platforms with strong access controls, such as multi-factor authentication (MFA) to prevent unauthorized access. Define who can create and manage meetings and establish procedures for sharing meeting links and passwords to control access.

Risk 275
article thumbnail

Strengthening Cyber Defenses with Multi-Factor Authentication

VISTA InfoSec

Mutli-Factor Authentication (MFA) isn’t a new concept. However, despite this, there is still confusion surrounding the mechanism and how it adds to cyber defense. This article unravels the mysteries of MFA and how it can be used to strengthen cyber defenses. Another mechanism that is heavily relied on is MFA.

article thumbnail

Deep Dive: Reducing The Security Risks Of Open Banking

PYMNTS

Open banking is typically achieved via application programming interfaces (APIs), sets of rules and procedures that permit developers to create algorithms and applications that access features or data or interact with other systems. Requiring any two of these three data points is enough to protect against 99.9

MFA 96
article thumbnail

PCI DSS Requirement 1 – Changes from v3.2.1 to v4.0 Explained

VISTA InfoSec

Below, we present a meticulously curated list that highlights the transformations in requirements and test procedures from PCI DSS v3.2.1 This will encompass all technologies categorized under Network Security Controls, including but not limited to WAF, IPS/IDS, DAM, DLP, PIM/PAM, MFA, and so on. by reviewing documented procedures.

PCI DSS 113
article thumbnail

PCI DSS Requirement 8 – Changes from v3.2.1 to v4.0 Explained

VISTA InfoSec

Changes Core Focus Limiting database access to programmatic methods (apps, stored procedures) and database administrators. Interview those in charge: do these accounts follow these strict procedures? Terminology update to reflect broader authentication technologies. Requirement v3.2.1 (8.7) Greater emphasis on granular access control.

PCI DSS 130
article thumbnail

Real-Time Payments’ Real-Time Achilles Heel

PYMNTS

Bad actors often find them a more appealing target than the apps to which they are connected, as they can bypass in-app authentication procedures and seize control of all connected apps at the same time by infiltrating the API’s code. These APIs are constantly threatened by fraud, however. Developments From Around The World Of B2B APIs.

article thumbnail

FinCEN Files Show Banks’ ‘Whack-a-Mole’ Battle Against KYC/AML

PYMNTS

And in one recent edition of PYMNTS’ KYC/AML Tracker details, the rise of open banking is likely to spur a “fast track” for new AML efforts, including multifactor authentication (MFA) and strong customer authentication (SCA) processes.

Fincen 139