Sunday, October 19, 2008

Enrolling in Enhanced Security Online Banking

How to get started? The first step is to enroll in Enhanced Security by following one of the two enrollment options.


Enrolling at prompt when logging into Online Banking: After logging into Online Banking click Add extra security to my account and this computer if you are logging in at a computer you normally use for accessing Online Banking. This will place secure coookies on that computer. Choose Add extra security to my account only if you are at a public computer in a library, a friend’s house, or elsewhere you don’t want others accessing your account. This will set up the account but will not place the secure cookies on that computer. Enrolling at a later time from User Options Menu in Online Banking: Go to User Options located at the top right corner of the page. Choose Enhanced Security from the list. Click Add extra security protection to this computer and click Submit .

What happens after my account is enrolled? On computers that you have ‘added the extra security’ you will login as usual. The secure cookie has been placed on the PC so you will be able to login with your member number and password. On computers that don’t have the extra security you will be asked to validate your identity by answering your challenge questions correctly before the login is successful and seeing your account information. The future of enterprise security has long been summed up in one word: convergence. For years, pundits, analysts and others have predicted that at some point in the future, companies will begin to take a holistic view of their security operations. The building security you encounter at the front desk when you swipe your card in each morning will no longer be a separate system from the security you encounter when you sit down at your desk and log-on to your computer. When converged, these typically disparate systems will be connected and will communicate as a way to validate your identity when you access your office or your company’s network. However, combining these parallel but different universes requires both cultural and technological changes to your organization.

A company’s physical and logical information networks and user interfaces have been completely separate for years. Building access, or physical security, systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the corporation’s security department. Network and data security, or logical security, systems are the domain of the IT department. Each developed separately within the organization—corporate security departments developed to protect physical assets through locks, surveillance and alarm systems—and are typically staffed by people with backgrounds in law enforcement, not technology; in contrast, protecting a company’s information and knowledge assets has been one of the main tasks of IT since day one. This role has evolved into protecting both company and employee data since the dawn of the Internet age. At this point, many companies are hesitant to embrace convergence, asking questions such as, Why should I consider a converged solution? What is the benefit? Doesn’t this seem like more trouble than its worth? Won’t this be costly from both an implementation and a human capital perspective? And, do the benefits outweigh the costs? Merging the cultures of these two areas is not an overnight process—and ever since the buzz started about convergence, companies felt that merging physical and logical access systems could take even longer. But this is starting to change with new, more intelligent solutions that help companies add these capabilities while maintaining the operation of their existing security systemsg: After logging into Online Banking click Add extra security to my account and this computer if you are logging in at a computer you normally use for accessing Online Banking. This will place secure coookies on that computer. Choose Add extra security to my account only if you are at a public computer in a library, a friend’s house, or elsewhere you don’t want others accessing your account. This will set up the account but will not place the secure cookies on that computer. Enrolling at a later time from User Options Menu in Online Banking: Go to User Options located at the top right corner of the page. Choose Enhanced Security from the list. Click Add extra security protection to this computer and click Submit
What happens after my account is enrolled?On computers that you have ‘added the extra security’ you will login as usual. The secure cookie has been placed on the PC so you will be able to login with your member number and password. On computers that don’t have the extra security you will be asked to validate your identity by answering your challenge questions correctly before the login is successful and seeing your account information. The future of enterprise security has long been summed up in one word: convergence. For years, pundits, analysts and others have predicted that at some point in the future, companies will begin to take a holistic view of their security operations. The building security you encounter at the front desk when you swipe your card in each morning will no longer be a separate system from the security you encounter when you sit down at your desk and log-on to your computer. When converged, these typically disparate systems will be connected and will communicate as a way to validate your identity when you access your office or your company’s network. However, combining these parallel but different universes requires both cultural and technological changes to your organization. A company’s physical and logical information networks and user interfaces have been completely separate for years. Building access, or physical security, systems are typically put in place by either the owner of the building or, in the case of larger businesses, by the corporation’s security department. Network and data security, or logical security, systems are the domain of the IT department. Each developed separately within the organization—corporate security departments developed to protect physical assets through locks, surveillance and alarm systems—and are typically staffed by people with backgrounds in law enforcement, not technology; in contrast, protecting a company’s information and knowledge assets has been one of the main tasks of IT since day one. All banks uses secure dedicated server to store their website data these dedicated servers must be secure servers i.e. they should have best antivirus softwares running on & most secure SSL certificates must be installed on the server.

This role has evolved into protecting both company and employee data since the dawn of the Internet age. At this point, many companies are hesitant to embrace convergence, asking questions such as, Why should I consider a converged solution? What is the benefit? Doesn’t this seem like more trouble than its worth? Won’t this be costly from both an implementation and a human capital perspective? And, do the benefits outweigh the costs? Merging the cultures of these two areas is not an overnight process—and ever since the buzz started about convergence, companies felt that merging physical and logical access systems could take even longer. But this is starting to change with new, more intelligent solutions that help companies add these capabilities while maintaining the operation of their existing security systems

No comments: