kstelly@10dsecurity.com

Home/Kyle Stelly

About Kyle Stelly

This author has not yet filled in any details.
So far Kyle Stelly has created 3 blog entries.

SBA Release of PPP Data May Lead to Uptick in Attacks

2020-07-09T17:40:05+00:00

On Monday, the U.S. Small Business Administration (SBA) released loan data for more than 660,000 large Paycheck Protection Program (PPP) loans made to businesses over the past few months.  You may have seen some scandalous local and national news articles regarding recipients, but the data released contains some much more concerning information that all financial institutions (FIs) and their business customers must now take into consideration to protect against general fraud, targeted phishing, other types of social engineering, and corporate account takeover (CATO.) The data set released by the SBA is divided into several parts; individual state records with anonymous [...]

SBA Release of PPP Data May Lead to Uptick in Attacks2020-07-09T17:40:05+00:00

Issues for Issuers that Issue

2020-03-19T16:44:39+00:00

More and more institutions are now payment card issuers.  Ten years ago, in-house payment card production was almost always an outsourced function within community financial institutions (FIs), but that’s no longer the case.  As currently observed,  more than 40% of our FI clients have now implemented in-house card printing and/or embossing (personalization) solutions for various reasons.  The most prevalent of those reasons are competitive in nature; to provide customers with quick access to their funds at account opening or following the lost, theft, or compromise of a payment card. While a large majority of in-house issuance adopters have made strong [...]

Issues for Issuers that Issue2020-03-19T16:44:39+00:00

We Accept the Risk

2020-02-13T21:43:07+00:00

Whether you find them in a risk assessment, we find them in an audit, regulators uncover them as part of an exam, or you hear something scary and familiar on the news, IT risks require ACTION.  There are generally four things you can do once a risk is identified within your environment: Avoid it. No one likes being told, “You can’t do that. It’s too dangerous.”  Risk avoidance is when management determines that the risk outweighs the benefit of an asset (like a product offering, practice, or IT system) and decides not to go forward with implementation.  Avoidance is much [...]

We Accept the Risk2020-02-13T21:43:07+00:00
Go to Top