IT Examiner School, Providence, RI

Business Applications for SMS in Financial Services

Pull Services

Push Services

Balance inquiries P2P payments Funds transfers

Alerts

Authentication

One-time passwords

Purchases and Donations

Opt-in marketing and special promotions

Stop payment requests

High value withdrawal notification High value payment notification

Card suspension or deactivation requests

Source: TowerGroup

Understanding future IT security developments  Future IT security developments will occur in response to threats and vulnerabilities in each technology  Consider, for example, current vulnerabilities in current mobile computing technology  Mobile users are outside of the control of the IT organization  Elevated probability of loss or theft of mobile devices  New entry points into the company network  Elevated risk of virus/worm/Trojan horse infections  Shoulder surfing (e.g., at airports and in airplanes)

Copyright 2010 Emagined Security – All Rights Reserved :-

Made with FlippingBook Annual report