{"id":329,"date":"2005-09-09T00:00:00","date_gmt":"2005-09-09T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/09\/e-banking-security-provokes-fear-or-indifference\/"},"modified":"2021-12-30T11:37:02","modified_gmt":"2021-12-30T11:37:02","slug":"e-banking-security-provokes-fear-or-indifference","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/09\/e-banking-security-provokes-fear-or-indifference\/","title":{"rendered":"E-banking security provokes fear or indifference"},"content":{"rendered":"<p>The survey of 11,300 UK net users found that while many online banking consumers are complacent about security, a large minority have given up online banking as a direct result of security fears.  Most UK net users are aware of security threats like phishing and keystroke logging but are unfazed by these risks and expect their banks to deal with the problem &#8211; even though these attacks are thrown against consumer&#8217;s PCs rather than a bank&#8217;s own systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Based on responses to its survey, Forrester concludes that an estimated 600,000 from a total of 15m subscribers have ditched online banking as a direct result of security fears.<\/p>\n<p>Measures to restrict the functionality of some accounts (for example controlling how much money can be transferred on any day), stronger internet banking authentication and improved customer profiling are also needed to defend against security threats, it advises.<\/p>\n<p>http:\/\/www.securityfocus.com\/news\/11305<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-329","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=329"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/329\/revisions"}],"predecessor-version":[{"id":2816,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/329\/revisions\/2816"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}