989Â Results
-
"The Internet of Things" and Home Security
Almost anything can be made into a "smart" device, such as security cameras and sensors, TVs, garage door openers, door locks, wearable devices, pacemakers, and even cars. These devices are what we refer to as the "Internet of Things" (IoT), which holds the promise of adding a whole new level of convenience and connectedness to everyday life. Having that many new, connected computing devices, most of which record activity, presents new challenges for security and privacy. This course teaches employees the best practices for IoT devices both at home and at work.10 Minutes -
10 Common Errors on IRA
Learn about the 10 common errors that financial institutions and their employees make on IRAs. You will learn how to keep these common errors out of your practices.11 Minutes -
2020-11 November - Deposit Regulatory Update
During this program, learn what has happened in the regulatory scene for deposit accounts. This program can qualify as annual training on several regulations for the Board of Directors. Covered Topics:- Regulation CC
- Nonresident Alien Changes
- Regulation D
- Hemp
- Fraud
- Pending Changes/Updates
17 Minutes -
A Borrower's Right to Privacy in a Mortgage Transaction
This course will review a borrower's right to privacy and the privacy expectations for various aspects of mortgage transactions.60 Minutes -
A Borrower's Right to Privacy in a Mortgage Transaction - E3
Privacy rights are a significant concern for mortgage professionals who are involved in the solicitation, origination, processing, closing and servicing of mortgage loans. Multiple laws protect the privacy of borrowers, and violation of these laws can result in serious liability. This course reviews the privacy laws that protect borrowers from the time they receive a solicitation for a mortgage loan until their loans are repaid. It also discusses the actions that are necessary to maintain compliance with privacy laws, which are an ongoing concern for mortgage professionals.30 Minutes -
A Day In the Life Theme: Security Awareness
This course covers every topic required by major standards and regulations and is designed to change user behavior by diving deeply into each topic. Employees will master the fundamentals of information security including key principles, concepts, vulnerabilities, threats and how to counter them. By mastering the information presented in this course, employees will be able to defend personal and workplace data from malicious threats. In this highly interactive course, learners will explore key information security concepts, examine threats and how to counter them and review safe computing habits that can be applied at home and in the workplace. By following the best practice lessons covered in this course, participants will be better able to recognize cyber threats and know how to defend against them. Key Topics: Introduction, password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, and identity theft.70 Minutes -
A Day In the Life Theme: Security Awareness
This course covers every topic required by major standards and regulations and is designed to change user behavior by diving deeply into each topic. Employees will master the fundamentals of information security including key principles, concepts, vulnerabilities, threats and how to counter them. By mastering the information presented in this course, employees will be able to defend personal and workplace data from malicious threats. In this highly interactive course, learners will explore key information security concepts, examine threats and how to counter them and review safe computing habits that can be applied at home and in the workplace. By following the best practice lessons covered in this course, participants will be better able to recognize cyber threats and know how to defend against them. Key Topics: Introduction, password management, viruses and malware, mobile data, physical security, social engineering, phishers, acceptable use policies incident response, security services, risk management, network eavesdropping, encryption, malware, backups, protecting your home computer, and identity theft.70 Minutes -
A History in Banking
This session provides an overview and brief history of the US banking system.22 Minutes -
Accepting Negotiable Instruments
Learn the basic standards and procedures that apply when you accept or cash checks that are presented at the teller window. The laws and compliance requirements affecting checks are detailed and very important. Because customers/members will present checks on a regular basis, you will need to know basic check law requirements so you can effectively respond to customers'/members' deposit and check-cashing requests. Also, because of an increase in check fraud, accepting checks poses the risk of financial loss for your institution. As a result, your understanding of these rules is essential to minimizing those risks and protecting your institution.90 Minutes -
Accepting Negotiable Instruments - E3
This course introduces you to the basic standards and procedures that apply when you accept or cash checks that are presented at the teller window. Because customers present checks on a regular basis, you will need to know basic check law requirements so you can effectively respond to customers' deposit and check-cashing requests.60 Minutes