Available Now: 2024 QAIB Full Study

Data breaches of government, business and private records that have already occurred and continue to occur enable cyber-villains to sell and use this information to bypass traditional defenses used to protect electronically held assets. Threats to financial assets exist at every point of entry, each requiring comprehensive defenses.

A first step in addressing this pervasive threat is to understand what defenses your firm currently has in place. To that end DALBAR and ThinkAdvisor conducted a survey of leading financial institutions to catalog the authentication practices currently being used across four points of entry into your records, including: websites, mobile devices, interactive voice response units (“IVR”), telephone contact centers, and online statements. This Executive Summary provides an overview of these defenses and allows your organization to compare its own cybersecurity practices to the financial community at large.


Talk to us about how we can help you achieve your goals or customize an offering for your unique needs!