How secure is BankVault?

BankVault is the most secure endpoint user solution on the market today. BankVault is secure because is it uses the cumulative effect of different techniques to provide a definitive comprehensive level of security. Combined into BankVault’s solution, all possible threats are eliminated. Virtual Remote Temporary Random Secret Pristine Untraceable When you go online with BankVault […]

How to Copy Files Using BankVault

You may wish to copy a .ABA banking file from your accounting system into BankVault for paying a large list of creditors. You can map a network drive on your PC and Mac to an independent storage area accessible by BankVault. PC Launch File Manager and right click on “Computer”. Select “Map Network Drive” and […]

How to Print When using BankVault

BankVault has an independent spool area for holding print jobs. Print jobs spool to a queue and print on your devices default printer. You select alternative printers from a drop down box. The print program runs completely separate and independent from the BankVault virtual machine from which you bank.  

How to boot up BankVault KEY by default

Many BankVault Key clients dedicate a single PC to be used only for bank transactions using BankVault. This is a ‘belts and suspenders’ approach that we recommend if you can manage it. If you wish your computer always to boot automatically when the BankVault Key is inserted, you will need to change the boot order […]

If our network is hacked, won’t BankVault be compromised too?

BankVault operates 100% independently of your computer or network. The key is safely saved on the BankVault USB drive, which is physically separate from your computer or network system.The only part of your machine that BankVault requires is the BIOS layer. Meaning, when you use BankVault you are not even booting up your machine’s full […]

How does BankVault’s 3FA differ from my banks 2FA?

Two-factor authentication, also known as 2FA, can be described as something that you know (your login and password) and something that you have (a banking SMS text or a banking Fob ). People can’t imagine it would be possible to hack their phone or Fob, but this actually happens a great deal. Just like any […]

We use two-factor authentication on all transactions. Surely we must be safe. Are we?

Not really. The biggest complications 2FA systems currently face include the loss of the identification object, intercepting SMS messages, and secret answers being stolen by malware. The put it another way, the same techniques that could be used to hack single-factor authentication work with 2 factor.

My computer/network already has virus protection and security such as firewalls.

Independent testing on most of the major virus scanners consistently shows that none provide 100% virus and malware detection. Anti-virus programs are not fool-proof and are continually identifying and patching new viruses. They’re always behind: first comes the virus and then come the patches for the new viruses. In the interim, you are vulnerable. Network […]

Definition of the Day: Pretexting

Pretexting is a sibling of phishing and like siblings both have differences as well as similarities. Phishing emails use fear and urgency to drive users to take actions that compromise their system. Pretexting is much more positive – it centers around the hacker building a false sense of trust with the victim. The most prevalent […]

Definition of the Day: Watering Hole Attacks

Watering hole attacks were in the news earlier this year (2015) after a Chinese cyber espionage group successfully compromised several major US financial services and defense industry companies. The attack sprang from malicious code injected into www.forbes.com’s ‘Thought of the Day’ widget, which is a flash pop-up users see upon visiting the Forbes.com home page. […]