<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CUdefender</title>
	<atom:link href="https://cudefender.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cudefender.com</link>
	<description>Credit Union Cyber Security Solutions</description>
	<lastBuildDate>Tue, 24 Feb 2015 18:51:22 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>Security is Broken, Backwards, and Upside Down</title>
		<link>https://cudefender.com/security-broken-backwards-upside/</link>
		<comments>https://cudefender.com/security-broken-backwards-upside/#comments</comments>
		<pubDate>Fri, 13 Feb 2015 13:58:28 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[broken security]]></category>
		<category><![CDATA[training]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4295</guid>
		<description><![CDATA[<p>After numerous articles, comments, and post-incident analysis of the various cyber attacks cluttering our media headlines and social feeds, it doesn’t take one too long to conclude that our existing model for security is broken, backwards, and upside down. I’m a firm believer that, for far too long, we’ve put our focus on protecting our [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/security-broken-backwards-upside/">Security is Broken, Backwards, and Upside Down</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>After numerous articles, comments, and post-incident analysis of the various cyber attacks cluttering our media headlines and social feeds, it doesn’t take one too long to conclude that <b>our existing model for security is broken, backwards, and upside down.</b></p>
<p>I’m a firm believer that, for far too long, we’ve put our focus on protecting our network perimeter, with thoughts of trying to keep “the bad guys” from getting in, rather than focusing on the security of our people and our data, and keeping the sensitive information from getting out. Broken? Backwards? Upside down? Your call, but <b>fixing this is a major paradigm shift in thinking and organization culture.</b></p>
<p>So, you ask, how do we fix it? Let me outline the <b>top 3 most important steps</b> to paving the way for a security model repair.</p>
<ol>
<ol>
<li><b>Elevate the cyber discussions to board level.</b> The financial, operational, legal, regulatory, reputational and, therefore, strategic risks around cyber threats are game changers for credit unions, their leaders, their employees, their members, and all their other stakeholders. Executives and boards must be in active discussion and seeking the proper security awareness and education.</li>
<li><b>Fix the broken training model and start providing employees engaging and continuous cyber awareness training.</b> Most existing cyber awareness training programs are severely lacking. First, nobody gets excited about 60 to 90 minute module based training followed by a quiz. Secondly, annual or quarterly training could never keep the security awareness top-of-mind enough to gain the required behavior modification required of employees in order to foil emerging threats. That would be similar to showing a 7 year old student multiplication flash cards once a quarter and expecting them to have quick recall of the answers. Just not going to happen. Effective training must be served up in continuous, short bursts that utilize some level of gamification to keep employees engaged and in active discussion. With research showing that greater than 90% of breaches occur because of user targeted phishing (or similar) attacks, this is a serious issue.</li>
<li><b><b>Protect the DATA! </b></b>Make sure the data is encrypted. We must assume that a breach has already occurred and a user, or the network, has been compromised. Not if, but when, it does happen, will the data be easily obtained and exfiltrated? Granular encryption of data both at rest and in motion should be a baseline requirement.</li>
</ol>
</ol>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Don’t let the pressure of security related guidance coming from all directions create confusion and stall your progress.</p>
<p>As our team at CUdefender works with credit unions nationwide, we are assisting and guiding them in exactly how to accomplish the above steps in the most affordable way. Our engaging cyber awareness and training program is showing highly effective results. Please reach out for more information.</p>
<p>CUdefender can be contacted at 1-888-632-4339 or by visiting <a href="http://www.cudefender.com">http://www.cudefender.com</a></p>
<p><i>Rob Harbin is CEO and Cyber Security Evangelist for CUdefender, LLC., a credit union cyber security company. His LinkedIn profile can be viewed at </i><a href="http://www.linkedin.com/in/robharbin/"><i>www.linkedin.com/in/robharbin</i></a><i>. Email him at </i><a href="about:blank"><i>rharbin@cudefender.com</i></a><i> and follow CUdefender on Twitter at </i><a href="http://www.twitter.com/CUdefender"><i>www.twitter.com/CUdefender</i></a><i> and Facebook at </i><a href="https://www.facebook.com/CUdefender"><i>www.facebook.com/CUdefender</i></a></p>
<p>The post <a rel="nofollow" href="https://cudefender.com/security-broken-backwards-upside/">Security is Broken, Backwards, and Upside Down</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/security-broken-backwards-upside/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CU CEOs: Security Checklists Won&#8217;t Save You</title>
		<link>https://cudefender.com/cu-ceos-security-checklists-wont-save/</link>
		<comments>https://cudefender.com/cu-ceos-security-checklists-wont-save/#comments</comments>
		<pubDate>Mon, 19 Jan 2015 15:23:10 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[credit union]]></category>
		<category><![CDATA[credit union ceo]]></category>
		<category><![CDATA[cyber security]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4290</guid>
		<description><![CDATA[<p>Some top internet headlines and articles surfacing over the past few months seem to suggest that completing a simple checklist of security items on a “to-do list” will solve the vast array of complex information privacy, security, and compliance issues facing the credit union industry. CEOs, don’t believe it for a minute and surely don’t [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cu-ceos-security-checklists-wont-save/">CU CEOs: Security Checklists Won&#8217;t Save You</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Some top internet headlines and articles surfacing over the past few months seem to suggest that completing a simple <b>checklist</b> of security items on a <b>“to-do list”</b> will solve the vast array of complex information privacy, security, and compliance issues facing the credit union industry.</p>
<p>CEOs, don’t believe it for a minute and surely don’t advise this approach to your board! Security checklists won’t save you.</p>
<p>Your credit union risk environment is an ever-changing landscape that’s highly incompatible with a checklist style <b>“set it and forget it”</b> approach. The only safe and advisable method of risk management is one that evolves and adapts to cover inevitable changes in your organization.</p>
<p><b>CEOs, you must lead in these important security focused matters.</b>  The financial, operational, legal, regulatory, reputational and, therefore, strategic risks are game changers for credit unions, their leaders, their employees, their members, and all their other stakeholders.</p>
<p>Credit unions need to radically rethink cyber security as a <b>tightly integrated</b> and <b>holistic</b> part of their risk management program and daily operational activities. Your information assets are changing. Your threats are changing. Your vulnerabilities are changing. The controls available to you to deploy are changing.  The only way you are going to stay on top of this constantly changing collection of ingredients in the risk equation is to establish, operationalize, and mature your information risk management program.</p>
<p>Some key points to remember as you consider your next steps:</p>
<ol>
<li><b>Heed the lessons</b> from JPMorgan, Target, Home Depot, etc.  Do your research and learn from their mistakes.</li>
<li><b>Listen to your gut. </b> You create, receive, and maintain sensitive member data!  Stop fretting over the semantics of PCI, FFIEC guidance, etc.  It’s all sensitive. This data constitutes “information assets” that need to be safeguarded. Make sure it’s getting done!</li>
<li><b>Know your threats and weaknesses</b>.  Risk analysis and the identification of real and applicable vulnerabilities is the place to start and, done properly, will produce a prioritized list of exposures for your credit union.</li>
<li><b>It’s easier than you may think</b>.  Security is complex and the tasks required to get your environment “up to snuff” may seem daunting but, trust me, huge steps forward can be taken without huge costs or time commitments. It’s knowing what items can achieve the greatest impact and executing on those items first.</li>
<li><b>CUdefender has guidance and solutions</b> that meet many security needs and we are here to help you.</li>
</ol>
<p>NCUA has prioritized cyber security as a top item for the 2015 year. But don’t do security right for the NCUA, do it because it’s the right thing to do for your credit union and its members.</p>
<p>CUdefender can be contacted at 1-888-632-4339 or by visiting <a href="http://www.cudefender.com">http://www.cudefender.com</a></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cu-ceos-security-checklists-wont-save/">CU CEOs: Security Checklists Won&#8217;t Save You</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/cu-ceos-security-checklists-wont-save/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber Security Needs Board Level Visibility</title>
		<link>https://cudefender.com/cyber-security-needs-board-level-visibility/</link>
		<comments>https://cudefender.com/cyber-security-needs-board-level-visibility/#comments</comments>
		<pubDate>Tue, 13 Jan 2015 15:13:53 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[credit unions]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4284</guid>
		<description><![CDATA[<p>Recent research states that roughly two-thirds of companies say their executives get involved in security discussions, but for credit unions, it needs to be 100 percent of executives and, due to cyber threat risk, should extend beyond the executives directly to the board. Cyber attacks, like last November&#8217;s hack of Sony Pictures, have motivated many [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cyber-security-needs-board-level-visibility/">Cyber Security Needs Board Level Visibility</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Recent research states that roughly two-thirds of companies say their executives get involved in security discussions, but for credit unions, it needs to be 100 percent of executives and, due to cyber threat risk, should extend beyond the executives directly to the board.</p>
<p>Cyber attacks, like last November&#8217;s <a title="hack of Sony Pictures" href="http://www.itpro.co.uk/security/23593/sony-pictures-hack-the-interview-named-sonys-most-successful-online-release-ever" target="_blank">hack of Sony Pictures</a>, have motivated many to increase focus on external threats and begin having more discussions around real world cyber threats and overall preparedness.</p>
<p>Credit unions, like many other companies, have business units that submit regular requests to buy new cloud apps, the most popular being file-sharing services like Box, Dropbox, and Evernote. With most credit union infrastructure being built as fragmented layers of add-ons, over a period of many years, the security methods used to protect the legacy network and applications, as well as these new cloud applications, is severely lacking.</p>
<p>2015 is the year that credit unions must reinvent their security model to be more holistic and ready to face the sophistication of emerging threats. This doesn’t have to be a complete rip-out and replace initiative, and it can be accomplished much easier that most believe. Our team at <a title="CUdefender" href="http://www.cudefender.com/" target="_blank">CUdefender</a> speaks regularly with credit union executives and boards who don’t realize some of the quick and cost effective steps they can take to have an immediate positive impact on their security posture.</p>
<p>The long-standing issue of security having a proper seat at the executive table should no longer be a problem. Now it needs another lift upwards to the board. Hopefully credit unions will have foresight to make cyber topics a substantial part of their 2015 board and strategic planning meetings.</p>
<p>Credit unions looking for security planning assistance or cyber threat protection can contact CUdefender at 1-888-632-4339 or visit <a href="http://www.cudefender.com/" target="_blank">http://www.cudefender.com</a> for additional information.</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cyber-security-needs-board-level-visibility/">Cyber Security Needs Board Level Visibility</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/cyber-security-needs-board-level-visibility/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>POODLE Returns &#8211; Credit Unions Exposed</title>
		<link>https://cudefender.com/poodle-returns-credit-unions-exposed/</link>
		<comments>https://cudefender.com/poodle-returns-credit-unions-exposed/#comments</comments>
		<pubDate>Mon, 15 Dec 2014 14:18:51 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[vulnerability]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4280</guid>
		<description><![CDATA[<p>It&#8217;s been months since the POODLE SSL 3.0 vulnerability has been discovered and many credit unions and even large banks are still trying to figure out how to mitigate the risk. Now, as of December 8th, 2014, a new twist on POODLE reveals even more risk. A cursory review using a SSL/TLS scanning tool indicates that the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/poodle-returns-credit-unions-exposed/">POODLE Returns &#8211; Credit Unions Exposed</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>It&#8217;s been months since the POODLE SSL 3.0 vulnerability has been discovered and many credit unions and even large banks are still trying to figure out how to mitigate the risk. Now, as of December 8th, 2014, a new twist on POODLE reveals even more risk. A cursory review using a SSL/TLS scanning tool indicates that the Web sites for some of the world’s largest financial institutions are vulnerable to the new POODLE bug, including Bank of America, Chase.com, Citibank, HSBC, Suntrust — as well as many credit unions across the nation. This is a serious risk.</p>
<p>Firstly, if you&#8217;re reading this as a <strong>CUdefender customer</strong> using our security services, <strong>you are already protected</strong>. But, there is still some information you may still like to know.</p>
<p><strong>What is POODLE?</strong></p>
<p>“POODLE,” an acronym for a serious security flaw in a specific version (version 3.0) of <a title="http://en.wikipedia.org/wiki/Transport_Layer_Security" href="http://en.wikipedia.org/wiki/Transport_Layer_Security" target="_blank">Secure Sockets Layer</a> (SSL), the technology that most web sites use to protect the privacy and security of communications with customers.</p>
<p><strong>What systems could be affected?</strong></p>
<p>Any web browser accessible system supporting SSL 3.0 and certain versions of TLS.</p>
<p><strong>What are the security consequences?</strong></p>
<p>POODLE can potentially lead to exposure of personal data such as email addresses, passwords, and credit card numbers—the very things SSL was designed to protect. Basically, any data sent of a vulnerable encrypted connection could be at risk.</p>
<p><strong>How can our credit union protect against POODLE?</strong></p>
<p>According to <a title="https://www.us-cert.gov/ncas/alerts/TA14-290A" href="https://www.us-cert.gov/ncas/alerts/TA14-290A" target="_blank">an advisory</a> from the <strong>U.S. Computer Emergency Readiness Team</strong> (US-CERT), a partnership run in conjunction with the U.S. Department of Homeland Security, although there is currently no fix for the vulnerability SSL 3.0 itself, disabling SSL 3.0 support in Web applications is the most viable solution currently available. US-CERT notes that some of the same researchers who <a title="https://www.imperialviolet.org/2014/12/08/poodleagain.html" href="https://www.imperialviolet.org/2014/12/08/poodleagain.html" target="_blank">discovered</a> the Poodle vulnerability also developed a fix for the TLS-related issues.</p>
<p><strong>Non-CUdefender users:</strong></p>
<p>1. Scan your web endpoints using a good SSL/TLS scanning tool to determine vulnerable systems (many free scanning tools exist).<br />
2. Disable SSL 3.0 on any web exposed system including websites, webmail, remote access gateways, online account opening tools, etc.</p>
<p><strong>CUdefender users:</strong></p>
<p>1. CUdefender has immediately removed support for POODLE-vulnerable CBC ciphers. CUdefender customers are not susceptible to the POODLE vulnerability for protected endpoints.</p>
<p>For more information on how CUdefender can protect your credit union, please visit http://www.cudefender.com or contact us now at 888-632-4339.</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/poodle-returns-credit-unions-exposed/">POODLE Returns &#8211; Credit Unions Exposed</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/poodle-returns-credit-unions-exposed/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Credit Union Security &#8211; Ain&#8217;t that some ish?</title>
		<link>https://cudefender.com/credit-union-security-aint-ish/</link>
		<comments>https://cudefender.com/credit-union-security-aint-ish/#comments</comments>
		<pubDate>Wed, 19 Nov 2014 19:48:49 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[security awareness]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4275</guid>
		<description><![CDATA[<p>How much do you really know about phishing, smishing, and vishing? According to a recent article issued by the FBI, we have reached the point that given enough time, motivation, and funding, a determined adversary will likely be able to penetrate any system connected to the Internet. While that may be true, with the right [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/credit-union-security-aint-ish/">Credit Union Security &#8211; Ain&#8217;t that some ish?</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<h3>How much do you really know about ph<span class="underline"><strong>ish</strong></span>ing, sm<span class="underline"><strong>ish</strong></span>ing, and v<span class="underline"><strong>ish</strong></span>ing?</h3>
<p>According to a <a href="http://www.fbi.gov/news/testimony/cybersecurity-responding-to-the-threat-of-cyber-crime-and-terrorism" target="_blank" rel="nofollow">recent article</a> issued by the FBI, we have reached the point that given enough <strong>time, motivation, and funding</strong>, a determined adversary will likely be able to <strong>penetrate any system </strong>connected to the Internet<strong>. </strong>While that may be true, with the right tools, processes, monitoring, and most importantly, <span class="underline">awareness and training</span>, I believe we can minimize the risk and make for a very hard target.</p>
<p>It never ceases to amaze me how credit unions will spend vast amounts of money on technology solutions in order to create a better security posture, but many times forget that it&#8217;s the old go-to, tried and true, social engineering threats against employees and members that are easiest for hackers to exploit.</p>
<h3><strong>Old Threats Made New Again<br />
</strong></h3>
<p>Phishing, smishing, and vishing are not new threats, as they&#8217;ve been around for many years, but it is the way that cyber attackers are adapting these old threats to conduct their attacks that have changed.</p>
<p><strong>1. Phishing. </strong>Phishing is a form of attack where a hacker attempts to lure unsuspecting consumers or employees to click a malicious link in order to infect the system with a trojan or malware. Many times the malware is in the form of a key logger, which is capable of stealing anything the user types including corporate credentials, account information, or other sensitive passwords.</p>
<p>According to security firm RSA in their <a href="http://www.emc.com/collateral/fraud-report/rsa-online-fraud-report-0914.pdf" target="_blank" rel="nofollow">September 2014 report</a>, these phishing attacks against credit unions have more than doubled and are highly clever in their ability to fool not only the user clicking the link but the corporate systems and controls designed to stop them.</p>
<p>Many phishing attacks are slowly moving away from email, as corporate email systems have gotten much better at blocking spam, and on to new <strong>social platforms </strong>such as Facebook, Twitter, and LinkedIn. Users of social networks have an uncanny amount of trust in posted links to articles and videos and will click without much hesitation. Credit unions without a robust <a href="https://www.cudefender.com/services/social-risk-management/" target="_blank" rel="nofollow">Social Risk Management</a> solution, to monitor and alert when executive or employee accounts are targeted, are at high risk of fraud via social phishing.</p>
<p><strong>2. Smishing. </strong>Smishing, or SMS phishing, sends a text message to a mobile phone in an attempt to get its user to divulge personal information. Smishing is becoming more attractive and having higher success rates for attackers because consumers and employees are not as conditioned to receiving spam on their mobile phones and are more likely to believe the communication is legitimate.</p>
<p>Smishing, like phishing, continues to be a growing problem for credit unions.<br />
<strong>The two most common types of smishing attacks are:</strong></p>
<ol>
<li>A person receives a text message that directs them to call a phone number to confirm personal or account information.</li>
<li>A person receives a text message that directs them to visit a website to confirm information, but is actually being infected with a malicious trojan or malware designed to steal information such as passwords.</li>
</ol>
<p><strong>3. Vishing. </strong>Vishing, or phone phishing, is the practice of using the telephone system to illegally obtain personal and financial information. Vishing exploits an individuals trust in telephone services, as the victim is often unaware that fraudsters can use methods like caller ID spoofing and other automated systems to commit this type of scam.</p>
<h3><strong>What can we do about it?</strong></h3>
<p>The most important step for credit unions in mitigating phishing, smishing, and vishing risks is <strong>building more awareness</strong>. Awareness and education needs to be consistently presented and available for members, employees, executive teams, and credit union board directors. There are many reasons that attackers continue to evolve their tactics, and one of the key factors is increased awareness among their intended victims.</p>
<p><strong>Remember to remind members and employees of the following tips:</strong></p>
<ul>
<li><strong>Never</strong> open an attachment or click a link in an email or social network feed from someone you do not know. It most likely contains a trojan or other form of malware designed to steal your information.</li>
<li><strong>Never </strong>provide personal or financial information via email or over the phone. Credit unions and banks will never request you confirm this information through email, text message, or over the phone.</li>
<li><strong>Always </strong>know who you are dealing with online, especially when it comes to your personal information. Just because an email looks valid or a pre-recorded phone message says it is the bank doesn&#8217;t mean it is legitimate.</li>
<li><strong>Guard </strong>your privacy and limit the amount of personal information you share online. Professional attackers will find and use all available information, including social network profiles which often contain highly personal life details, against their victims.</li>
<li><strong>Check </strong>your bank and credit card statements regularly looking for suspicious transactions.</li>
</ul>
<p>While the tactics and methods that fraudsters use continue to evolve and adapt, many of the core methods continue to revolve around basic phishing, smishing, and vishing tactics. In addition to implementing professional <a href="http://www.cudefender.com/" target="_blank" rel="nofollow">credit union cyber security tools</a>, credit unions need to continue to build awareness and disseminate frequent educational security tips to keep evolving attack methods top-of-mind.</p>
<h4><strong>Got comments or questions? Did I miss something? Email me at <a href="mailto:rharbin@cudefender.com">rharbin@cudefender.com</a></strong></h4>
<p>The post <a rel="nofollow" href="https://cudefender.com/credit-union-security-aint-ish/">Credit Union Security &#8211; Ain&#8217;t that some ish?</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/credit-union-security-aint-ish/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Four Steps to Improve Security Awareness</title>
		<link>https://cudefender.com/four-steps-to-improve-security-awareness/</link>
		<comments>https://cudefender.com/four-steps-to-improve-security-awareness/#comments</comments>
		<pubDate>Sat, 25 Oct 2014 13:50:30 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[security awareness]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[training]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4258</guid>
		<description><![CDATA[<p>Ponemon Institute, an independent agency that conducts research on privacy, data protection, and information security policies, states that: 51% of CEOs surveyed said their company experiences cyber attacks hourly or daily 60% of employees circumvent security features on their mobile devices It doesn’t take qualified research or a fancy publication in a trade journal for [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/four-steps-to-improve-security-awareness/">Four Steps to Improve Security Awareness</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p class="p1"><a title="Ponemon Institue" href="http://www.ponemon.org/">Ponemon Institute</a>, an independent agency that conducts research on privacy, data protection, and information security policies, states that:</p>
<p class="p1">51% of CEOs surveyed said their company experiences cyber attacks hourly or daily</p>
<p class="p1">60% of employees circumvent security features on their mobile devices</p>
<p class="p1">It doesn’t take qualified research or a fancy publication in a trade journal for us all to agree that: Every employee in your credit union is a potential penetration point for your network, systems, and your data. Getting rid of all the employees doesn’t seem like a popular risk mitigation option, so we’re left with education and behavior modification.</p>
<p class="p1"><b>Assess, Train, Monitor, Repeat</b></p>
<p class="p1">The foundation of any good information security or data protection program is the component of <strong>security </strong><b>awareness and training</b>. At CUdefender, we are strong advocates for making credit union employees aware that threats exist but also teaching them how to recognize threats and know exactly how to respond to keep data and systems secure.</p>
<p class="p1">This four-step approach seems to help employees retain information they are taught and change behaviors over the long term.</p>
<ol class="ol1">
<li class="li1"><b>Assess</b> &#8211; It is imperative that credit unions understand the level of risk within their own institution. Simulated attacks and knowledge assessments are great tools for helping accomplish this, but it shouldn’t just be about <a title="penetration testing" href="http://www.cudefender.com/services/rapid-penetration-testing/">penetration testing</a>; it should also be about education and motivation for employees. Take this opportunity to provide employees guidance about how they can make better choices in the future. This education is critical to long-term retention. As Art Gilliland, General Manager of Enterprise Security Products at HP, told <a href="http://www.forbes.com/sites/kathryndill/2014/08/06/how-to-talk-to-your-employees-about-cybersecurity-without-putting-them-to-sleep/"><span class="s1">Kathryn Dill of </span><span class="s2"><i>Forbes Magazine</i></span></a>, taking advantage of a teachable moment directly following an action is more effective than a general conversation later. “Educate at that moment,” said Gilliland. “It can be private, but it’s very powerful at the time of failure.”</li>
<li class="li1"><b>Train</b> &#8211; Providing in-depth training as an add-on to specific teachable moments provides employees a better understanding of the potential risks. It’s during this phase that staff gets a sense of how important their actions are to the safety and security of your credit union. It’s critical to think beyond phishing attacks and email and extend training to include the many other channels where attacks may be present such as social networks.</li>
<li class="li1"><b>Monitor</b> &#8211; After employees receive in-depth training, effectiveness must be monitored and measured as this helps to identify your weaknesses and which employees may require additional training. Many credit unions stop after training and don’t take the extra steps to formalize key performance indicators (KPIs) to establish a clear path forward. Where should you be 6 months or a year from now? Having clearly defined goals and publishing the general trend will further serve to keep security top-of-mind and keep staff motivated.</li>
<li class="li1"><b>Repeat</b> &#8211; Cybersecurity threats are ever changing and come in many different forms: phishing, smishing (malicious SMS/Texts), and vishing (classic fake phone calls); social engineering, social network threats, and lost or stolen devices are just some of the issues credit unions are facing. Hackers are fast learning and relentless. Their approaches are becoming more varied and complex. For these reasons, it is critical that we continue to reinforce best practices and teach good behavior. A security awareness and training program that gives you the ability to deliver training with high frequency (bi-monthly) is key to realizing the best possible results.</li>
</ol>
<p class="p1">As with anything, security awareness and training is just a small piece of the puzzle. Following the four-steps outlined above can vastly improve your training program and make for a strong foundation, but be sure to think holistically. At CUdefender, we help protect credit unions from cyber threats by providing guidance as well as a <a title="full range of easy to implement tools" href="http://www.cudefender.com/services/">full range of easy to implement tools</a> delivered 100% from the cloud. Feel free to visit our website <a title="http://www.cudefender.com" href="http://www.cudefender.com">http://www.cudefender.com</a> or <a title="reach out" href="http://www.cudefender.com/contact-us/">reach out</a> to our team for more information.</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/four-steps-to-improve-security-awareness/">Four Steps to Improve Security Awareness</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/four-steps-to-improve-security-awareness/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Credit Union Cyber Security Awareness</title>
		<link>https://cudefender.com/credit-union-cyber-security-awareness/</link>
		<comments>https://cudefender.com/credit-union-cyber-security-awareness/#comments</comments>
		<pubDate>Wed, 01 Oct 2014 13:27:40 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[credit unions]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[security awareness]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4105</guid>
		<description><![CDATA[<p>October is the kick-off of National Cyber Security Awareness Month and how fitting it is with the recent onslaught of security related news making headlines across the media. The official kick off event put on by the National Cyber Security Alliance (NCSA), will feature several leaders from both public and private sectors coming together to promote online [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/credit-union-cyber-security-awareness/">Credit Union Cyber Security Awareness</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>October is the kick-off of National Cyber Security Awareness Month and how fitting it is with the recent onslaught of security related news making headlines across the media. The <a title="official kick off event" href="http://www.fox5vegas.com/story/26665873/national-cyber-security-awareness-month-to-launch-at-the-2014-nascio-annual-conference#">official kick off event</a> put on by the National Cyber Security Alliance (NCSA), will feature several leaders from both public and private sectors coming together to promote online safety awareness.</p>
<p>Credit Unions should use this Cyber Security Awareness Month to help remind and ensure that members are updated with the latest information about online scams, email and social phishing, password complexity, and have an opportunity to refresh skills with their overall online security. Also, Credit Unions that are taking proactive measures to improve security and further protect themselves (CUdefender customers :-), should help better educate members to keep them aware of the importance placed upon security and to provide more peace of mind.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/credit-union-cyber-security-awareness/">Credit Union Cyber Security Awareness</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/credit-union-cyber-security-awareness/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>CUdefender Protects Credit Unions Against &#8220;Shellshock&#8221; Vulnerability</title>
		<link>https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/</link>
		<comments>https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/#comments</comments>
		<pubDate>Fri, 26 Sep 2014 01:27:08 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4093</guid>
		<description><![CDATA[<p>Yesterday, a security researcher released the details of a major security vulnerability in Bash, a.k.a. Bourne-Again Shell, a popular software utility. The vulnerability, known as Shellshock, will be a serious problem for many Linux, Unix, and Mac OS X users. In order to protect our Credit Union customers from being affected by Shellshock, CUdefender has proactively [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/">CUdefender Protects Credit Unions Against &#8220;Shellshock&#8221; Vulnerability</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Yesterday, a <a title="security researcher" href="http://stephane.chazelas.free.fr/">security researcher</a> released the details of a major security vulnerability in Bash, a.k.a. Bourne-Again Shell, a popular software utility.</p>
<p>The vulnerability, known as Shellshock, will be a serious problem for many Linux, Unix, and Mac OS X users.</p>
<p>In order to protect our Credit Union customers from being affected by Shellshock, CUdefender has proactively updated its Web Application Firewall (WAF) rules to block the vulnerability.</p>
<p>Our implemented security rules work in multiple stages to ensure that Shellshock cannot be exploited on systems protected by CUdefenders’s WAF.</p>
<p>As a best practice, administrators of any systems running Bash should patch their systems as soon as patches for their distributions are available, even if those systems are already protected by CUdefender. Mjor Linux distributions such as Redhat, have already released patches.</p>
<p>Some vendors and third parties have already gone as far as creating simple diagnostic tools which can be run after patching to make sure that the vulnerability is closed and unexploitable on your system.</p>
<p>Technical details for Shellshock and affected versions for this vulnerability can be found in the National Vulnerability Database using the ID #’s <a title="CVE-2014-6271" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271">CVE-2014-6271</a> and <a title="CVE-2014-7169" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169">CVE-2014-7169</a>.</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/">CUdefender Protects Credit Unions Against &#8220;Shellshock&#8221; Vulnerability</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/cudefender-protects-against-shellshock-vulnerability/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Dynamic page generated in 0.583 seconds. -->
<!-- Cached page generated by WP-Super-Cache on 2025-12-14 05:48:55 -->
