<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CUdefender &#187; awareness</title>
	<atom:link href="https://cudefender.com/tag/awareness/feed/" rel="self" type="application/rss+xml" />
	<link>https://cudefender.com</link>
	<description>Credit Union Cyber Security Solutions</description>
	<lastBuildDate>Tue, 24 Feb 2015 18:51:22 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.38</generator>
	<item>
		<title>Security is Broken, Backwards, and Upside Down</title>
		<link>https://cudefender.com/security-broken-backwards-upside/</link>
		<comments>https://cudefender.com/security-broken-backwards-upside/#comments</comments>
		<pubDate>Fri, 13 Feb 2015 13:58:28 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[broken security]]></category>
		<category><![CDATA[training]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4295</guid>
		<description><![CDATA[<p>After numerous articles, comments, and post-incident analysis of the various cyber attacks cluttering our media headlines and social feeds, it doesn’t take one too long to conclude that our existing model for security is broken, backwards, and upside down. I’m a firm believer that, for far too long, we’ve put our focus on protecting our [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/security-broken-backwards-upside/">Security is Broken, Backwards, and Upside Down</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>After numerous articles, comments, and post-incident analysis of the various cyber attacks cluttering our media headlines and social feeds, it doesn’t take one too long to conclude that <b>our existing model for security is broken, backwards, and upside down.</b></p>
<p>I’m a firm believer that, for far too long, we’ve put our focus on protecting our network perimeter, with thoughts of trying to keep “the bad guys” from getting in, rather than focusing on the security of our people and our data, and keeping the sensitive information from getting out. Broken? Backwards? Upside down? Your call, but <b>fixing this is a major paradigm shift in thinking and organization culture.</b></p>
<p>So, you ask, how do we fix it? Let me outline the <b>top 3 most important steps</b> to paving the way for a security model repair.</p>
<ol>
<ol>
<li><b>Elevate the cyber discussions to board level.</b> The financial, operational, legal, regulatory, reputational and, therefore, strategic risks around cyber threats are game changers for credit unions, their leaders, their employees, their members, and all their other stakeholders. Executives and boards must be in active discussion and seeking the proper security awareness and education.</li>
<li><b>Fix the broken training model and start providing employees engaging and continuous cyber awareness training.</b> Most existing cyber awareness training programs are severely lacking. First, nobody gets excited about 60 to 90 minute module based training followed by a quiz. Secondly, annual or quarterly training could never keep the security awareness top-of-mind enough to gain the required behavior modification required of employees in order to foil emerging threats. That would be similar to showing a 7 year old student multiplication flash cards once a quarter and expecting them to have quick recall of the answers. Just not going to happen. Effective training must be served up in continuous, short bursts that utilize some level of gamification to keep employees engaged and in active discussion. With research showing that greater than 90% of breaches occur because of user targeted phishing (or similar) attacks, this is a serious issue.</li>
<li><b><b>Protect the DATA! </b></b>Make sure the data is encrypted. We must assume that a breach has already occurred and a user, or the network, has been compromised. Not if, but when, it does happen, will the data be easily obtained and exfiltrated? Granular encryption of data both at rest and in motion should be a baseline requirement.</li>
</ol>
</ol>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Don’t let the pressure of security related guidance coming from all directions create confusion and stall your progress.</p>
<p>As our team at CUdefender works with credit unions nationwide, we are assisting and guiding them in exactly how to accomplish the above steps in the most affordable way. Our engaging cyber awareness and training program is showing highly effective results. Please reach out for more information.</p>
<p>CUdefender can be contacted at 1-888-632-4339 or by visiting <a href="http://www.cudefender.com">http://www.cudefender.com</a></p>
<p><i>Rob Harbin is CEO and Cyber Security Evangelist for CUdefender, LLC., a credit union cyber security company. His LinkedIn profile can be viewed at </i><a href="http://www.linkedin.com/in/robharbin/"><i>www.linkedin.com/in/robharbin</i></a><i>. Email him at </i><a href="about:blank"><i>rharbin@cudefender.com</i></a><i> and follow CUdefender on Twitter at </i><a href="http://www.twitter.com/CUdefender"><i>www.twitter.com/CUdefender</i></a><i> and Facebook at </i><a href="https://www.facebook.com/CUdefender"><i>www.facebook.com/CUdefender</i></a></p>
<p>The post <a rel="nofollow" href="https://cudefender.com/security-broken-backwards-upside/">Security is Broken, Backwards, and Upside Down</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/security-broken-backwards-upside/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber Security Needs Board Level Visibility</title>
		<link>https://cudefender.com/cyber-security-needs-board-level-visibility/</link>
		<comments>https://cudefender.com/cyber-security-needs-board-level-visibility/#comments</comments>
		<pubDate>Tue, 13 Jan 2015 15:13:53 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[credit unions]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4284</guid>
		<description><![CDATA[<p>Recent research states that roughly two-thirds of companies say their executives get involved in security discussions, but for credit unions, it needs to be 100 percent of executives and, due to cyber threat risk, should extend beyond the executives directly to the board. Cyber attacks, like last November&#8217;s hack of Sony Pictures, have motivated many [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cyber-security-needs-board-level-visibility/">Cyber Security Needs Board Level Visibility</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Recent research states that roughly two-thirds of companies say their executives get involved in security discussions, but for credit unions, it needs to be 100 percent of executives and, due to cyber threat risk, should extend beyond the executives directly to the board.</p>
<p>Cyber attacks, like last November&#8217;s <a title="hack of Sony Pictures" href="http://www.itpro.co.uk/security/23593/sony-pictures-hack-the-interview-named-sonys-most-successful-online-release-ever" target="_blank">hack of Sony Pictures</a>, have motivated many to increase focus on external threats and begin having more discussions around real world cyber threats and overall preparedness.</p>
<p>Credit unions, like many other companies, have business units that submit regular requests to buy new cloud apps, the most popular being file-sharing services like Box, Dropbox, and Evernote. With most credit union infrastructure being built as fragmented layers of add-ons, over a period of many years, the security methods used to protect the legacy network and applications, as well as these new cloud applications, is severely lacking.</p>
<p>2015 is the year that credit unions must reinvent their security model to be more holistic and ready to face the sophistication of emerging threats. This doesn’t have to be a complete rip-out and replace initiative, and it can be accomplished much easier that most believe. Our team at <a title="CUdefender" href="http://www.cudefender.com/" target="_blank">CUdefender</a> speaks regularly with credit union executives and boards who don’t realize some of the quick and cost effective steps they can take to have an immediate positive impact on their security posture.</p>
<p>The long-standing issue of security having a proper seat at the executive table should no longer be a problem. Now it needs another lift upwards to the board. Hopefully credit unions will have foresight to make cyber topics a substantial part of their 2015 board and strategic planning meetings.</p>
<p>Credit unions looking for security planning assistance or cyber threat protection can contact CUdefender at 1-888-632-4339 or visit <a href="http://www.cudefender.com/" target="_blank">http://www.cudefender.com</a> for additional information.</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/cyber-security-needs-board-level-visibility/">Cyber Security Needs Board Level Visibility</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/cyber-security-needs-board-level-visibility/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Four Steps to Improve Security Awareness</title>
		<link>https://cudefender.com/four-steps-to-improve-security-awareness/</link>
		<comments>https://cudefender.com/four-steps-to-improve-security-awareness/#comments</comments>
		<pubDate>Sat, 25 Oct 2014 13:50:30 +0000</pubDate>
		<dc:creator><![CDATA[Rob]]></dc:creator>
				<category><![CDATA[security awareness]]></category>
		<category><![CDATA[awareness]]></category>
		<category><![CDATA[training]]></category>

		<guid isPermaLink="false">http://www.cudefender.com/?p=4258</guid>
		<description><![CDATA[<p>Ponemon Institute, an independent agency that conducts research on privacy, data protection, and information security policies, states that: 51% of CEOs surveyed said their company experiences cyber attacks hourly or daily 60% of employees circumvent security features on their mobile devices It doesn’t take qualified research or a fancy publication in a trade journal for [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/four-steps-to-improve-security-awareness/">Four Steps to Improve Security Awareness</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p class="p1"><a title="Ponemon Institue" href="http://www.ponemon.org/">Ponemon Institute</a>, an independent agency that conducts research on privacy, data protection, and information security policies, states that:</p>
<p class="p1">51% of CEOs surveyed said their company experiences cyber attacks hourly or daily</p>
<p class="p1">60% of employees circumvent security features on their mobile devices</p>
<p class="p1">It doesn’t take qualified research or a fancy publication in a trade journal for us all to agree that: Every employee in your credit union is a potential penetration point for your network, systems, and your data. Getting rid of all the employees doesn’t seem like a popular risk mitigation option, so we’re left with education and behavior modification.</p>
<p class="p1"><b>Assess, Train, Monitor, Repeat</b></p>
<p class="p1">The foundation of any good information security or data protection program is the component of <strong>security </strong><b>awareness and training</b>. At CUdefender, we are strong advocates for making credit union employees aware that threats exist but also teaching them how to recognize threats and know exactly how to respond to keep data and systems secure.</p>
<p class="p1">This four-step approach seems to help employees retain information they are taught and change behaviors over the long term.</p>
<ol class="ol1">
<li class="li1"><b>Assess</b> &#8211; It is imperative that credit unions understand the level of risk within their own institution. Simulated attacks and knowledge assessments are great tools for helping accomplish this, but it shouldn’t just be about <a title="penetration testing" href="http://www.cudefender.com/services/rapid-penetration-testing/">penetration testing</a>; it should also be about education and motivation for employees. Take this opportunity to provide employees guidance about how they can make better choices in the future. This education is critical to long-term retention. As Art Gilliland, General Manager of Enterprise Security Products at HP, told <a href="http://www.forbes.com/sites/kathryndill/2014/08/06/how-to-talk-to-your-employees-about-cybersecurity-without-putting-them-to-sleep/"><span class="s1">Kathryn Dill of </span><span class="s2"><i>Forbes Magazine</i></span></a>, taking advantage of a teachable moment directly following an action is more effective than a general conversation later. “Educate at that moment,” said Gilliland. “It can be private, but it’s very powerful at the time of failure.”</li>
<li class="li1"><b>Train</b> &#8211; Providing in-depth training as an add-on to specific teachable moments provides employees a better understanding of the potential risks. It’s during this phase that staff gets a sense of how important their actions are to the safety and security of your credit union. It’s critical to think beyond phishing attacks and email and extend training to include the many other channels where attacks may be present such as social networks.</li>
<li class="li1"><b>Monitor</b> &#8211; After employees receive in-depth training, effectiveness must be monitored and measured as this helps to identify your weaknesses and which employees may require additional training. Many credit unions stop after training and don’t take the extra steps to formalize key performance indicators (KPIs) to establish a clear path forward. Where should you be 6 months or a year from now? Having clearly defined goals and publishing the general trend will further serve to keep security top-of-mind and keep staff motivated.</li>
<li class="li1"><b>Repeat</b> &#8211; Cybersecurity threats are ever changing and come in many different forms: phishing, smishing (malicious SMS/Texts), and vishing (classic fake phone calls); social engineering, social network threats, and lost or stolen devices are just some of the issues credit unions are facing. Hackers are fast learning and relentless. Their approaches are becoming more varied and complex. For these reasons, it is critical that we continue to reinforce best practices and teach good behavior. A security awareness and training program that gives you the ability to deliver training with high frequency (bi-monthly) is key to realizing the best possible results.</li>
</ol>
<p class="p1">As with anything, security awareness and training is just a small piece of the puzzle. Following the four-steps outlined above can vastly improve your training program and make for a strong foundation, but be sure to think holistically. At CUdefender, we help protect credit unions from cyber threats by providing guidance as well as a <a title="full range of easy to implement tools" href="http://www.cudefender.com/services/">full range of easy to implement tools</a> delivered 100% from the cloud. Feel free to visit our website <a title="http://www.cudefender.com" href="http://www.cudefender.com">http://www.cudefender.com</a> or <a title="reach out" href="http://www.cudefender.com/contact-us/">reach out</a> to our team for more information.</p>
<p>The post <a rel="nofollow" href="https://cudefender.com/four-steps-to-improve-security-awareness/">Four Steps to Improve Security Awareness</a> appeared first on <a rel="nofollow" href="https://cudefender.com">CUdefender</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://cudefender.com/four-steps-to-improve-security-awareness/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Dynamic page generated in 0.552 seconds. -->
<!-- Cached page generated by WP-Super-Cache on 2025-12-14 05:48:54 -->
