If you’ve spent any amount of time in the financial industry, you’re probably familiar with the dos and don’ts of passwords: DO: * Use various upper-case and lower-case letters. * Make sure it is at least eight or more characters in length. * Include special characters. * Create strong, hard-to-guess passwords.
The world may seem larger than ever before, but attackers don’t think so. With our reliance on the virtual space to connect us and push technology into mainstream operations – especially those for financial institutions like credit unions – every device is an open invitation to steal data and network access.
Michael Myers, Jason Voorhees and Freddy Krueger might strike fear in the hearts of horror fanatics this time of year, but the real villains are much more elusive and certainly more persistent. Bad actors, hackers, those who exploit your credit union and your members’ data are the real monsters, and
Federal regulators have been encouraging financial institutions to share information about known cyber incidents for years. Now banks and their third-party service providers have until May 1, 2022, to comply with the new rule requiring prompt regulator notification in the event of a cyber incident. How to Respond When a
According to Federal Reserve Chairman Jerome Powell, cyberattacks are one of the greatest risks to our global financial system [https://news.cuna.org/articles/119340-prepare-for-the-next-cyberattack-3-steps] . These risks have only increased as online financial transactions rise. For credit union cybersecurity, this means the effort required to protect member data is increasing
Look around you. At quick glance, you might see a smart thermostat, smart phone, video doorbell or fitness tracker. These things tie you directly, whether knowingly or unknowingly, to the Internet of Things (IoT). But you’re not alone – Cisco estimates there will be an astounding 500 billion devices connected
Cloud-based servers can be extremely useful, wouldn’t you agree? You don’t have to worry about hardware maintenance, power consumption, redundancy or physical security. Not to mention, storage limits are more easily resolved with less down time. And how many of us have hit the “Save Password” button when