avoid data breach with sound cybersecurityOctober marks the 12th annual National Cybersecurity Awareness Month.  This is an initiative sponsored by the U.S. Department of Homeland Security in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center.  And one former White House CIO has some information to share with you: She says that defensive strategies stop just one-third of threats and you should go "Go on the Cybersecurity Offensive."

You’ve been thinking about cybersecurity all wrong, says Theresa Payton, former White House chief information officer (CIO) under President George W. Bush.

“That’s not your fault,” says Payton, who delivered a keynote address at the CUNA Technology Council and Operations, Sales & Service Council Conferences in Orlando, Fla. “You were told to create these firewalls and install antivirus software and hunker down behind that. That isn’t going to work. You need to go on offense.”

Defensive systems simply can’t keep up with the legion of cybercriminals who release a new deviant of malware into the wild every 90 seconds, Payton says. Their coding acumen and technology allow them to quickly detect and circumvent obstacles in antivirus and antimalware software simply by changing a line of code.

Theresa Payton “These systems only block about one-third of all the bad things out there,” says Payton, founder/CEO of Fortalice Solutions and co-founder of Dark Cubed, and a member of two military-oriented credit unions. “That’s why it’s so important for you to have an offensive strategy.”

Components of an offensive strategy include:

Prioritizing and segmenting your data so a breach can compromise only your least sensitive data. Maintain your public-facing domain as a marketing tool but consider creating a separate, hidden domain for business purposes, and require different sets of credentials for various areas.

Committing to regularly practice plausible digital disaster scenarios, such as your response if a cybercriminal gains control of a member’s holdings and demands a ransom. “A breach is inevitable but my response as a victim is not inevitable,” Payton says.

Designing user-friendly cybersecurity defenses and processes. “Do you ask humans to conform to the technology, or do you ask the technology to conform to humans?” Payton asks. “If it’s not operationally friendly, someone’s going to find a workaround to get the job done. And now we’ve lost line of sight to that data.”

Assessing your vendor contracts and renegotiating them if necessary to demand immediate notification of a breach that compromises sensitive member information. “Ninety percent of the time, the contracts call for the company to notify you within a ‘reasonable’ amount of time” — too vague and ineffective a requirement, according to Payton.

Investigating the specifics of your cyberinsurance coverage. Will the insurer pay a ransom to retrieve data, or cover the costs of a marketing and public relations campaign to restore members’ trust after a breach? Is the credit union covered if a vendor breach compromises member data? If a credit union employee causes the breach by clicking on a bad link, does that invalidate the claim?

If you haven't made the time to assess your disaster recovery recently, now is the time.  FLEX assists credit unions in not only disaster preparedness, but in recovery should a data breach or other catastrophe strike.  See how we can help you today.

Put the Power of FLEX to work for you. Watch the Video!  

Topics: Disaster Recovery

Recent Posts

Posts by Topic

see all topics
FLEX will improve your system efficiency.