As tiring as it may sound, training is still the most important risk mitigation factor in reducing the number of insider threats. Insider threats originate either through the vulnerability of human kindness and the rush of our non-stop world, or through malicious and disgruntled actions.
With the majority of corporate training today being more of a checkmark for management then actual user education, employees have created ways to bypass the act of learning for sake of time. Requiring the review and acknowledgement of policies and possibly going through a slideshow presentation leads the majority of users to bypass the review, and click acknowledge.
Breaches will continue to occur as long as humans are involved in ensuring the proper controls are in place and functioning. Be it an under-protected vendor portal or a simple email attachment, vulnerabilities as simple as these open the door for malicious actors. This is not to say that you should not protect your information assets, as defense-in-depth, the act of adding layers of security around your critical data may deter or slow an attack so that it is detectable.
Asset Management - knowing what data, applications and systems are on your network and all of the connections that your network maintains and allows - is a first step towards a more secure bank or credit union. Here's some related important questions to ask:
Vendor systems will continue to be a target for cyberattacks because of the sheer volume of data available for thousands of credit unions and millions of members stored in one location.
Your bank or credit union, like all others, have many vendors providing services that are critical to your operations such as your core, card processing, item processing, loan processing, etc.
These vendors provide you with Service Organization Controls (SOC) reports, but do you really know what the 150 pages are telling you about how they're handling your data and managing your systems?
Outsourced companies can analyze your vendor's SOC reports and provide a summary informing you of possible risks in your vendor's controls. In addition, companies can also perform a deep dive into your vendor's performance on Overall Information Security, Cybersecurity, as well as Business Continuity and Disaster recover reviews. Each of these reviews provides a unique insight into your vendor and the potential risks involved.