Links in “Technology”
- What Examiners Wish You Knew About Backup and Recovery Plans
A large component of IT risk assessments that examiners are looking very closely at is the backup and recovery aspect. This article outlines four things about your Backup and Recovery plan that examiners want you to know. [6/19/15]
- Cybersecurity with Zero Empathy for Human Behavior
People will share passwords, forget them, do unsafe things to get their jobs done. Today's cybersecurity design requires zero empathy for human behavior, assuming that users will do everything wrong. [6/19/15]
- Password Migraine Continues
A popular cloud-based password management service is the latest to suffer a data breach. [6/16/15]
- Facial Recognition? Don’t Hold Your Breath
Efforts to negotiate what constitutes fair commercial use of face recognition technology for consumers fall apart, with consumer advocate groups announcing they were withdrawing from talks. [6/16/15]
- Catching Up With Social Media: 5 Guidelines for Your Credit Union
Social media has broken down the traditional barriers between credit union and members. It's a pretty neat tool, but can also be tricky to navigate with compliance. This article offers 5 guidelines to taking advantage of social media while staying in check. [6/12/15]
- eStatement Adoption Best Practices
Has your credit union been struggling to get members to go paperless and adopt electronic statements? This article provides strategies and best practices to move your members away from their paper dependence. [6/11/15]
- Email Notification to Government Workers May Pose Risk
Security experts are scratching their heads over the Office of Personnel Managementâs decision to notify current and former federal government workers by email that they may have been victims of the recent data breach. Experts are concerned that the emails could be leaked publicly and copied by phishers. Employees that do not have email addresses will receive written notifications by mail. [6/11/15]
- OPM’s Breach: A Case Study of What Not To Do With IT Security
The hack of the federal government's Office of Personnel Management exposed a "lack of professionalism and knowledge" that is about 20 years behind the security curve. There was no IT security staff until 2013, IT was operated by contractors whose contracts were expired, and there was not even a comprehensive inventory of the network. Apparently, "the hackers knew this network better than the people that operated it." [6/10/15]
- NCUA Staff May be Victims of OPM Data Breach
Several current and former NCUA employees are thought to be victims of the large data breach of the Office of Personnel Management. The breach of OPM computers was reported last week, but dates back to April. Sensitive data of at least 4 million may have been affected. [6/10/15
- What’s Next: The Cyber Long Con
Finding your card was used to buy some gas in a different state is one thing. But what about hackers who implant a bug that skims off a tiny fraction of a retailers online purchases, then when the news of the bug is revealed, profits again by shorting the retailer's stock? The long cyber con is very real. [6/8/15]