How To Battle Hackers In 2017 And Beyond

Cyber insurance is an emerging field, while the Internet of Things scares.

Day 2 of the GAC opened with a political discussion on the future of the credit union movement including commentary from acting NCUA Board Chairman Mark McWatters and Board Member Rick Metsger, as well as a keynote address by former Secretary of State Colin Powell.

The afternoon sessions continued that theme, though a panel titled Cybersecurity in 2017 and Beyond focused less on the potential political actors carrying out cyber attacks, and more on the state of the ever-changing field today.

In 2017, credit unions are vulnerable to groups of bad actors canvassing for sensitive and potentially valuable information. These bad actors often take the form of hacktivists who leverage data to advance political or moralcauses, nation states, and trusted insiders, illustrating the fact that the financial information can be pilfered both internally and externally.

We’ve covered different approaches to credit union cybersecurity on,including how it all starts with the CEO. But the evolvingnature of the threat made the panelists from organizations such as the NCUA, CUNA Mutual, Department of the Treasury, and the FA-ISA pause when asked about handy best practice guides.

But the basic tenants of cybersecurity are consistent across all institutions, says Tim Segerson of the NCUA’s Office of Examination and Insurance.

We need to understand current risks and guard against those, he says. But that has to be balanced with your financial capabilities.

Does the credit union find it appropriate to be up and running right after an attack like it never really happened? That might require a greater financial investment on the part of the institution.

Or maybe not. Jay Isaacson, a vice president with CUNA Mutual Group cited the 2016 Verizon Data Breach Investigations Report that found 63% of breaches werethe result of weak or stolen passwords. That’s in addition to other research showing human error is to blame for most breaches.

Education is important for staff and members on this topic, Isaacson says. They can’t rely on default passwords.

Another bullet in the chamber for credit unions in the fight against cybersecurity is insurance.

Cyber insurance is still a new, maturing field, but for issuers there are two components: first-response coverage and liability coverage. Typically first response coverage will allow a hacked credit union to cover the costs of the forensics work, includingfees paid to investigating agencies, lawyers, and member and employee education efforts.

Liability coverage on the other hand, helps to cover the costs of a suit brought against the credit union.

All insurance policies are different, too, Isaacson says. And they continue to evolve. But not as fast as the bad actors are.

Ransomware and distributed denial-of-service (DDoS) attacks are getting more sophisticated. And as the interconnectivity of devices large and small continues to advance, hackers may take advantage of vulnerabilities in the so-called Internet of Things(IoT).

In November 2016, hackers used a drone to target a set of Philips light bulbs in an office tower, using a virus that let the hackers turn the lights on and off and flash anSOS message in Morse code.

And while the NCUA’s Segerson admitted we’re only in the early stages of understanding attacks to the IoT, there are ways to mitigate risk.

For suspicious email activity, consider the source.

It’s getting harder to know what to open and what not, Segerson says. My personal practice is if there is an attachment and I’m not highly confident where it’s coming from I delete it.

Some credit unions and their league affiliates have their own solutions.

Tom Kane, president and CEO of the Illinois Credit Union League spoke at Sunday’s Small Credit Union Roundtable. He’sa former CIA employee who has also worked for Aon Corp., Quaker Oats, and Risk Sciences Group before joining the league in 2003. His best advice for holding down hacks: Don’t mix business with pleasure. Keep the personal stuff away fromthe work stuff.

At his operation, games and personal software are not allowed on work computers and instead Chromebooks are available in the lunch room for employees to use for email and other personal business.

There are a few relatively simple things you can do to mitigate a lot of risk, Kane says. That includes ensuring the integrity of software installations and keeping it up to date, limiting access to the network to vendors and employees onlywhere and when needed, and working to keep staff awareness high about the threats of social engineering. I was whale phished myself last week, he says. Someone had sent one of his executives an email that looked like it was from Kaneand was asking for a wire transfer to be made. He brought it to me and I confirmed it wasn’t legit.

In addition, while it’s important to have relationships with local police departments and belong to trusted communities to more quickly spread the flow of information, credit unions can leverage their buying power to make sure the solutions on themarket are the most secure.

Use your purchasing power to walk when things aren’t made to proper security standards, Segerson says.

Marc Rapport contributed to this article.

More From GAC 2017

  • GAC Week And A Movement’s Heart For Growth

  • Why Can’t Bigger Be Better?

  • NCUA Chair Says Show Them The Money

  • Federation Report Says CDFI Credit Unions Outperform

  • How To Tell Your Story

  • Granted, Small Credit Unions Can Succeed

March 1, 2017

Keep Reading

View all posts in:
More on:
Scroll to Top
Verified by MonsterInsights