Archive

Go to:

November 2017
SMTWTFS
1234
567891011
12131415161718
19202122232425
2627282930
< Oct Dec >
Leaguer Email Subscription

You are not currently subscribed. Click Subscribe below to receive the Leaguer email.

Cybersecurity: Suspicious Incidents and Behavior
Tuesday, October 17, 2017 6:55 AM

Being aware of signs of physical threats and potential indicators of cyber-attacks is an important step in early identification and/or prevention of incidents that can impact businesses, individuals, or the public.

Employees should be aware of company policies pertaining to reporting threats and follow appropriate protocols as outlined in the organization’s security policies.

Companies should also make it easy for employees to report suspicious behavior and incidents by considering the following:

  • Human resources providing and avenue to report suspected insider threats and suspicious behavior around the workplace.
  • Information security teams providing resources to report suspected cyber threats, such as a “report phishing” button in email clients and the use of a centralized shared mailbox (e.g. report-threats@yourcompany[.]org).

The Department of Homeland Security (DHS) offers these signs for identifying potential cyber incidents[1][4]:

  • Suspicious emails requesting information or containing suspicious attachments.
  • System failures or disruptions such as websites being down or credentials being denied.
  • Unauthorized changes, access, additions, or users to systems and configurations.
  • Suspicious questioning by individuals regarding systems, access types, networks, etc.

Additionally, DHS lists these signs for identifying behaviors that may lead to physical security breaches or other dangerous events[2][5]:

  • Observing suspicious persons around facilities or lines of questioning regarding the workplace or personnel.
  • Stockpiling of supplies such as key cards, uniforms, badges, or potentially dangerous materials on or around the workplace.
  • Unauthorized assets deployed near company facilities.
  • Surveillance or potential “dry runs” around important facilities or even public venues.

The additional attached resources can be printed and posted at the workplace as a reminder of what to look for and how to report cyber incidents and suspicious behavior.  These documents also contain contact information related to reporting crimes:

References:

  1. Report Cybersecurity Incidents
  2. Report Suspicious Activity
  3. Cybersecurity: A Small Business Guide

This information has been provided to Cornerstone Credit Union League for Cyber Security Awareness Month, and is used with permission from the National Credit Union Information Sharing and Analysis Organization (NCU-ISAO), whose mission is to advance credit union-specific cyber resilience in a strategic and collaborative partnership.

_____________________________________­­_______________­­__
 
Assess Your Systems and Manage Your Risk

As technology changes, every credit union faces new security issues. Let Credit Union Resources help you stay on top of it—your future could depend on it. Our team of technology professionals provides guidance on compliance, shares best practices, and performs audits. We have a vested interest in your success, and your cybersecurity matters to us. To find out how we can help you manage cybersecurity and operational risks, contact:

Idrees Rafiq
469-385-6799
800-442-5762, ext. 6799
irafiq@curesources.coop

Deanna Brown
469-385-6464
800-442-5762, ext. 6464

dbrown@curesources.coop

About Credit Union Resources Inc.
Credit Union Resources is a service corporation that provides industry-leading solutions and expertise to credit unions across the country. Credit Union Resources is a wholly owned subsidiary of the Cornerstone Credit Union League, a regional trade association representing the interests of credit unions in Arkansas, Oklahoma, and Texas.