We use cookies to improve your experience and optimize user-friendliness. Read our privacy policy for more information on the cookies we use and how to delete or block them. To continue browsing our site, please click accept.
Winning Back-Office Strategies to Boost Your Business Agility
VIEWpoint Issue 1 | 2023
2023 Compliance Trends: Staying Ahead in an Evolving Regulatory E...
While technology continues to evolve, so do the tactics cybercriminals use to attack organizations – with financial institutions being a hot target. The National Credit Union Administration (NCUA) has recently observed a concerning rise in cyberattacks against credit unions, credit union service organizations (CUSOs) and other third-party vendors supplying financial services products. These attacks include incidents related to critical vulnerabilities found in the MOVEit Transfer web application, a software many institutions leverage to transfer large volumes of sensitive data, as well as other various attacks. The key vulnerabilities the NCUA has reported finding in the web-based application include:
Per the NCUA, credit unions must remain vigilant in protecting their data and operations from all threats, including ransomware, phishing or social engineering leading to business email compromises, and distributed denial-of-service (DDoS) attacks.
Staying proactive is critical in safeguarding your institution’s sensitive data. The NCUA recommends the top ten mitigation steps and best practices below to safeguard against these evolving cyber threats:
Proactive cybersecurity measures safeguard the integrity, confidentiality and availability of credit union systems and data. While applying these mitigation steps and best practices may be a daunting task, your credit union doesn’t need to face them alone. Performing over 130 IT engagements annually, Doeren Mayhew’s IT Advisory and Security Group understands the cyber risks credit unions experience and can offer solutions to better manage them while also developing a strong foundation of controls to secure your overall security posture. Contact us to today to learn more about our suite of tailored IT services.
This publication is distributed for informational purposes only, with the understanding that Doeren Mayhew is not rendering legal, accounting, or other professional opinions on specific facts for matters, and, accordingly, assumes no liability whatsoever in connection with its use. Should the reader have any questions regarding any of the news articles, it is recommended that a Doeren Mayhew representative be contacted.
A quick registration is required to view our resources.
You will only be asked to do this one time (unless you don't save your browser cookies).