by Finosec | Jan 12, 2023 | Banking, Community Banking, Cybersecurity, Fintech, Information Security, Reporting, User Access
We learned about the importance of a System Map in Step One: Building the Foundation, last week. This week, we are discussing Step 2 – Start with the Most Important. In this critical step in the user access review process, you will identify the most important systems...
by Finosec | Nov 23, 2022 | Banking, Community Banking, Cybersecurity, Information Security, Infosec, User Access
Financial institutions have long viewed user access reviews as a double edged sword. On one hand, regulators require them. They’re a crucial component in managing to least privilege. But they’re a challenge to conduct on a regular schedule. And if you have to rely on...
by Finosec | Nov 10, 2022 | Banking, Community Banking, Cyber Attack, Cybersecurity, Fintech, Information Security, Infosec, Insurance, Security, Uncategorized
Cybersecurity insurance is an increasingly important component of your financial institution’s overall information security program. When a data breach or other hostile technology event occurs, cybersecurity insurance proceeds can provide funds to repair your...
by Finosec | Aug 4, 2022 | Cybersecurity, 2022, Banking, Community Banking, Cybersecurity Awareness Month, Information Security, Toolkit
Cybersecurity Awareness Month occurs in October. The US Cybersecurity and Infrastructure Agency (CISA) created it to increase general awareness of emerging online threats and how best to avoid them. This is a good thing. Our cyber landscape continually evolves, and...
by Finosec | Jul 19, 2022 | Banking, Board, Board Training, Cybersecurity, Reporting, User Access
User Access There are likely a high number of systems in place at your institution. Running a successful financial institution relies heavily on tools and technologies that will improve the efficiencies of you and your team. But when it comes to the users of your...
by Finosec | Jun 16, 2022 | Banking, Board, Board Training, Cybersecurity, Information Security
It’s vital for you to fully understand the information security management systems you have in place But it’s a nuisance to keep track of them all. First, you need to know the status of every component, especially for the systems you outsourced. Then, you must also...