by Beth Sumner | Feb 8, 2024 | User Access, Governance, MFA, Multi-Factor Authentication, Risk Assessment
In the rapidly evolving landscape of banking technology and cybersecurity, understanding and implementing effective Identity and Access Management (IAM) strategies is more crucial than ever. Yet, we understand that delving into the complexities of IAM can be daunting....
by Zach Duke | Sep 14, 2023 | Cybersecurity, Information Security, Infosec, page-user-access, Reporting, Risk, Risk Assessment, User Access
The Federal Financial Institutions Examination Council (FFIEC) updated its Authentication Guidance in August 2021, which aims to standardize and enhance security measures for financial institutions. We are seeing a focus on these areas during exams and audits, and...
by Beth Sumner | Jul 27, 2023 | Cybersecurity, Information Security, Infosec, page-user-access, Reporting, Risk, Risk Assessment, Training, User Access
Today, we’re delving into an essential topic that affects both the security and the integrity of your digital assets: privilege creep. In this blog, we’ll explore the potential risks, and provide you with actionable strategies to prevent this sneaky threat from...
by Finosec | May 11, 2023 | Information Security, Infosec, Reporting, Risk Assessment, User Access
User Access Reviews (UAR) are crucial for financial institutions, examiners and auditors are focusing on them, and best practices mandate managing to least privilege. However, the process can be complicated and time-consuming. This is why it’s important to...
by Finosec | Feb 2, 2023 | Cybersecurity, Banking, Infosec, Reporting, User Access
Step 5 is the final step in the User Access Review Best Practices series. The goal of this step is to focus on increasing standardization to develop a more mature and routine approach to user access reviews by focusing on three key areas. Roles and baseline...
by Finosec | Jan 26, 2023 | Fintech, Information Security, Infosec, Reporting, User Access
Step Four in the FINOSEC user access review best practice series is to ensure users who have access to your systems have legitimate duties that justify not only access but their specific permissions for those systems. Step Four: Review System Access and Permissions In...