February 7, 2019 DNS and MFA - WST On January 22, 2019, the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive with the subject, “Mitigate DNS Infrastructure Tampering” ordering all federal agencies to secure login credentials for their internet domain records. Required actions include auditing DNS records, changing DNS account passwords, adding multi-factor authentication to DNS accounts, and monitoring certificate transparency logs to detect prior unauthorized certificate issuance. This directive was issued in response to an uptick in attacks on websites and email servers by altering DNS records. CISA Director [...]
January 17, 2019 Resting on a house of cyber cards? - WST This week we’re talking about availability. When you come into work each day, do you think about the lights being on, the water running, or the HVAC working? Probably not. Could you run your bank for a day without these utilities? Probably not. Let’s face it, information technology and the infrastructure that facilitates its use is now as essential to keeping our banks open as power, water, and HVAC. Could we operate our bank for a day without information technology? Possibly. A week? No. Similar [...]
January 3, 2019 2019 Information Security Checklist - WST Like it or not…2019 is here. So now is a great time to take a close look at your 2019 schedule to make sure the critical elements of your information security program are mapped out. Here is our updated checklist for the New Year.
The language of the “Dark Web” is ubiquitous, and it’s important for banks to be able to communicate to customers what it is and what it contains. In this session, learn about the Deep Web, Dark Web, and Dark Nets and how they operate. Experience a live demo of the Dark Web to uncover where it exists, what it contains, and why it should be examined with caution.
Virtual Private Networks: Should you be using one? A VPN, or Virtual Private Network, allows you to create an encrypted connection to another network over the Internet. Most users are familiar with them for connecting back to their institution’s network for remote access. While this is one reason to use a VPN, it’s far from the only reason to use one. In today’s environments, eaves-dropping, public Wi-Fi, and location tracking (just to name a few) pose significant issues that often result in unwanted privacy invasions or data theft. One method of helping to prevent this is using a VPN. In [...]