- Eliminate unnecessary data, and keep tabs on what's left.
- Perform regular checks to ensure that essential controls are met.
- Collect, analyze, and share incident data to create an effective information-security resource.
- Analyze and share tactical threat intelligence, especially indicators of compromise.
- Along with prevention, focus on faster detection through people, processes, and technology.
- Regularly measure factors such as number of compromised systems and mean time to detection and use these numbers to drive better practices.
- Evaluate the threat landscape to develop a customized security strategy.
Source: 2013 Verizon Data Breach Investigations Report, CUNA Credit Union E-Scan
Read more in the Aug. 28 Back-Office Technology Focus Report:
|Continue Reading for Free
Register and gain access to:
- Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
- Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.