Pub 3 2021 Issue 3

HOMETOWN BANKER | HOMETOWNBANKER.ORG | 9 lists of stolen credentials against login interfaces. Recently, the FBI reported that credential stuffing accounted for 41% of financial sector cyberattacks. • POINT OF SALE (POS) SKIM ATTACKS: POS skim attacks occur when a criminal copies card payment information using POS processing devices, which are used everywhere from ATMs to gas station pumps. Despite the massive transition to e-commerce during the pandemic, these types of attacks have continued as criminals use digital skimmers to steal payment information from e-commerce websites. EMERGING CYBERCRIME TRENDS FOR 2021 Although the threats discussed above indeed pose a risk to financial institutions and other organizations, there are several emerging cyber threats to consider as well. Institutions must stay vigilant, especially as many employees continue working remotely. • SUPPLY CHAIN ATTACKS: This attack occurs when a bad actor targets a software vendor to deliver malicious code through seemingly legitimate products or updates. The recent SolarWinds breach is an example of a supply chain attack, which is becoming an increasingly popular method to distribute malware. • VIRTUAL PRIVATE NETWORK (VPN) ATTACKS: As remote work becomes the norm for many organizations, cybercriminals will likely continue VPN attacks in an attempt to gain access to corporate networks and data. Many home networks do not have proper passwords set up or lack security protocols, presenting vulnerabilities for criminals to target. • CLOUD-BASED ATTACKS: Many organizations are migrating more of their infrastructure to the cloud, prompting cybercriminals to shift more of their efforts to cloud-based attacks. Institutions must ensure their cloud infrastructure is securely configured to prevent harmful breaches. STRENGTHENING SECURITY FOR YOUR INSTITUTION Financial institutions should consider the following strategies to protect their networks and customers while strengthening their cybersecurity posture. • CREATE STRONGER PASSWORDS: Institutions should enforce stronger password requirements for employees and customers to prevent unauthorized account access. Many organizations previously recommended 8-character, frequently changed passwords, but current best practices dictate using passwords consisting of 14 characters or more and changing them once per year or as needed. • UTILIZE MULTI-FACTOR AUTHENTICATION (MFA): True MFA — not just double passwords — should be used whenever possible. With MFA, multiple authentication factors are required to verify a user’s identity. This verification strengthens resiliency and prevents fraudsters from accessing an account solely by obtaining or cracking a password. • ENHANCE EMPLOYEE EDUCATION: Your institution should enhance employee and customer education efforts. Instead of one annual training, provide frequent information that delivers both basic security principles and news about timely issues. Focus training is also recommended based upon an employee’s responsibilities and access rights. Employee education will also reinforce proper online conduct and normalize communicating with IT after encountering a potentially malicious link or other risk. • SECURE INTERNET ACCESS: It is critical to ensure proper network security for employee VPNs and their home networks. Encourage employees to use high-quality routers with strong network passwords, run current security protocols, and install up-to-date virus and malware protection on personal and corporate devices. Your institution should also review your policies for VPN access and removal, acceptable use of business devices, and any other relevant corporate policies. FACING FUTURE CYBER THREATS As your institution navigates this new landscape, ensure the proper security controls are in place to enhance your risk mitigation and stay one step ahead of emerging cyber threats. TYLER LEET SERVES AS DIRECTOR OF RISK AND COMPLIANCE SERVICES FOR CSI’S REGULATORY COMPLIANCE GROUP. Employee education will also reinforce proper online conduct and normalize communicating with IT after encountering a potentially malicious link or other risk.