<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=4052188&amp;fmt=gif">

Credit Union Hack

With the proliferation of breaches in today’s environment, many credit unions are spending thousands and thousands of dollars on technical security including unified threat management (UTM) devices, firewalls, intrusion prevention/intrusion detection, web filtering, penetration/vulnerability assessment testing and anti-virus solutions. 

While all of these protections are valuable and important to have in place to reduce risk, many credit unions are overlooking their weakest link – staff.  All it takes is one successful social engineering attack on your staff, and a hacker has just thwarted the thousands of dollars spent on technical and physical security protections you've in place.

Social engineering is defined as a psychological attack where a hacker tricks you or manipulates you into divulging sensitive information. Examples of social engineering attacks include:

  • Phishing — Fraudsters defraud an online account holder by posing as a legitimate company.
  • Pharming — Fraudsters direct users to a bogus website that mimics the appearance of a legitimate one to obtain personal information like passwords, account numbers, etc...
  • Phone Calls — Fraudsters pose as a trusted third party or regulatory body to obtain sensitive information over the phone. 
  • Physical Bait — Fraudsters will leave USB drives around an office and wait for someone to plug them in (one study showed that 60-90% of people plug in unknown USB drives they find around the office). When the USB is inserted into a computer, the computer automatically runs programs on the drive that can install malware.

Social engineering is a very successful form of hacking because humans are inherently trusting, courteous, social and interested in helping — especially in the credit union industry! In fact, according to the 2013 Data Breach Investigations Report published by Verizon, social engineering accounted for approximately 30% of all breaches. This is four times higher compared to the 2012 report.

So what do you need to do? The answer is training and testing often! Your staff is your front line of defense, and a good security awareness training program is imperative to preventing a social engineering attack.

One of my favorite examples of a social engineering test involved a credit union that dropped 20 USB flash drives around their property and branches. They were shocked when they found that 17 of the drives got plugged into credit union computers. The most interesting part? This test was performed only a few months after security awareness training! I was at a credit union recently performing social engineering testing as part of an information security risk assessment, and a staff member gave me full access to their server room without verifying who I was or if I was approved to be there!

Again, your staff is your first line of defense. How confident are you that they would recognize and appropriately respond to a social engineering attack?

Free e-signature security eBook

You may also like

Credit Union Expert Shares 2014 Strategic Planning Insights
Credit Union Expert Shares 2014 Strategic Planning Insights
11 December, 2013

Today we have a special treat. We're bringing you a guest blog post from our friends over at Credit Union Resources. Dea...

What to Do When Your Credit Union's CEO Resigns
What to Do When Your Credit Union's CEO Resigns
28 January, 2014

Today we have a guest blog post from Karen Houston-Johnson, VP at Credit Union Resources, Inc. Karen brings us some tips...

9 Keys to Boosting Member Loyalty
9 Keys to Boosting Member Loyalty
17 September, 2014

It is well known that member loyalty drives retention and referrals. It is a topic important to every credit union conce...