|
  1. Eliminate unnecessary data, and keep tabs on what's left.
  2. Perform regular checks to ensure that essential controls are met.
  3. Collect, analyze, and share incident data to create an effective information-security resource.
  4. Analyze and share tactical threat intelligence, especially indicators of compromise.
  5. Along with prevention, focus on faster detection through people, processes, and technology.
  6. Regularly measure factors such as number of compromised systems and mean time to detection and use these numbers to drive better practices.
  7. Evaluate the threat landscape to develop a customized security strategy.

Source: 2013 Verizon Data Breach Investigations Report, CUNA Credit Union E-Scan

Read more in the Aug. 28 Back-Office Technology Focus Report:

|

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

Your access to unlimited CUTimes.com content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.