Pop culture has made cybercrime seem like quantum physics: It is nearly impossible for the average person to understand how data and money are easily stolen with some computer keystrokes. Maybe that's why cyber thieves make such compelling figures in movies and television shows. You want to understand just what the heck they're doing.

On the surface, there seems to be a lot of mystery about real life data breaches at credit unions, banks and other financial institutions. Yet when one looks past the "elaborate" techniques and technologies used by hackers, the data breaches themselves are surprisingly simple. In fact, the vast majority result from three relatable scenarios:

|
  1. An unknown hacker obtains an employee's credentials and proceeds to steal funds and/or data.

  2. An employee or trusted third party knowingly steals funds and/or data.

  3. An employee or trusted third party unknowingly releases sensitive data for profit.

The common factor in each of these scenarios is the insider: An employee, privileged user or trusted third party. Whether intentional or accidental, these are the people who make data breaches possible.

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

Your access to unlimited CUTimes.com content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.