Category: Security

11 Apr 2019
Why It's Important to Review Firewall Rules on a Quarterly Basis

Why It’s Important to Review Firewall Rules on a Quarterly Basis

Why It's Important to Review Firewall Rules on a Quarterly Basis

Due to constant change and the growing number of threats the industry experiences, firewall security must continuously adapt to combat current threats. In response, banks and credit unions should evaluate security processes and firewall rules on a regular (quarterly) basis.

Why Should You Review

Firewalls have been a part of network security systems, monitoring both outgoing and incoming traffic, for more than 25 years. They serve as the first line of defense, helping to prevent unauthorized access and blocking certain communications based on security settings.

However, just having a firewall in place is not enough. Banks and credit unions are dynamic in nature and are constantly adding new services or changing business processes. If they are not checking the firewall configuration and rules regularly, it opens the institution up to attacks and breaches. Regular reviews help ensure a weakness in the security of the network will be found prior to exploitation and allow rules to be updated as necessary to meet technology changes or new threats.

For banks, there is an additional regulatory reason to perform quarterly reviews: the FFIEC Cybersecurity Assessment Tool (CAT). The quarterly Firewall Audit serves as a baseline standard, meaning that if you can’t answer “yes,” you will not meet the baseline requirements for the CAT in Domain 3. The quarterly audit is also part of the FFIEC Information Security Booklet.

Where to Start with Quarterly Firewall Rule Evaluations

To better understand how to assess your firewall rules, a few basic areas must be addressed.

First, you should have a solid understanding of how your firewall works and how it is setup. You should also receive firewall reports on a regular basis, and these should be reviewed carefully.

What to look for in Firewall Rules

Download the PDFThe 2019 IT Outlook for Community Banking Get a Copy

Knowing how to review or audit firewall rules can be a challenge. Here are four basic things to start with to help guide the process.

  1. Evaluate your existing firewall’s change management procedures
    This helps ensure that all rule changes that have been made in the past are adequately logged and all procedures have been done correctly.
  2. Compare current firewall rules with previous firewall rules
    Comparing rules that were previously in place with those currently in place helps to easily identify any changes; track which changes have been made; and verify whether those changes are necessary. It will also help identify unused or “stale” rules.
  3. Evaluate external IP addresses that are allowed by firewall rules
    Make sure the addresses the firewall allows are still safe and that they make sense for your bank or credit union to utilize. If some addresses now seem odd or out of place, it is likely that the rules should be changed.
  4. Ensure there is still a true business need for open ports
    Firewall rules often contain open ports to allow for external communication. Evaluating open ports to ensure they are still needed is a basic — but important — step. If they are not, the rule can be deleted to avoid unnecessary communication.

While reviews of firewall rules can be done manually, it is time consuming and can be costly in terms operational resources and personnel. Many institutions decide to seek external assistance to simplify and enhance this task. This review task cannot be completely outsourced to a third-party, as it is still the institution’s final responsibility to validate the firewall configuration. If you decide to seek third-party assistance with this responsibility, be sure to ask for specifics and examples on how they help you meet this regulatory requirement and keep your network secure. A good third-party service provider can save your institution time while ensuring your organization has the most up-to-date and efficient firewall in place to protect against today’s constant threats and ensures all compliance and regulatory requirements are met.

04 Apr 2019
Does Your Bank’s Firewall Perform SSL/TLS Inspection?

Does Your Bank’s Firewall Perform SSL/TLS Inspection?

Does Your Bank’s Firewall Perform SSL/TLS Inspection?

Despite the significant advancements in technology and the sophistication of cyber threats, firewalls remain one of the most proven cyber deterrents. Network firewalls continue to serve as a cornerstone for a solid security strategy. However, some financial institutions have learned the hard way that a misconfigured or out-of-date firewall can leave their networks unprotected. For firewalls to be most effective, they must be able to deliver advanced security services to ensure that various threats are unable to disrupt the integrity of a network.

The Missing Link in Traditional Firewall Technology

Today, the industry standard for transmitting secure data over the internet is known as Secure Sockets Layer, or SSL. A more modern version of this SSL implementation is also known as Transport Layer Security, or TLS. For many companies and financial institutions, there has been a push to implement this technology to securely protect online traffic since it establishes an encrypted link between a web server and a browser. This ensures that all data passed between the server and browser remains private.
While SSL/TLS is effective in protecting the privacy of intercepted data that was transmitted between client and server, it also poses a problem for perimeter security. Legacy firewalls are unable to view the SSL traffic and cannot perform a proper analysis to determine if the encrypted traffic is safe or malicious. This increases the risk of a potential attack, because unsuspecting users can download malicious content and packages that bypass the institution’s perimeter defenses. This can lead to a malware infection or other nefarious activity on the network.

Importance of SSL Inspection

View InfographicUpdating Your Firewall is More Important Than Ever View Infographic

One key feature that all community banks and credit unions should have as a part of their firewall security strategy is SSL/TLS Inspection. Firewalls with the ability to scan encrypted SSL/TLS traffic have become increasingly important as malware and other cyber threats continue to grow and change. SSL/TLS inspection allows the firewall to decrypt traffic that is being transmitted to and from websites, email communications, and mobile applications. Once the traffic is decrypted, a proper analysis of the content can be performed. After the analysis is complete, the data is re-encrypted and transmitted to the client.

Without deploying this level of inspection, institutions run the risk of effectively introducing a “blind spot” in their traffic analysis mechanisms. This can cause major problems since, according to Cyren’s security researchers, some form of SSL is now being utilized in 37% of all malware. Researchers also substantiated that every major ransomware family since January 2016 has been distributed at some point via SSL/TLS. In addition, the average volume of encrypted internet traffic is now greater than the average volume of unencrypted internet traffic, making the need for SSL/TLS inspection in firewalls even more significant.

To adequately protect the network, financial institutions must implement a new approach to security that goes beyond traditional perimeter protection to safeguard the entire network. While firewalls are still critical to any security strategy, for them to be truly effective, they must evolve and become more sophisticated. Financial institutions must look for ways to better protect the network and identify other features to defend against attacks, and SSL/TLS inspection plays a key role in developing a stronger security ecosystem.

21 Mar 2019
Safe Systems Launches Customer Referral Program

Safe Systems Launches Customer Referral Program

Safe Systems Launches Customer Referral Program

According to our third annual report, “2019 IT Outlook for Community Banking”, nearly 91% of survey respondents claim to turn to their peer network for information when researching a new solution or vendor.

Download the PDFThe 2019 IT Outlook for Community Banking Get a Copy

These confidants provide valuable first-hand information from trusted individuals who have knowledge of the industry and are experiencing similar situations and issues. So, we wanted to provide an opportunity for our customers to conveniently share our more than 25-year journey serving the community banking industry, unique customer experience, and dedicated strategic advisor service, by simply sending their peers to this new webpage – The Safe Systems Way.

In addition to facilitating the easy exchange of information, we have launched a formal customer referral program that provides existing customers with a simple online process to refer Safe Systems to their peers. Customers will be awarded a small gift thanking them for each peer referral, and new customers who come through the referral program will receive an exclusive welcome gift.

At Safe Systems, we strive to provide a high degree of customer service by paying close attention to our customers’ pain points and keeping their needs a priority. This has enabled us to build strong relationships with clients. These relationships combined with extensive knowledge of community banks and credit unions, enables Safe Systems to be a valued partner and true extension of our financial institution clients. We truly understand the complexity that financial institutions face in managing the constant evolution of technology, compliance, and security. Our team works to streamline IT processes for banks and credit unions and ensure regulatory requirements are met or exceeded.

14 Mar 2019
Are You Using the Right Security Layers

Are You Using the Right Security Layers? What Many Banks and Credit Unions Are Using Today

Are You Using the Right Security Layers

Over the past several years, the industry has been impacted by a marked increase in data breaches, ransomware, card fraud, cybersecurity threats, and other malicious attacks. Additionally, an increase in devices connected to networks has made it critical for financial institutions to strengthen their security strategies and policies to ensure all systems are up to date to effectively combat today’s threats.

While history has shown that well-designed single-focus solutions are useful in stopping specific attacks, the capabilities of advanced attacks are now so broad and sophisticated that a single line of defense inevitably fails—opening the way to costly data breaches and other malicious attacks.

To establish a secure IT network and be better protected in today’s digital world, banks and credit unions need to employ a strategy that places many uniquely tailored layers throughout their networks, from the end user to the internet. By employing multiple controls, security layers ensure that gaps or weaknesses in one control, or layer of controls, are compensated for by others.

According to our third annual report, “2019 IT Outlook for Community Banking,” community banks and credit unions are taking this advice to heart and do, in fact, have various security solutions in place to help protect their networks, including:

Firewalls

Download the PDFThe 2019 IT Outlook for Community Banking Get a Copy

The most widely used solution is the firewall. Firewalls have served as part of a network-perimeter defense for more than three decades. However, over the years, as technology and threats change, firewalls must also evolve to keep pace. To ensure they are up to date and able to combat today’s threats, many are adding key functionality to their firewalls as well. According to survey results, 52% of respondents are adding SSL inspection to enhance their solution; 48% are adding sandboxing, threat intelligence feeds, and built-in network automation.

Anti-Virus Software

Anti-Virus software has been a staple for many organizations since the launch of the internet 25 years ago. It is imperative to have up-to-date anti-virus protection on your systems at all times. Ensuring all subscriptions are current will prevent you from getting viruses such as spyware, malware, rootkits, Trojans, phishing attacks, spam attack and other online cyber-threats. Anti-virus solutions are as important as ever.

Encryption

In addition to the firewall and anti-virus software, many banks and credit unions implement a level of encryption over all data, files and transactions. Encoding sensitive data helps prevent hackers from easily accessing information. This form of protection has grown increasingly popular with 84% of survey respondents claiming to be utilizing this security measure today.

Employee Training

Increasingly, banks and credit unions are recognizing employee training as an important security mechanism with 78% of survey respondents citing it. Employees who are not adequately trained on security protocols, procedures, and current issues can quickly become a top vulnerability and security threat for financial institutions. According to survey results, 100% of respondents claim that their employees have fallen victim to a phishing attack in the last 12 months and have been affected by a malware infection. To best mitigate these threats, training for all employees—from tellers and loan officers to the President and CEO—is critical. Thorough training should now include rigorous testing to ensure employees are able to spot security issues.

Vulnerability Scanning

To quickly identify internal threats, network security solutions must now scan and monitor more than just servers. Vulnerability scanning gives community banks and credit unions greater visibility into the network and identifies potential threats on all workstations and devices connected to the network. Banks and credit unions now understand the importance of scans, and 51% of survey respondents perform these scans several times a year.

Other security solutions highlighted in the report include patch management, intelligence feeds, security event log monitoring, endpoint security management, DNS filtering, anti-ransomware, and honeypots.

While all of these solutions have proven to be effective security layers, there is no single security product that will cover all of an institution’s needs and efficiently combat the variety of breaches and attacks the industry sees today. It is essential to implement a layered security approach and select security defenses that fit closely with your institution’s long-term goals as well as support your IT and compliance strategies.
For more information, download our 2019 IT Outlook for Community Banking report.

07 Mar 2019
Cell Phone Porting - Don’t Fall Victim to Phone Number Fraud

Cell Phone Porting – Don’t Fall Victim to Phone Number Fraud

Cell Phone Porting - Don’t Fall Victim to Phone Number Fraud

Increasingly, consumers are sharing their mobile phone numbers to retrieve and change lost passwords, set up new accounts, verify identity, and even for something as simple as securing a dinner reservation. Mobile phone text-based verification has proven extremely convenient but imagine if someone else had access to all of those text messages delivering secret codes required to verify our identities.

While not new, cell phone porting has recently gained traction as yet another way for scammers to hack into your systems, including bank accounts. The most alarming part of this scam is that it can allow hackers to get past added security measures on personal and financial accounts and logins by intercepting the one-time password that many companies send via text message to the mobile device to perform two-factor authentication.

How Does Porting Work?

Once a scammer has your name and phone number, they will attempt to gather personal information such as address, social security number, date of birth, etc. that can be used to impersonate you. Once obtained, they then contact your mobile provider, claim to be you, report your phone as stolen or lost and then request the number be “ported” with another provider and device. Surprisingly (and unfortunately), mobile carriers often grant this request and forgo formal verification procedures.

All calls and texts are then forwarded to the new device and the original phone – your phone — is shut off. Once in control of the mobile number, thieves can request second factor authentication be sent to the newly activated device, such as a one-time code sent via text message or an automated call that reads the one-time code aloud. This enables them to access accounts that require additional security authorization such as email, financial accounts, medical records, social networks – anything you might need to access with a password!

You may not know you are a victim of porting until your phone has lost service and you no longer can access important accounts since the hackers have changed passwords. A phone might also switch to “Emergency Calls Only” status, which is what happens when a phone number has been transferred to another phone.

Download the PDFThe 2019 IT Outlook for Community Banking Get a Copy

There are several steps you can take to protect yourself from falling victim to porting scams:

Contact your Wireless Provider About Port-out Authorization

Most major wireless providers offer an extra layer of security that customers can request, like a unique PIN or verification code, that only you have. This code or PIN must be provided before any changes can be made to your account.

Use Two Phone Numbers

Have two different phone numbers that you use in different ways. Have one number that you give out freely and another one that you never give out and use only as a backup verification tool. You can do this using a free online service, eliminating the need for an additional costly phone plan. Do not share this number with anyone – if it is shared just once it is considered public information! You can’t trust that the other person’s phone is secure or that they won’t share it.

Utilize Apps for Verification

Whenever there is the option, choose the app-based alternative for authentications. Many companies now support third-party authentication apps which can act as powerful two-factor authentication alternatives that are not nearly as easy for thieves to intercept.

In addition to these precautions, be vigilant about communications you receive and watch for alert messages from financial institutions, and texts in response to two-factor authorization requests, especially if you did not initiate the request. Also, if your phone switches to “Emergency Calls Only” mode, it is a sign the number has been compromised. If you do find yourself a victim of this type of scam, contact your mobile provider and financial institutions immediately.

The rise of porting attacks serves as a warning that we not only need to keep our emails secure, but we also need to keep our phone numbers more secure. To protect yourself, consider alternative forms of authentication other than a text message.

21 Feb 2019
Identifying Top Priorities for 2019 - IT Outlook Survey

3 Top Challenges from the 2019 IT Outlook for Community Banking

Identifying Top Priorities for 2019 - IT Outlook Survey

For the third consecutive year, we surveyed community banks and credit unions to gain a better understanding of their current IT situation, top IT priorities and challenges, security and compliance issues as well as future technology investments on the horizon. Our third annual report, “2019 IT Outlook for Community Banking,” analyzes survey feedback from approximately 164 respondents representing a range of community banks and credit unions across the U.S. with asset sizes from less than $100 million to more than $1 billion.

This report is designed to offer community banks and credit unions with valuable peer data that can provide guidance for key IT, compliance and security decisions in 2019 and beyond. The data reinforces that community financial institutions continue to recognize the importance of using technology in the current banking environment and remain committed to investing in new technologies and services as needs evolve. However, they continue to face certain challenges, often related to technology, heading into 2019.

Here are some key IT challenges and trends from the survey results:

Information Security Continues to be the Top Challenge

According to 43% of survey respondents, information security continues to be a top challenge. Falling victim to security breaches and associated attacks is very costly for community banks and credit unions, both from a financial and reputational standpoint. According to Cybersecurity Ventures, the global cost of cybercrime damages will hit $6 trillion annually by 2021. This includes damage and destruction of data, theft of personal and financial data, and disruption to the normal business operations, among others. In addition, as the number of security threats continues to increase in the financial services industry, regulators are taking a closer look at financial institutions’ policies and procedures to ensure that they can effectively safeguard confidential and non-public information. All of this has led to 57% of respondents planning to strengthen and increase budgets for IT security solutions in 2019.

Personnel Expertise and Resources Becoming a Greater Concern

According to 42% of respondents, having the right personnel resources is now a top challenge for their financial institution. Managing an IT network is a very demanding responsibility. An IT administrator needs to truly understand the increasing complexity of IT operations, continuously changing regulatory requirements, FFIEC compliance guidelines, and evolving security threats. However, many community banks and credit unions are often located in areas that lack the qualified personnel resources to efficiently manage these responsibilities, making it financially challenging for them to employ the seasoned IT technology team required. This trend is encouraging community financial institutions to augment their IT departments with outsourced service providers who are able to help them navigate technology, security, and compliance required today.

Keeping Up With Changing Customer Expectations Continues to be a Challenge

Download the PDFThe 2019 IT Outlook for Community Banking Get a Copy

Approximately 42% of survey respondents claim that keeping up with changing customer expectations is their greatest challenge moving into the New Year. The advancement of technology, online banking services, compliance and regulatory requirements plus the growing demand from customers to have 24/7 access to their financial lives, have made the business of banking more challenging. This challenge has led to many institutions making additional technology investments in customer satisfaction or solutions to better meet market needs. According to 55% of survey respondents, this is the main reason or factor for making technology investments in the coming year. Customer satisfaction has become increasingly important and delivering a great customer experience is what gives banks and credit unions a competitive advantage.

Other areas of survey respondents mentioned as challenges include automating manual processes, managing budget restraints, eliminating redundant technology, remaining compliant with changing regulations, reporting and exam preparation, disaster preparedness, and providing secure mobile technology. This is the first year mobile technology was mentioned, but it is no surprise, as more and more consumers are turning to their mobile phones for basic banking tasks, such as depositing checks, checking their balances, and transferring money between accounts.

To gain more insights into the key challenges, goals and opportunities facing banks and credit unions today, please download the full report here.

19 Dec 2018
Safe Systems Launches Banking Bits and Bytes with Brendan Educational Video Series

Safe Systems Launches “Banking Bits and Bytes with Brendan” Educational Video Series

Safe Systems Launches Banking Bits and Bytes with Brendan Educational Video Series

Safe Systems launched a new educational video series, “Banking Bits and Bytes with Brendan,” to help educate and inform customers and the financial services industry on trends and issues the industry is dealing with on a day-to-day basis. Banking Bits and Bytes with Brendan will showcase our Chief Technology Office, Brendan McGowan, who is an expert in all things related to banking technology.

Each video is a small bite of information (approximately 2-3 minutes in duration) that teaches viewers complex technology, compliance, and security topics. The videos will be sorted by topic and can be watched at the viewer’s own pace and convenience.

This video series is a way for us to help educate our customers by leveraging the expertise gained from 25 years serving community financial institutions. As the industry continues to change and evolve at a rapid pace, our knowledgeable staff serves as a valuable asset to guide our customers and help them ensure compliance, streamline processes and provide superior service in their communities. Brendan’s expertise, knowledge, and insights in banking technology will ensure each video is a valuable resource for the industry.

Here at Safe Systems, Brendan oversees the development of strategic technology solutions that support key banking initiatives for community banks and credit unions and enhance their ability to manage IT in an effective and compliant manner. In 2016, he was named to Georgia Southern University’s 2016 40 Under 40 List, which highlights professionals who represent the best young leaders under the age of 40.

The first Banking Bits and Bytes with Brendan video series focuses on Managed Cloud Services, a broad topic where Brendan addresses common questions, dispels myths, and offers advice on the best way to think about and implement a cloud strategy. Each video is hosted on YouTube as well as this website.

The first two video lessons in the Managed Cloud Services series are now live on our website. View the video below or visit the Banking Bits and Bytes with Brendan page to watch other videos.

 

05 Dec 2018
Watch More Kids on Banking

More Kids on Banking

This year marks our 25th Anniversary and to honor the occasion, we developed Kids on Banking, which is designed to let us reminisce about our own childhood memories of going to the bank with our parents. While the banking industry has changed quite a bit since we were kids, and most trips to the bank and ATM have been replaced with the use of online banking and the simple use of an app, we were left wondering what it was like to see the banking environment through the eyes of kids today.

So, we asked a few, ranging in age from 5-11 years old for their unscripted opinions on banking and what exactly they think happens in a bank. They were very creative and had some insightful opinions that provided us with enough content to develop not one — but two — videos!

One of the questions we asked was, “How much money is inside the safe at a bank?” Apparently, banks today house a “thousand trillion billion dollars,” or “$399,” or maybe just “$100 or $50.” When it comes to saving money, we learned that “mostly money is saved for college or toys, but mostly toys!”

Watch More Kids on Banking

According to the kids, ATMs are for giving out money. All you have to do is put in a card, type a long random number and then “about a trillion dollars will start coming out.” If only this were true.

According to these kids, the president of the bank is responsible for signing papers and writing a lot of words, controlling the money and taxes, keeping the money safe, telling everyone when to “shut the door in case of a robber” and “people even come to the president to deliver grilled cheese.”

The pneumatic air tube is a favorite piece of banking equipment. It is “the thing that goes Fwsshhh straight up to the man upstairs!” It also is the thing that delivers lollypops and bills.

The kids really got us laughing and reminiscing about how we thought about banking when we were younger.

Check out our second video, More Kids on Banking, for a good laugh and help us celebrate a quarter century of serving community banks and credit unions.

For the last 25 years Safe Systems has worked with more than 600 financial institutions and managed more than 20,000 network devices. Safe Systems has found great success in helping community financial institutions significantly decrease costs, increase IT performance, enhance cybersecurity processes and improve their compliance postures.

28 Nov 2018
What Community Banks and Credit Unions Should Budget for in 2019

What Community Banks and Credit Unions Should Budget for in 2019

What Community Banks and Credit Unions Should Budget for in 2019

As 2018 winds down, banks and credit unions are thinking ahead to 2019. They are determining the new solutions, products, and enhancements needed to meet their strategic plans in 2019 and beyond. In addition, they are evaluating what needs to be updated or upgraded and the processes that can be improved upon.

There are three key areas banks and credit unions should focus on during budgeting season – technology, security and compliance. While lines that separate technology, security, and compliance are blurry at best, 2019 budgeting items for operations fall largely into these three buckets.

Compliance

Complimentary White PaperManaging Risk with Truly Secure Vendor Management Program Get a Copy

While the focus of many examiners has shifted back to financial aspects of institutions, the top three findings our customers report relate to:

  1. Vendor Management – Typically the current vendor management solution (if it exists at all) is deemed inadequate or insufficient. Often the solution doesn’t cover all vendors or provide a way to adequately assess these vendors.
  2. Business Continuity Planning (BCP) – In the mid to late 2000’s many banks and credit unions updated their Business Continuity Plan. However, for many institutions, these plans have remained relatively unchanged for a decade now. Technology and business processes on the other hand, have changed rapidly over the last decade. The Federal Financial Institutions Examination Council (FFIEC) has also updated their guidance to address the current challenges of BCP. If the institution’s plan has not been thoroughly updated in a while, the institution may be at risk of a finding on a future exam.
  3. With both of these findings there may be an additional finding of inadequate management or board oversight. Often these findings happen on the same exam and are followed with a concern with oversight. Many of the calls Safe Systems gets after an exam relate to these issues.

Avoid finding yourself under a Memorandum of Understanding or a Matters Require Attention by budgeting to ensure your compliance processes are up to date.

Vendor Management solutions can run from $2,500 to more than $6,000 per year. Business Continuity Plans can range more significantly from a couple of thousand to more than seven thousand dollars per year. Do some research and find some solutions that would meet your institution’s needs and identify their year one cost and annual cost thereafter.

Security

With attacks on the rise and businesses continually falling victim to cybercrime, security needs to be an institution’s priority. There are innovative solutions coming to market every day to help address security risks. These solutions can help mitigate the risks that your institution faces, but they can also cause confusion on where you should focus your attention. For the next several years, it is in the institution’s best interest to continually focus on the impending security landscape and verify that your budget reflects your strategy.

One place to start is to review your current solutions. Verify that your current investments are still applicable for your ever-changing environment. Upon investigation, you might find features that are available as an add-on to your current solution to help mitigate risk. You may also find holes in your current strategy that may need to be rectified.

Download Free PDFMoving Beyond Traditional Firewall Protection to Develop an Integrated  Security Ecosystem Get a Copy

As of October 2018, 90% of web traffic accessed through Chrome, the most popular web browser, was encrypted. These numbers have been increasing rapidly over the last few years. Many firewalls can only inspect unencrypted web traffic. This was a small risk when encrypted websites were less common. With the sudden rise of encrypted web traffic, many firewalls are NOT equipped to scan this data. It is possible to scan encrypted web traffic, but for many institutions this will require changes and additional investment. The risk of not scanning this encrypted web traffic significantly increases the chances of your institution becoming a victim of a malware outbreak or a data breach. Examiners in some regions have started to pick up on this security hole, and they are encouraging institutions to address this issue.

Another area of concern for institutions is new and emerging threats. Attackers are continually innovating and improving their attack methods, and basic security solutions may not be enough to detect and prevent these advanced attacks. Newer solutions specifically designed to analyze the growing attack techniques have been developed. The use of sandbox technology and machine learning are being tasked to make it more difficult for attackers to be successful. In many instances, these solutions can be imbedded within your perimeter firewall solution. These types of defenses can vastly increase the effectiveness of your security landscape.

Even though your firewall is viewed as a technical security device, it is also the device that grants users access to the internet. The internet has quickly become a business-critical service. When strategizing about upcoming budget aspects, the institution should consider the business risks involved when an internet device causes downtime. There are ways to mitigate internet downtime using high availability solutions. High availability involves having two firewall devices configured in a cluster. If one device fails, the second device seamlessly takes over responsibility so that downtime is avoided.

Additional devices and licensing will also affect the budget. These changes can be small or very large depending on the scope and goals of your strategy. Going forward, have a plan and strategy to deal with the ever-changing security landscape.

Technology

The biggest move in technology over the last half decade has been the move to the cloud. This will continue to be the case in 2019. The cloud offers benefits such as low maintenance, high availability and rapid disaster recovery that can’t be easily or affordably addressed with in-house solutions. The future likely means more servers and business functions moving to the cloud. This likely is where technology spend will move over the next 5 years. Another term for this is Infrastructure as a Service (IaaS). There are three likely situations that will lead to this move and determine how your institution makes the transition.

  1. Your institution desperately needs high availability and/or disaster recovery and is willing to incur the cost of moving from a hardware-based solution to a cloud-based solution.
  2. Your institution’s hardware infrastructure is reaching the end of its life and it is time to purchase all new hardware or move in a new direction. This can be a good time to evaluate your current setup and what is best for the future.
  3. Your institution has some regular hardware turnover scheduled for next year and wants to evaluate slowly moving to the cloud. Instead of buying a new server, it may be time to evaluate what the future of your infrastructure will look like and if the cloud is a long-term solution.

Free eBookEverything You Need to Know About the Cloud Get a Copy

Some vendors pitch the move to IaaS as a cost savings move. There are cost savings involved. No more hardware to buy and maintain; no more electricity to run the devices; no more cooling to keep hardware cool; and the ability to achieve high availability is easier and more efficient. However, the move to IaaS is typically not a cost savings, but a feature advantage. Most institutions will be lucky if they break even with moving to an IaaS model, but they will gain great redundancy, uptime, reliability, and disaster recovery capabilities.

Generic cost estimates are impossible due to the fact that everyone has different infrastructure, needs, wants, etc. But if flexibility and added freedom is something your institution wants or needs, start investigating what IaaS might cost for your institution. This technology has matured greatly over the last few years and continues to evolve, making it viable now and likely the wave of the future.

In moving into 2019, focus on two things. Are my current processes and products adequate? Not have they passed exams this year, but are they mitigating the current risks to the institution? Too often measuring by exams leaves the institution open to a false sense of security and potential exam issues in the future. For compliance, ensure the institution’s processes are thorough, up to date, and adequate to meet the needs of the institution. For technology, consider what the long-term goals of the institution are and start working on a plan to implement these changes. Security is going to need new investments each year for the foreseeable future. The historical solutions for security problems have been successful which has forced criminals to find ways around them. It’s time to realize that the threats have changed, and it is time to address the new threat landscape.

26 Nov 2018
Identifying Top Priorities for 2019 - IT Outlook Survey

Identifying Top Priorities for 2019: Participate In Safe Systems’ Annual IT Outlook Survey for Banks and Credit Unions

Identifying Top Priorities for 2019 - IT Outlook SurveyWe want to hear from you for our annual industry report examining how community banks and credit unions plan to meet their IT, compliance and security needs in 2019.

To better understand banks’ and credit unions’ current IT situation, we have been surveying community banks and credit unions for the last 3 years. Our previous reports highlighted top IT priorities, IT challenges, security concerns and compliance issues, as well as what technologies and investments banks and credit unions plan to leverage in the coming year. We share the information gathered by publishing a white paper; last year’s was “2018 IT Outlook for Community Banks and Credit Unions.” The report is designed to provide community banks and credit unions with valuable peer data that can provide guidance for key IT, compliance and security decisions.

Looking back on 2018, some of the trends we saw included:

  1. Cybersecurity and Information Security Continue to Challenge Banks and Credit Unions
  2. Cybersecurity was the greatest security challenge banks and credit unions foresaw for the year ahead and information security was also a top challenge.

  3. Compliance Continues to be a Challenge
  4. Managing strict, ever-changing government regulations and guidelines is the greatest IT compliance challenge, which has led to the increasing trend of outsourcing compliance needs.

  5. Outsourcing Remains Beneficial and Important for Smaller Institutions
  6. With limited internal resources and expertise, community financial institutions continue to augment their IT departments with outsourced service providers who are able to help them navigate the IT changes and meet examiner expectations.

  7. Technology Investment Continues
  8. Community financial institutions continue to recognize the need for investing in new technologies and services.

  9. Both Community Banks and Credit Unions Have the Same Pain Points
  10. The results indicated that both credit unions and community banks experience many of the same issues related to compliance, IT challenges and staffing constraints.

Other areas the survey focuses on include IT management issues, audit and exam preparation, additional technology challenges, vendor management, business continuity planning, reasons for change and implementation of new services and cloud usage.

We hope you will participate in the 2019 IT Outlook by taking our survey. By completing the survey, you will gain access to this comprehensive year-end report. Your anonymous responses will be aggregated to provide detailed graphs, charts and plenty of insight amongst your peers in the community financial industry.

Begin Survey
31 Oct 2018
NetConnect 2018

Preparing for the Future: The Value of Safe Systems’ NetConnect Customer User Conference

NetConnect 2018

Safe Systems hosted its 2018 NetConnect Customer User Conference October 2-4 in St. Simons Island, Georgia. The three-day conference was designed to bring customers, employees, and vendor partners together to exchange ideas and learn about key technology, compliance, and security best practices and solutions. Banks and credit unions from around the country attended to listen to inspiring keynote speakers and attend sessions designed to educate, motivate, and drive success. The event also included a tradeshow made up of a dozen vendor partners offering additional products and services to Safe Systems’ customers. One of the most critical meetings held during the event is the customer advisory meeting, where the Safe Systems management and product development teams gather feedback from a subset of customers on existing and future products and services.

A key goal of this year’s conference was to provide our banking and credit union customers with the necessary tools and guidance to develop comprehensive cybersecurity programs; meet stringent regulatory demands; and build successful institutions. The event began with an entire day of pre-conference training focused on information security threats, including cyber threats. As these threats continue to evolve, the need for effective IT management and efficient risk management increases. This professional development opportunity helped cultivate the skills needed to effectively create and maintain a comprehensive information security program; communicate effectively with the board; and improve vendor management processes.

NetConnect 2018

This year’s keynote speaker was Bill Treasurer, CEO of Giant Leap Consulting, and author of numerous books about courageous leadership. His speech, “Leading with Courage”, focused on practical strategies for building courageous workers that seek out leadership opportunities, how to step up to challenges, offer innovative ideas, passionately embrace change, and become more productive.

In addition, one of the guest speakers, Erich Kron, a security awareness advocate, led a session on “Hacking the Users: Developing the Human Sensor and Firewall,” which focused on how banks and credit unions can turn people into effective attack sensors and human firewalls. He discussed the real goal of security awareness training, the politics of phishing your users, and how to deal with repeat offenders.

NetConnect provided an atmosphere where customers could exchange ideas and learn more about the latest technologies and trends in the financial services industry. Safe Systems’ product managers led educational sessions, focused on the company’s solutions and services customers use every day, to provide expert training and share tips and tricks to help streamline processes. Safe Systems’ compliance and security teams also led informative sessions and interactive workshops on relevant compliance topics and trends, including how to manage or push back on examiners; steps to take after completing the cybersecurity assessment tool (CAT); and how to respond to and recover from a cyberattack.

NetConnect 2018

During the conference, Safe System’s employees and customers celebrated the company’s 25th anniversary. For more than two decades, Safe Systems has worked with more than 600 financial institutions and managed more than 20,000 network devices. Safe Systems has found great success in helping community financial institutions significantly decrease costs, increase IT performance, enhance cybersecurity processes and improve their compliance postures. With our expertise and experience in the industry, we have a solid understanding of what is coming down the pipeline, how to anticipate trends and have gained a unique perspective into what our customers need. Our talented employees work hard to build strong relationships with our clients and pride themselves on the quality customer service they provide.

Safe Systems strives for the NetConnect event to be an engaging and educational experience where bankers and credit union professionals can gain valuable knowledge on technology, compliance, and security. The company values the customer partnership and the opportunity to seek their direct feedback on current and future services which will ensure success for both parties. Safe Systems continues to provide products and services to help community banks and credit unions strengthen their institutions and build success. Our solutions, combined with our customer service and advisory, arm our customers with the resources they need to succeed in today’s financial environment and beyond.

24 Oct 2018
One Key Feature All Banks and Credit Unions Need in their Firewall Cyber Threat Intelligence Feeds

One Key Feature All Banks and Credit Unions Need in Their Firewall – Cyber Threat Intelligence Feeds

One Key Feature All Banks and Credit Unions Need in their Firewall Cyber Threat Intelligence Feeds

Banks and credit unions have been using firewalls as part of their network-perimeter defense to make security decisions efficiently and protect networks from outside attacks for more than three decades. However, over the years, as technology and threats change, firewalls must also evolve.

In today’s security landscape, the biggest threats are often unknown until it is too late. One IT administrator cannot keep track of all malicious threats and activity and thoroughly understand how they will impact a network or system. This process takes too much time, and the volume of threats to manage is too large, as there are numerous new threats created daily. In fact, according to Kaspersky Lab’s Number of the Year for 2017, there were at least 360,000 new malicious files detected every day in 2017. This is an 11.5% increase from the previous year.

Discover, Analyze, and Understand

An updated approach that includes an automated cyber threat intelligence feed to uncover threats and new risks is required for firewalls to be effective in today’s environment. According to the Federal Financial Institution Examination Council’s (FFIEC) Cybersecurity Assessment Tool (CAT), it is important for financial institutions to have processes in place to effectively discover, analyze, and understand cyber threats. With a cyber threat intelligence feed, banks and credit unions can keep track of emerging security threats through information sharing or crowdsourcing security feeds that source information on current and emerging security threats. Consuming this data helps financial institutions improve security processes to detect, prevent, and respond to cyber threats quickly and efficiently.

Download Free PDFMoving Beyond Traditional Firewall Protection to Develop an Integrated  Security Ecosystem Get a Copy

When a cyber threat intelligence feed is integrated directly into the firewall platform, it eliminates the need for one or two individuals to correlate and filter the overwhelming volume of alerts from a variety of standalone systems and manually update rulesets. With cyber threat intelligence, financial institutions have thousands of people sourcing threat information. This ensures that malicious threats and activity are caught in a time-efficient manner, and IT personnel are able to better understand the various threats to their network. Implementing bank-specific feeds, such as those provided by the Financial Services Information Sharing and Analysis Center (FS-ISAC) will provide industry-specific threat information that enables the IT team to analyze relevant threats and the impact they may have on the institution.

How to Develop an Integrated Security Ecosystem

It is imperative that banks and credit unions are keeping their firewall security top of mind and are proactively monitoring the firewall solution to ensure it is able to effectively combat current malicious activity. Ensuring your firewall is up to date and using the latest technology solutions enables your institution to discover and address vulnerabilities before breaches occur and regulators identify weaknesses. With the increase in breaches and malicious activities, a cyber threat intelligence feed is necessary to stay up to date on the latest threats and vulnerabilities and ensure your financial institution is adequately protected.

For more information on key features of next-generation firewalls, download our white paper, Moving Beyond Traditional Firewall Protection to Develop an Integrated Security Ecosystem.

17 Oct 2018
A New Approach to Firewalls How to Maximize Security and Flexibility for Banks and Credit Unions

A New Approach to Firewalls: How to Maximize Security and Flexibility for Banks and Credit Unions

A New Approach to Firewalls How to Maximize Security and Flexibility for Banks and Credit Unions

Technology solutions and applications have seen significant changes and advancements in the last 20 years. The traditional firewall, which is still one of the most basic cyber deterrents available to banks and credit unions, remains a foundation for all security strategies. Firewalls act as an intrusion prevention system and gatekeeper for a network by examining all inbound and outbound traffic to determine whether it meets the designated criteria to continue through or if it is malicious.

Over the years, there have been various iterations of firewalls as technology evolves. However, in order for firewalls to continue to be effective, they must evolve to go beyond traditional perimeter protection to safeguarding the entire network. This requires systems to be more intelligent, scalable and customizable, and to better utilize automation to be more effective. To accomplish this, today’s firewalls should be built using an open architecture. By employing the open architecture philosophy, firewall and perimeter security solutions can be seamlessly integrated with other third-party solutions to increase visibility into all activity and leverage network automation.

Download Free PDFMoving Beyond Traditional Firewall Protection to Develop an Integrated  Security Ecosystem Get a Copy

Some of the advantages of firewalls built on open architecture include:

  • Increased flexibility and agility;
  • Scalability;
  • Ability to support and implement future changes, upgrades and additions;
  • Can be easily modified and adapted for customized business requirements;
  • Easy integration with other systems and platforms;
  • Ability to create a unified technology ecosystem; and
  • Seamless data exchange between platforms and solutions.

With more flexibility, your institution can maximize security and implement firewall protection that fits its unique security and compliance goals. It’s important to note that firewalls are simply one piece of the security ecosystem. There needs to be an integrated security approach between all security layers to adequately protect the entire network and establish an effective security foundation, which requires the use of flexible architecture and technology solutions. Integration and automation of all security aspects enable the various layers to communicate, providing a secure IT environment and a better chance of resisting attack. Proactively protecting customer data will always be more cost effective than falling victim to malicious activity.

For more information, download our white paper, Moving beyond Traditional Firewall Protection to Develop an Integrated Security Ecosystem.

11 Jul 2018
Building and Sustaining an Effective Security Awareness Program

Building and Sustaining an Effective Security Awareness Program

Building and Sustaining an Effective Security Awareness Program

Financial institutions often view staff as their most valuable asset, but employees can also be a top vulnerability, especially if they are unfamiliar with security protocols. With the increasing rate of cyber-attacks in the financial industry, community banks and credit unions must instill the concept that security responsibilities belong to everyone in the organization and ensure all employees understand the role they play in security protection and awareness.

The truth is many financial institutions are not adequately training staff to be successful in spotting and mitigating security-related issues. To protect financial data, community banks and credit unions must adopt a solid security awareness training program.

Training Best Practices

Ransomware and the Evolving Security Landscape Free White PaperWhite Paper Download

A few best practices for establishing a strong security awareness program include:

  • Conduct security awareness training at least once a year or as business conditions evolve. At a minimum, the training materials should also be updated annually to provide fresh content and account for changes in the security landscape.
  • Document employee participation and completion of the program and provide proof for auditors and examiners. Financial institutions should also obtain confirmation of their employees’ understanding in the form of a quiz, a group discussion or some type of interactive activity.
  • Use current news events or recent security incidents as examples to help employees analyze a real-life scenario. This is a great opportunity for learning as they will often show the direct results of a failure to follow policies and procedures.
  • Incorporate social engineering testing into the program to evaluate how employees will actually react in a threat situation. Employees who get tricked by social engineering exercises may need supplemental training.

The training should include instructions on:

  • Proper email use;
  • Proper PC and Internet use;
  • Password policy and best practices;
  • Business continuity procedures and responsibilities;
  • Incident Response procedures and responsibilities, which usually means “if you see something, then let
  • the right person or group know about it ASAP”;
  • Institution policies and procedures on cybersecurity; and
  • Expected end-user behavior.

In addition to adequately training employees, financial institutions should have security awareness materials and information available to customers and members that enable them to spot security issues and adequately protect themselves as well.

It is not enough for an organization to rely solely on the IT or security department to safeguard sensitive information. When everyone is held accountable for the security of financial data, the financial institution is better equipped to handle the unexpected and protect the organization from harm. Establishing a solid security awareness training program for all employees — from tellers and loan officers to the president and CEO — is essential.

09 Jul 2018
Kids on Banking Blog Featured Image Behind the Scenes

Behind the Scenes: Kids on Banking

Kids on Banking, The Ocean

There were many activities leading up to March 17, 2018, including pre-production meetings, casting calls and location scouts. The whole idea started a full year earlier, when the Safe Systems’ marketing team attentively listened to two very famous speakers, Morgan Spurlock (documentary filmmaker) and Seth Godin (author) encourage the audience to create content that was not about their own products or even their own company. As it so happened, Safe Systems was approaching the milestone achievement of 25 years in business, so this was the catalyst to build a business case and move forward with the experts’ advice.

The production crew came from as far as Akron, Ohio and assembled at the Greenville Center for Creative Arts in Greenville, SC at 6:30 am. The day was carefully orchestrated with mothers, fathers and kids arriving every hour. While in the waiting room the kids were drawing pictures about banking topics to get them in the right mindset. After going through hair and makeup they were finally brought in for their on-camera interviews. Of course, the whole project was a gamble as it was totally unscripted. We really did not know if the kids would say anything funny at all. As it turned out, we were laughing the entire day and are so excited about the finished product. The now infamous Kids on Banking video has been viewed and shared more than 26,994 times so far across various platforms.

 

Here’s a peek behind the scenes!

 

Behinds the Scenes, Kids on Banking

Behinds the Scenes, Kids on Banking

 

How would they spend $50?

You may recall we asked the kids on camera if they had $50 how they would spend it. At the end of each interview, each child was surprised with a Safe Systems wallet and $50 bill. So, we thought it would be fun to find out how the kids actually spent the money. (Did they really buy a water park and put it in their backyard?) Well, no, but there were several nice stories sent in to us that we want to share.

Most kids saved a portion of their earnings and then made some strategic purchases with the “disposable income.” Max and Zoe are siblings…and as they stated in the video, purchased Lego® sets. Cohen bought new Pokémon© cards and Sarah Spratlin (her ambition was to buy a private jet and fill it full of puppies) bought a book about the history of The Avengers for her 11 year old brother as a birthday gift.

Chloe loves unicorns! Her shopping trip resulted in the acquisition of 2 new stuffed unicorns, 1 unicorn pen, and a toy for her hamster.

 

Chloe, Kids on Banking

 

Hudson and Caleb are brothers. As you may recall they both wanted to purchase animals (maybe even all the animals in the world). Well…they did buy a new snake (and a car racing kit) but also divided up their earnings to save for the future and give to others in need.

 

Caleb and Hudson, Kids on Banking

 

We have enough footage from that day to create another video. Watch our website, social media pages, and your inbox for the upcoming release of Kids on Banking 2 coming to YouTube this fall. In the meantime, we highly recommend you watch (and share often) the first video so you won’t be lost in the upcoming sequel.

#kidsonbanking #safesystems25

Browse Our Services

06 Jun 2018
How 4 Security Truths Can Improve Your Security Program

How 4 Security Truths Can Improve Your Institution’s Security Program

How 4 Security Truths Can Improve Your Security Program

Security has become increasingly complex. In addition to the ordinary computer, today’s world is full of tiny computers or smart devices that have complete, functional operating systems and are connected to the internet. These Internet of Things (IoT) devices include our phones, refrigerators, thermostats, TVs, light bulbs, and even cars. While this level of connectivity provides the benefit of greater convenience in our daily lives, it has also increased the number of ways we can be compromised by attackers.

“The denial-of-service attacks that forced popular websites like Reddit and Twitter off the internet last October were enabled by vulnerabilities in devices like webcams and digital video recorders. In August, two security researchers demonstrated a ransomware attack on a smart thermostat,” said Bruce Schneier.

As institutions continue to connect more devices to the internet, the number of potential security weaknesses on their network will increase. So how can banks and credit unions use this knowledge to improve their security programs?

According to Schneier, an internationally renowned security technologist and author, there are four truths related to the current world of computer security:

Ransomware and the Evolving Security Landscape Free White PaperWhite Paper Download

  1. “Attack is Easier Than Defense”
  2. According to Schneier, “Computer-security experts like to speak about the attack surface of a system: all the possible points an attacker might target and that must be secured. A complex system means a large attack surface. The defender has to secure the entire attack surface.”

    Attackers work to find ways to use software and solutions in malicious ways that developers never intended. They can find the smallest security flaw or vulnerability in any system and use that to their advantage. This means financial institutions have to plug and patch each and every hole and vulnerability in all systems in order to be secure, whereas an attacker only has to find a single vulnerability in a device to be successful.

  3. “There are New Vulnerabilities in the Interconnections”
  4. “The more we network things together, the more vulnerabilities on one thing will affect other things,” said Schneier. For example, attackers can penetrate a network through a DVR system, bypassing the more robust level of security of a computer. The hard truth is that the more devices you connect to your environment, the more attack surface you have due to the growing number of vulnerabilities.

  5. “The Internet Empowers Attackers”
  6. “One of the most powerful properties of the internet is that it allows things to scale. This is true for our ability to access data or control systems or do any of the cool things we use the internet for, but it's also true for attacks,” according to Schneier. The internet is a powerful tool that improves efficiency for everyone, including attackers, which is why they use it to scale an attack. An attacker can connect to a network through any number of different connected devices, some as benign as a thermostat, refrigerator or light bulb. Attackers often function as a part of a community, readily sharing knowledge and experience with each other. It’s no surprise that the source code for the Mirai botnet, which was able to infect IoT devices such as DVRs, home routers, printers and IP cameras, is now available on the internet for anyone to use.

  7. “The Economics Don’t Trickle Down”
  8. “Our computers and smartphones are as secure as they are because companies like Microsoft, Apple, and Google spend a lot of time testing their code before it's released, and quickly patch vulnerabilities when they're discovered,” said Schneier. Whereas vendors of DVR’s, IP cameras, printers, and consumer devices do not allocate enough resources and money to effectively secure their devices. Additionally, these devices typically have less expensive and less secure components, as well as low-end operating systems with no focus on security or patching, all of which make it is easier for attackers to use them to penetrate a network. Financial institutions must keep this in mind when adding new devices to their environments and should implement additional security layers to guard against attacks.

Improving Your Security Program

The first step to having a truly secure network is to be aware of all devices that are connected to your network. A solid asset management program enables financial institutions to know what systems they have in place, what devices they have, where they are located, and what is connected. When connecting a new device to the network, make sure passwords are secure, the device is operating with up-to-date software, and it is protected by the security layers in place.

In addition, financial institutions should have controls in place to continually scan for vulnerabilities. Firewalls and anti-malware software alone are no longer enough to protect against cybercrime. Additional security layers enable financial institutions to identify when an intruder is present, identify curious internal employees, identify rogue internal employees, and uncover suspicious activity before any damage is done. Combined with Safe Systems’ V-Scan, a powerful network scanning tool that scans the entire network for vulnerabilities and produces an exhaustive list of all vulnerabilities that exist on each device, financial institutions can have greater visibility into their networks, giving them the confidence their organization is truly secure.

43% of cyber attacks target small community businesses
smallbiztrends.com

4x

Financial institutions are 4 times more likely to be attacked than other industries
Websense Security Labs Report (now Forcepoint)

47% of the time, companies are unaware that they've been breached until a 3rd party tells them
Mandiant M-Trend Report

See More Stats
27 Apr 2018
2018 04 27 Former Employee at the Center of SunTrust Data Breach

Now-Former Employee at the Center of SunTrust Data Breach

Former Employee at the Center of SunTrust Data Breach

Atlanta-based regional bank SunTrust issued a formal statement on Friday, April 20th notifying 1.5 Million customers that their personal data may have been compromised in a data breach orchestrated by a now-former employee.

The announcement came during an earnings call when CEO William Rogers said the employee had worked with an outside third party to steal client contact lists. The data included customer names, addresses, phone numbers and account balances. The data did not include social security numbers, account numbers, user IDs, passwords or associated driver’s license information.

Initially, the bank became aware of an attempted data breach by the employee in late February when the employee attempted to download client information. This triggered an internal investigation, which eventually lead to last week’s public announcement. They believe the employee may have printed the information with the intention of sharing it outside the bank.

At this time, SunTrust is working with law enforcement and is declining to provide any additional detail or make any further comments about the ongoing investigation. The bank has begun to notify individual customers whose data may have been stolen; as well as, offering free identity protection service to all of their customers.

Mr. Rogers said in a statement, “Ensuring personal information security is fundamental to our purpose as a company of advancing financial well-being. We apologize to clients who may have been affected by this.”

If you are a SunTrust banking customer, SunTrust if offering Experian’s IDnotify service free of charge. Visit https://www.suntrust.com/identity-protection to sign up.

Cyber Crime Terms Every Financial Institution Should Know

Defending yourself and your bank against cybercrime requires a mutli-layered, proactive approach. Threats come in many forms and with many malicious intentions. Safe Systems provides community banks and credit unions with innovative security solutions and tactics to help you stay a step ahead of cybercriminals.

White Paper Download

Strengthen Your Strategy: Why a Layered Defense is the Best Choice for Your Bank’s IT Security Program

Learn why a single layer of security, such as antivirus, is no longer enough in the current risk environment.
Free White Paper

29 Mar 2018
City of Atlanta Falls Victim to Ransomware: How Financial Institutions Can Guard Against “SamSam” Ransomware Attacks

City of Atlanta Falls Victim to Ransomware: How Financial Institutions Can Guard Against “SamSam” Ransomware Attacks

City of Atlanta Falls Victim to Ransomware: How Financial Institutions Can Guard Against “SamSam” Ransomware Attacks

Ransomware attacks not just targeting financial institutions and Fortune 500 businesses anymore. The city of Atlanta now finds itself dealing with a ransomware attack as it announced a ransomware attack last week. On Thursday, March 22 the city received a written ransom demand in bitcoin for $51,000 to unlock the city’s entire system. At the date of this posting, certain systems are still inaccessible (including customer-facing applications like bill pay systems and court-related applications). Fortunately, the attack did not affect police and fire emergency response systems or water supply safety.

Due to the nature of the attack, experts believe it to be a “SamSam” variant of ransomware, initiated by a group that began targeting small and large businesses, healthcare organizations, governments and educational institutions in late 2015. The ransom prices set by this group tend to fluctuate, but they remain generally “affordable,” which is why many victims have simply chosen to pay the ransom. To date, the group has made nearly $850,000 USD through ransomware payments.

To execute an attack, the hacker group installs the SamSam ransomware on the endpoints of networks compromised, often via unsecured connections. The hackers first look for unsecured remote desktop (RD) servers, launch attacks that compromise the server, and then use various tools to escalate access inside the organization’s network. Once they have gained access to as many endpoints as possible, the group installs the ransomware and starts the extortion process, and hope the victims do not have offline backups.

To resolve the security issue and determine what information has been compromised, the city of Atlanta launched an official investigation with the FBI, U.S. Department of Homeland Security, Cisco cybersecurity officials and Microsoft®.

What to Do if You’ve Been Targeted

In addition to contacting government authorities, organizations that find themselves threatened by SamSam ransomware should:

  1. Unplug or disconnect all devices that you know are compromised from the network;
  2. Determine if additional or unknown devices are infected. One way to accomplish this is to verify that machines are up to date on their patches;
  3. Depending on how serious the attack, disconnect the entire network from the Internet all together;
  4. Do not pay the ransom. Doing so helps the fraudulent industry grow. If the attackers do not receive payments, the industry will burn out. In addition, there is no guarantee the attacker will release the data or provide a decryption key and once an organization has paid, they become targets time and time again; and
  5. Verify previous backups for recovery.

How to Prevent an Attack

Successful ransomware attacks primarily reveal the lack of adequate endpoint protection, which can be defended against. Some common methods to prevent attacks include:

  1. Deploy and enable an endpoint protection system;
  2. Utilize vulnerability and patch management systems to patch internet-facing applications;
  3. Remove administrator rights from end-users;
  4. Use application control whenever possible to implement a default-deny execution policy;
  5. Implement an enterprise endpoint backup plan, and ensure monitoring of backups and testing of restore capabilities regularly;
  6. Upgrade secure email and secure web gateways or firewalls to filter suspicious email, executable objects and URL/IP addresses;
  7. Install an anti-ransomware solution on your network to stop ransomware; and
  8. Build regular testing of incident response scenarios into the ransomware response plan.

To adequately protect against ransomware, financial institutions should employ a strategy that places many uniquely tailored layers throughout their networks, from the end-user to the Internet to establish a secure IT environment. By employing multiple controls, security layers ensure that gaps or weaknesses in one control, or layer of controls, are compensated for by others. Adding preventive, detective and responsive layers to IT security strategy will help strengthen an institution’s approach and build an effective security foundation. Proactively protecting data will always be more cost effective than falling victim to malicious activity.

For more information, download our complimentary white paper, “Ransomware and the Evolving Security Landscape of Today’s Financial Institution.”

White Paper Download
Read the Guide

07 Mar 2018
Three Reasons Why Cybercriminals Attack

Three Reasons Why Cybercriminals Attack Financial Institutions

Three Reasons Why Cybercriminals Attack

Cybercrime and threats continue to be at an all-time high. An attack on a financial institution resulting in the loss of data can have a devastating effect on the organization’s revenue and reputation. In addition, the amount of time and money needed to resolve these attacks can be significant.

While we hear about cybercriminals and the effects of cybercrime, we’re left wondering, why do these criminals attack? In years past people would say cybercriminals attacked for the fun of it. However, now people turn to hacking for a variety of financial, political, and ideological reasons.

Three of the top reasons cybercriminals attack include:

Bragging Rights or Power

Some attackers, be it individuals or members of a larger group, will target large, well known organizations with the hope that the resulting recognition or publicity will give them bragging rights within the hacker community. This was best illustrated by attacks perpetrated by a teenager named Michael Calce (aka MafiaBoy) in early 2000. These attacks brought down large websites such as Yahoo, eBay, and Dell. Calce was later arrested after bragging about his attacks on the internet via IRC.

Political or Personal Agendas

Some attackers target particular companies, websites or governments as a way of drawing attention to their own political beliefs or personal grudges. In many cases, the attackers are disgruntled employees (or former employees) of an organization looking for revenge. Other attacks in this category can be attributed to nation states who are acting on political agendas.

An example is Blue Security and its anti-spam product, Blue Frog. Attackers did not like that the organization was blocking spam so they launched a distributed denial of service (DDoS) attack on the company and the organization shut down.

One of the largest DDoS attacks was launched against KrebsOnSecurity.com in retaliation for a series the site produced on the takedown of the DDoS-for-hire service, which coincided with the arrests of two men.

Financial Gain

In today’s market, cybercriminals have found it lucrative to readily sell stolen data on the black market. Or, attackers will penetrate organizations as a form of extortion, demanding payment with a deadline with the threat of an ensuing DDoS attack. Recent FBI statistics indicate that hackers were able to successfully extort more than $209 million in ransomware payments from businesses and financial institutions in Q1 2016 alone. While we hear about attacks on larger well-known organizations, it can actually be more profitable for an attacker to target smaller, lesser known organizations since their security measures might not be as tight.

Community banks and credit unions cannot be complacent when it comes to protecting themselves and the sensitive information they hold. It is critical to defend your institution with a variety of security layers, not only firewalls and anti-malware, but additional security layers designed to guard against cybercrime.

White Paper Download
Read the Guide

28 Feb 2018
To Fight Cybercrime, Financial Institutions Must Identify Rogue Actors Featured Blog Image

To Fight Cybercrime, Financial Institutions Must Identify Rogue Actors

To Fight Cybercrime, Financial Institutions Must Identify Rogue Actors Featured Blog Image

Cybercrime continues to be a growing problem for community banks and credit unions. Today’s criminals continue to develop increasingly sophisticated tactics to exploit systems. The goal of an attacker is to gain access to an organization, locate and extract valuables, and avoid being discovered. These intruders are referred to as rogue actors.

What is a Rogue Actor?

There are two types of rogue actors. The first type of rogue actor is an external individual or group who enters an organization’s systems without prior authorization. This unauthorized access could come from an external attack, or through a physical presence. This physical presence could be accomplished using social engineering techniques. In this scenario, the adversary poses as a printer repair tech, or any potential vendor, and gains unauthorized physical access to your systems. The second type of rogue actor is an adversarial insider attempting to obtain unauthorized access to valuable data for personal gain or malicious intent.

How to identify a Rogue Actor?

One effective strategy to identify a rogue actor is for organizations to place decoys throughout their environment. Since there are no legitimate reasons for the decoys to be accessed, an alert will notify the appropriate groups on the anomalous activity. If the organization’s other security layers are bypassed, these alerts enable the organization to quickly remediate the issue. There have been several major breaches over the last few years that likely would have benefitted from these types of decoys within their organization. It is important to be aware of any suspicious activity so you can successfully mitigate risks and prevent data loss.

What is the impact of a Rogue Actor?

The impact of having a rogue actor on a network can be devastating to a financial organization, with the main risk being theft or unauthorized access of data. Financial institutions are prime targets due to the amount of sensitive data they house. A data breach at a bank or credit union not only affects that organization but also all customers or members whose personal information may be compromised or stolen. Rogue actors can then hold the compromised data for ransom or sell it on the black market.

White Paper Download
Read the Guide

21 Feb 2018
How DDOS Extortion Can Impact Your Institution

How DDOS Extortion Can Impact Your Institution

How DDOS Extortion Can Impact Your Institution

While cyber threats become more commonplace, sophisticated and damaging for financial institutions, one type of threat that has remained pervasive is the denial-of-service attack, or DoS. DoS is a cyber event where an attacker seeks to prevent legitimate users from accessing computer systems, devices or other online resources. The perpetrator floods the victim’s machine or network with false requests to overload the system and prevent legitimate access.

Cybercriminals have taken this form of attack to the next level with Distributed Denial of Service (DDoS) attacks which, while similar to a DoS attack, differs in that the incoming requests or traffic come from more than one source – something that makes it extremely difficult to stop.



To better understand the nature of a DDOS attack, consider the analogy of a supermarket. If you are a shopper and only have two or three items, you can usually go through the check-out line quickly. However, if the store only has one register open and there are several people in front of you with baskets full of groceries, they are essentially denying you service to that cash register due to the amount of items that must be processed. If that same store has multiple check-out lines open, and they all have long lines, you are being blocked access to the cash register from multiple sources.

How DDoS Works

To execute a DDoS attack, an attacker sends malicious software to vulnerable devices, often through infected emails, attachments, websites and even social media, creating an entire network of infected machines and devices called botnets. The attacker can then control the botnets remotely and send an influx of traffic to flood the network or target by sending huge amounts of random data or connection requests. The infected devices will show no signs of attack and will continue to function normally, but will have the occasional sluggish response due to the lack of available bandwidth.

The scale and sophistication of DDoS attacks has increased considerably over the years. In fact, according to a report from Verisign, one third of all downtime incidents have been attributed to DDoS attacks. Attackers often hold the organization’s website or device for ransom, performing a small example of the attack to show the victim what will happen if the ransom is not paid.

A recent botnet called Mirai, reared its head in 2016 and infected unsecured internet of things (IoT) devices such as DVRs, home routers, printers and IP cameras. These devices are vulnerable to attack since they are not required to have the same level of security as computers. The Mirai botnet was responsible for DDoS attacks on several high-profile websites such as Twitter, Reddit, Netflix, and Airbnb.

Impact of DDoS Attacks on Financial Institutions

Financial institutions are prime targets for DDoS attacks due to both the large amount of private data and monetary funds that they house, and as they continue to expand their use of digital channels and outsourced services, the possibility of an attack increases as well.

A well-executed DDoS attack can interrupt a host of banking services including website access, ATM networks, and online banking platforms, in addition to internal systems and functions that help the bank operate and serve customers. Beyond the operational impact is the resulting damage to the institution’s brand equity and reputation when customers are prohibited from accessing their financial information and funds.

Combating DDoS Extortion

To combat DDoS extortion, financial institutions should have a solid plan in place to identify all critical services as well as vendors and the organizations that host them; know who to contact and notify in case of an attack; and ensure that all employees are trained and ready to execute the plan. In addition, financial institutions should also contact the cyber division of the FBI, the Financial Crimes Enforcement Network (FinCen), and their local regulator to report the attack.

DDoS attacks remain unpredictable and can seriously disrupt your institution’s business operations. All financial institutions need a solid plan in place to be prepared, not if, but when a cyber event like this occurs.

White Paper Download
Read the Guide

14 Feb 2018
Rogue Actor Detection Monitoring for Internal Threats

Rogue Actor Detection: Monitoring for Internal Threats to Your Institution’s Network

Rogue Actor Detection Monitoring for Internal Threats

While financial institutions are aware of the importance of protecting their network from adversaries and possible outside attacks, many are not investing in protecting themselves against breaches coming from internal threats. These rogue actors could be an employee, an outside attacker, or another unauthorized user trying to access valuable data.

Within the last few years, several major breaches have been perpetrated by attackers exploiting a weak point within an organization and then scanning the network to gather information. While cybercriminals have certainly realized the benefits of targeting financial institutions, community banks and credit unions have been slower to realize the importance of monitoring for rogue actors and reacting to this danger.

Costly Invasions

As an example, a previously undetected hacker group, now known as the MoneyTaker group, has netted approximately $10 million in ATM network heists from at least 20 companies, including U.S. banks and credit unions, by targeting the networks banks use to transfer money. According to Group-IB, a global leader in preventing and investigating high-tech crimes and online fraud, the attackers used a form of malware that is stored in the memory of the computer, which makes them extremely hard to detect by traditional antivirus defenses. This also makes it very difficult for organizations to know they have even been hacked since all traces of the invasion are destroyed each time the machine is rebooted. On average, it can take an organization more than 200 days to discover that their network has been compromised.

Setting Out Bait

Security experts agree that a missing piece in many institutions’ security strategy is identifying unusual activity and having solid reconnaissance protection in place. One of the few ways to do this is to deploy what is known as decoy data and services onto the network. This technology serves as a trap for someone who is looking to gain illegal access to the network. Remediation processes can begin immediately once an attacker accesses the “bait” or “decoy.” Any unusual activity on these areas will trigger an alarm, since no there are no legitimate reasons to access the decoys.

Examples of decoy information placed on networks typically include items like port scan sensors, remote desktop protocols, SMB shares, FTP and/or SQL.

Protection for Community Financial Institutions

Many organizations that recently experienced breaches would have benefitted from implementing a solution to effectively monitor and detect unusual activity on its internal network. For community banks and credit unions, perimeter defenses can only do so much to protect their institution and customer information. Cybercriminals will continue to develop sophisticated forms of malware and carry out targeted attacks to compromise their networks. To be truly protected, it is important for financial organizations to monitor for internal threats and stop unauthorized network users before they strike.




White Paper Download

2018 Community Bank IT Outlook

Primary Research and Analysis of Your IT Priorities in 2018
White Paper Download

07 Feb 2018
2018 IT Outlook

5 Highlights from 2018 Community Bank and Credit Union Information Technology Outlook Survey

2018 IT Outlook

In our second annual IT outlook report, we surveyed community banks and credit unions to better understand their current IT situations, top IT priorities and challenges, security and compliance issues and to get an idea of key technologies and investments they plan to make in the year ahead. The data collected in our 2018 report analyzes survey feedback on 54 questions from approximately 110 respondents representing a range of community banks and credit unions across the country with asset sizes from $100 million to more than $1 billion.

One big difference to note is this year marks the first time that the survey includes responses from credit unions. The survey shows that both credit unions and community banks are experiencing many of the same issues related to compliance, IT challenges and staffing constraints. 


Five highlights from the 2018 Community Bank and Credit Union Information Technology Outlook reveal the following:

  1. Cybersecurity and Information Security Continue to Challenge Financial Institutions
  2. Cybersecurity remains the greatest security challenge banks and credit unions foresee for the year ahead according to 80% of survey respondents. Information Security continues to be a top challenge for community financial institutions, according to 81% of survey respondents, which has led to 74% of survey respondents claiming they have increased their IT-related security spending in the past 18 months.

  3. Compliance Continues to be “Top of Mind”

  4. Managing strict, ever-changing government regulations and guidelines is the greatest IT compliance challenge today for 32% of survey respondents. This has led approximately 40% of respondents to outsource their compliance needs. In addition, preparing for an exam has become a time consuming task as agencies are requesting more and more documents and reports before the exam even begins. According to survey results, approximately 60% of respondents have been asked to prepare more than 40 items for each exam or audit.

  5. IT Staffing Struggles Continue
  6. For the second consecutive year, personnel resource restraints and in-house expertise are cited as significant pain points for many financial institutions. According to the survey, approximately 31% of respondents have only one employee in their IT department and 26% have just two IT employees, emphasizing that many community banks and credit union’s IT departments continue to be understaffed.

  7. Outsourcing Continues to be Beneficial
  8. With limited internal resources and expertise, community financial institutions continue to augment their IT departments with outsourced service providers who are able to help them navigate the IT changes and meet examiner expectations. According to survey results, 76% of respondents outsource the management of their IT network to a technology service provider. 86% of bank and credit union respondents outsource their security monitoring, given the increase in security breaches the industry has seen this past year.

  9. Technology Investment Continues
  10. Community financial institutions continue to recognize the need for investing in new technologies and services. Nearly 81% of survey respondents claim their technology spending has increased in the past 18 months.

Other areas the survey focused on include IT management issues, audit and exam preparation, additional technology challenges, vendor management, business continuity planning, reasons for change and implementation of new services and cloud usage. The complete report provides executives with peer-to-peer information to better understand the current IT environment within community banks and credit unions nationwide, while also helping improve decision making within their own institution in 2018 and beyond.

To gain more insights into the key challenges, goals and opportunities facing community financial institutions today, please download the full report here.




White Paper Download

2018 Community Bank IT Outlook

Primary Research and Analysis of Your IT Priorities in 2018
White Paper Download

17 Jan 2018
Network Vulnerability: Why Scanning Your Institution’s Servers Is Not Enough

Network Vulnerability: Why Scanning Your Institution’s Servers Is Not Enough

Network Vulnerability: Why Scanning Your Institution’s Servers Is Not Enough

As community financial institutions continue to innovate and add to their IT infrastructure, they are unknowingly adding security threats, issues and vulnerabilities that might not be addressed by the standard security measures that are in place. Recent high profile security breaches have shown that it can take more than 100 days for an organization to detect suspicious activity on the network. To quickly identify internal threats, network security solutions must now scan and monitor more than just servers. It is vital for community banks and credit unions to scan the entire network to provide greater visibility and monitor potential threats on all workstations and devices connected to the network. Reasons for this necessity include:

  1. Increased Vulnerabilities
  2. Financial institutions now have more devices and software connected to their network than ever before, driving the number of vulnerabilities upward. A single vulnerability can result in an attack on the entire network, which leads to stolen bank and customer data, a devastating effect on the organization’s revenue and reputation, and the significant costs associated with repairing the damage.

  3. More Cyberattacks in the Financial Services Industry
  4. Cybercrime and threats are at an all-time high, especially in the financial services industry. According to a study by Raytheon and Websense, financial services organizations see three times as many attacks as organizations in other industries. This is because financial institutions house significant amounts of valuable, financial data such as credit and debit card information, corporate bank account numbers and other personal identification documents. Cybercrime will continue to plague financial institutions so it is important to be proactive and implement solid security defenses to secure the institution and its data.

  5. Strict Regulatory Expectations Around Security
  6. Due to the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council (FFIEC) developed the Cybersecurity Assessment Tool (CAT) to help institutions identify their risks and determine their cybersecurity preparedness. The CAT helps financial institutions weigh specific risks such as vulnerabilities in IT security measures versus controls or solutions aimed to prevent, detect and respond to these threats and determine areas for improvement. To remain in compliance with the FFIEC guidance, community banks and credit unions must scan their networks on a weekly basis to prevent cyber threats and demonstrate that they have the appropriate threat and vulnerability detection solutions in place.

Greater Network Visibility

To establish a secure IT network and be better protected in the current environment, financial institutions should employ a strategy that places many uniquely tailored layers throughout their networks, from the end-user to the internet, as well as a network security solution that scans the entire network, including all devices and workstations. It is important to implement a solution that identifies unknown vulnerabilities and reduces the risk of cyber-attacks. By scanning more than just servers, financial institutions have the ability to prioritize and address the vulnerabilities identified.

In an effort to help financial institutions better address network vulnerabilities, Safe Systems developed the V-Scan vulnerability scanning solution. V-Scan is a powerful network scanning tool that scans the entire network, both Windows and non-Windows-based devices and operating systems, and produces an exhaustive list of all threats that exist on each device. Safe Systems takes all the data collected and breaks it into different segments, creating a tailored report. With Safe Systems’ V-Scan solution in place, financial institutions will have greater visibility into their networks, providing confidence that the organization is truly secure.

White Paper Download
Read the Guide

08 Nov 2017
2018 IT Outlook Survey

Your 2018 Plan: Identifying Top IT Priorities for Community Banks & Credit Unions

To help small financial institutions get a better understanding of what their peers are spending and planning for technology, compliance and security, we survey community banks and credit unions across the country annually. Last year, our 2017 Community Bank Information Technology Outlook Survey provided valuable data including top IT priorities, IT challenges, security concerns and compliance issues.

Looking Back at 2017

Looking back at last year’s survey, bankers and credit union executives were acutely focused on:

  1. Cybersecurity was one of the greatest security challenges for 2017 according to 94% of respondents.
  2. Nearly 77% of respondents claimed they were spending more on technology than they had in the past.
  3. Banks found it challenging to keep pace with the rapid rate of technological change that is influencing and impacting the banking industry.
  4. 71% of respondents reported outsourcing their network management and 63% outsourced their IT support.
  5. Compliance issues were top-of-mind as many community banks indicated that regulators were more aggressive as examiner expectations and demands continued to increase. This resulted in approximately 59% of participants spending more on their IT and compliance needs headed into 2017.

What Has Changed

What are community banks and credit unions evaluating most headed into 2018? In this year’s survey, we will focus on compliance and security concerns, IT management issues, vendor management, audit and exam preparation and implementation of new services, among others. Each year, the data we gather provides valuable peer data from financial institutions across the country t0 use as guidance for their own key IT, compliance and security decisions in 2018 and beyond.

IT Outlook Link
We hope you will participate in the 2018 survey by visiting http://info.safesystems.com/2018-community-bank-credit-union-it-outlook-survey. By completing the survey you will receive access to this comprehensive year-end report. Your anonymous responses will be aggregated to provide detailed graphs, charts and plenty of insight amongst your peers in the community financial industry.

25 Oct 2017

Top 4 Security Threats Your Financial Institution Faces Today & How To Protect Yourself

The financial services industry continues to be heavily targeted by cyber-attacks because of the sensitive financial data that institutions hold. Hackers, in turn, recognize one of the greatest potential avenues for financial gain is in targeting financial institutions, enabling them to either commit fraud themselves or sell the information to a third-party. What is most troubling is that cyber criminals have displayed new and advanced levels of sophistication, knowledge and ambition in 2017 – a year characterized by a series of extraordinary attacks, including malware threats, credit and debit card breaches, phishing attempts and data breaches.

Some of the most common security threats financial institutions are facing today include:

  1. Ransomware
  2. Ransomware has established itself as one of the leading cyber threats with instances increasing by 44 percent last year. In fact, according to the 2017 State of Malware Report by Malwarebytes, ransomware was the favored method of attack used against businesses in 2016. Recent FBI statistics also indicate that hackers successfully extorted more than $209 million in ransomware payments from businesses and financial institutions in Q1 2016, and the business of ransomware is now on track to become a $1 billion per year crime.

  3. Lack of Third-Party Vendor Security
  4. While a financial institution might have the right security systems and policies in place to protect itself and its customers from a cyber-attack, its third-party providers and vendors may not have the same level of security and diligence. This creates a major vulnerability for the financial institution and risks Federal Financial Institutions Examination Council (FFIEC) compliance issues.

  5. Insider Threats
  6. Often, all it takes is a disgruntled employee or ex-employee to release valuable security information and compromise system and data security. Additionally, cyber criminals are increasingly realizing success through bribery as a means to entice bank employees to give up their login credentials or other security information, allowing direct access to internal systems.

  7. Lack of Employee Training and Security Expertise
  8. Cyber-attacks are often able to outpace cyber-defense due to a shortage of qualified cybersecurity personnel and the limited IT staff bandwidth to stay abreast of a continually evolving security landscape. Employee testing and training is critical for banks and credit unions to decrease vulnerabilities and ensure staff — at all levels — understand their roles and responsibilities in protecting against security threats. Until this learning gap is resolved, financial institutions will continue to struggle to efficiently manage cybersecurity threats.

Combating Security Threats & Protecting Customer Data


To adequately protect against cyber threats, financial institutions should ensure that every device on the network has up-to-date antivirus software, adequate firewall protections and that all patches are up-to-date as a minimum requirement.

In addition, financial institutions should also employ a strategy that places many uniquely tailored layers throughout their networks, from the end-user to the Internet to establish a secure IT environment. Adding preventive, detective and responsive layers to IT security strategy will help strengthen an institution’s approach and build an effective security foundation. Proactively protecting customer data will always be more cost effective than falling victim to malicious activity.

For more information, download our white paper, “Ransomware and the Evolving Security Landscape of Today’s Financial Institution.”
White Paper Download
Read the Guide

02 Aug 2017
How to Stay Vigilant with Technology and Compliance Issues During the Summer Vacation Months

How to Stay Vigilant with Technology and Compliance Issues During the Summer Vacation Months

How to Stay Vigilant with Technology and Compliance Issues During the Summer Vacation Months

For many community banks and credit unions, keeping up with the ever-changing regulatory requirements and expectations can be a challenge, especially during the summer months when employees are taking time off to enjoy the warm weather and travel for summer vacations. The Federal Deposit Insurance Corporation (FDIC) actually encourages mandatory vacation time for bank employees of all levels. However, this can be a challenging time for many community institutions that have a small staff and rely on key individuals to make sure all activities related to technology, compliance and regulatory requirements are completed. So, what happens when the person(s) responsible for these crucial aspects of the institution goes on vacation?

Many financial institutions are turning to IT and security service providers to act as an extension of their organization and help augment internal technology and compliance resources. The right third-party solution provider can serve as a true partner and work alongside current staff to manage the technology, compliance and regulatory aspects of the institution. When the technology or compliance staff is out or unavailable, outsourcing select business processes helps fill the personnel gap and provide added stability for the institution and peace of mind to all.


A service provider can help automate and manage many of the administrative functions that normally fall to the technology or compliance department, making it less daunting for employees to take time away from the office. These service providers can automate technology functions that are required to stay vigilant with compliance and security procedures, such as patch management and reporting, vulnerability remediation, proactive network monitoring and issue resolution, vendor management, business continuity planning, cybersecurity, and compliance-focused documentation and reporting.


The right service provider should offer your financial institution full support for the demands of today’s technology, compliance and regulatory requirements. At Safe Systems we understand the complexity of community bank and credit union operations and the associated regulatory expectations. With more than 20 years of service in the financial industry, working with more than 600 institutions, and actively managing 20,000+ devices, Safe Systems has gained a unique perspective on what is important to financial institutions and to the regulators that oversee them. We want to provide you with assurance that your institution is functioning securely and is in compliance with industry regulations at all times; but, especially when your institution’s key technology or compliance personnel are out of the office.

Free White Paper

Understanding the FFIEC’s CAT

Understanding the FFIEC’s CAT: How Your Institution Can Improve Its Cybersecurity Posture
Get a Copy

26 Apr 2017
Why Financial Institutions Should Invest in Layered Security

Why Financial Institutions Should Invest in Layered Security

Why Financial Institutions Should Invest in Layered Security

Phishing, malware, ransomware and a host of additional fraudulent activities continue to target financial institutions. While history has shown that well-designed single-focus solutions can prove useful in stopping specific attacks, the capabilities of advanced malware are now so broad and sophisticated that such protections inevitably fail – opening the way to costly data breaches and other malicious attacks. What is perhaps most frustrating is that Verizon’s Data Breach Investigation Report indicates that 97% of attacks were easily avoidable.

To establish a secure IT network and be better protected in the digital world, banks should employ a strategy that places many uniquely tailored layers throughout their networks, from the end user to the Internet. By employing multiple controls, security layers ensure that gaps or weaknesses in one control, or layer of controls, are compensated for by others. For example, if a malicious email message should make it past the firewall, it would then be countered by the mail server’s antivirus, and if it somehow makes it through that layer, it can be stopped by the workstation’s antivirus system.

A uniquely tailored layered security approach enables financial institutions to:

  • Monitor antivirus for servers, workstations, and off-site laptops;
  • Using services that evaluate site lookups to avoid exposure to compromised websites;
  • Monitor unusual activity on networks as well as defend against hackers and rogue employees;
  • Block access to all external ports while also monitoring the access of various machines;
  • Meet government regulations and requirements;
  • Counter extortion threats by preventing a hacker from holding your customer’s personal data for ransom with special customized software for stopping ransomware; and
  • Patch machines, encrypt laptops, and install alerts on new devices plugged into the network.

Government Regulations and Guidance Around Security Expectations

There are also regulatory requirements and expectations for banks to invest in proper security. Layered security and compliance policies have come under increased regulatory focus recently, which is evident with the release for the FFIEC Cybersecurity Assessment Tool (CAT) and the updated FFIEC Management Examination Handbook. In addition, the responsibility of securing confidential customer information is mandated by the Gramm-Leach-Bliley Act of 1999. This law established that financial institutions must protect their IT networks from attack and identify any possible breaches that manage to bypass these protections.

This guidance is always changing, and financial institutions must adapt to regulatory demands. IT auditors and examiners will look for evidence of a thorough risk assessment; make sure that written policies and procedures align with the assessment; and then verify that controls and daily practices are appropriate. 


Each financial institution will have a different security approach based on its unique risks, but all financial institutions should implement a security plan that can effectively prevent attacks, assess vulnerabilities and constantly update security measures as new technology assets are added and government regulations evolve.

For more information please download our complimentary white paper, Strengthen Your Strategy: Why a Layered Defense is the Best Choice for Your Bank’s IT Security Program.

White Paper Download

Strengthen Your Strategy: Why a Layered Defense is the Best Choice for Your Bank’s IT Security Program

Learn why a single layer of security, such as antivirus, is no longer enough in the current risk environment.
Free White Paper

12 Apr 2017
Community Banks Ransomware

Ransomware Response: 8 Ways Your Community Bank Can Prevent Malicious Attacks

Community Banks Ransomware

One of the biggest cyber threats today is ransomware, with instances of these malicious attacks increasing by 44% in the last six months alone. In fact, according to the 2017 State of Malware Report by Malwarebytes, ransomware was the favorite method of attack used against businesses in 2016. Recent FBI statistics indicate that hackers successfully extorted more than $209 million in ransomware payments from businesses and financial institutions in Q1 2016, and the business of ransomware is now on track to become a $1 billion per year crime.

(more…)

05 Apr 2017
5 Steps Community Banks Can Take

5 Steps to Building a Strong Security Culture

5 Steps Community Banks Can Take

Financial institutions face increasing pressure to provide enhanced consumer protection against phishing, sophisticated malware and fraudulent activities. Smaller organizations are the prime targets for calculated, malicious attacks, due to the sensitive financial data banks are responsible for.

Investing in technology resources is necessary to protect community banks from security breaches and attacks, but it is equally important to instill a strong security culture within the bank to help all departments and personnel adequately combat these threats. IT security is integral to running a successful institution, and banks should begin to educate and train their employees on the proper way to tackle security-related issues and safeguard customer information.

(more…)

08 Feb 2017
3 Top Challenges Community Banks Will Face in 2017

3 Top Challenges Community Banks Will Face in 2017

3 Top Challenges Community Banks Will Face in 2017

To get a better understanding of financial institutions’ current IT situation, we surveyed approximately 100 bankers to identify their top IT priorities, IT challenges, security concerns and compliance issues, as well as what technologies and investments they plan to leverage in the coming year. We recently published the findings in our white paper, “2017 Community Bank Information Technology Outlook,” to provide community banks with valuable peer data that can provide guidance for key IT, compliance and security decisions in 2017 and beyond. Here are some highlighted trends from the results:


White Paper Download

2018 Community Bank Information Technology Outlook

Primary Research and Analysis of Your IT Priorities
in 2018
White Paper Download

  1. Increasing Technology
  2. Mountain TopIn today’s banking environment, community banks recognize and embrace the use of technology and remain committed to investing in new technologies and services moving forward. In fact, nearly 77% of respondents claim they are spending more on technology today than they have in the past. However, the challenge often lies in trying to keep pace with the rapid rate of change that is influencing their business. Community banks are continuing to explore ways to enhance and augment their IT departments, as many institutions struggle to maintain adequate personnel needed to manage the complex activities required of the IT department. To counter this, 71% of respondents have turned to outsourcing their network management and 63% have outsourced their IT support.

  3. Cybersecurity is the Greatest Security Challenge for 2017
  4. According to the survey, 94% of respondents foresee cybersecurity as their greatest security challenge in the coming year. No doubt this is in response to a seemingly constant stream of news about security breaches and the possible enforcement of the Cybersecurity Assessment Tool (CAT). Community banks must have procedures in place to secure customer and confidential data and recover critical business processes regardless of the source or nature of the threat. Having a thorough understanding of the CAT and how to properly complete it will help banks to improve their cybersecurity processes and better meet examiner expectations.

  5. Compliance Concerns
  6. Compliance issues are top-of-mind as many community banks are challenged to keep up with constantly changing regulatory requirements. This is reflected in the approximately 40% of respondents that have chosen to outsource their compliance needs. This number is on the rise and is likely to continue to increase as respondents indicate that regulators have been more aggressive as of late and examiners’ expectations and demands continue to increase. Approximately 59% of participants say they now spend more on their IT compliance needs as a result.

Other areas including vendor management, business continuity planning, information security, cloud, and email continue to provide financial institutions with room for improvement. To achieve this, community banks are increasingly turning to their peer groups when seeking recommendations to help guide their decisions regarding new technology and services. The majority, approximately 90% of the survey respondents, consistently leverage their peer network when researching a new solution or vendor.

To gain more insights into the key challenges, goals and opportunities facing community banks today, please download the full report here.

30 Nov 2016
ISO Threat

Why Board Involvement Should Be a Key Part of Your Bank’s Information Security Program

Information Security Threat

The Board of Directors plays a critical role in overseeing all affairs of the bank. While the board typically delegates the day-to-day operational responsibilities of conducting the bank’s business to its officers and employees, it cannot delegate its responsibility for the consequences of unsound or imprudent policies and practices, whether they involve lending, investing, cybersecurity and IT practices, or any other banking activity.

Board engagement has become more important than ever. Both the FFIEC Management Handbook updated in 2015, and the Information Security Handbook just updated in September focus specifically on the responsibility and accountability of the Board as it relates to information technology oversight. Boards that do not adhere to these new standards run the risk of penalties, lowered CAMELS Scores and audit rankings, and in extreme circumstances, individual director financial accountability. From January 1, 2009, through October 20, 2016, the FDIC has authorized suits in connection with 151 failed institutions against 1,213 individuals for Director and Officer liability.

Understanding the Regulatory Responsibilities of Officers and Directors

The FDIC states that they will not bring civil suits against directors and officers who fulfill their responsibilities, including the duties of loyalty and care, and who make reasonable business judgments on a fully informed basis and after proper deliberation. The key to proper deliberation is that Board members be fully informed, and that requires accurate, timely and relevant information. Not just data, but actionable information, and this is where the ISO plays a critical role.

The Role of the Information Security Officer

A bank cannot just add the title ISO to an IT administrator or employee. The ISO must be a separate role. In fact, the guidance clearly states that it cannot be a production resource assigned to the IT department. Banks that do not have a separation of roles will be cited with what is known as a “Concentration of Duties” finding, which must be resolved in a specified timeframe to avoid a downgraded score or additional penalties.

The ISO is responsible for overseeing the IT budget, performance management, professional development and training, participating in planning activities and ensuring the bank is in compliance with and adhering to government regulations. This reporting role, to ensure independence, should report to the Board and not to IT operations management. While this separation of duties can pose a challenge for smaller community banks that have limited staff and resources, banks need to keep in mind that while cost and benefit decisions must always be considered, this is not the place for cost reductions. The overall IT and compliance issues and decisions of a bank are of the utmost importance.

According to the guidance, the Information Security Officer (ISO) is required to provide an information security update to the Board at least annually. Presenting information in a manner the Board will truly understand is the key to successful Board engagement. The ISO must present information in a manner whereby the Board is able to consume, digest, and take action on it. A simple summary report of what the bank did this year is not sufficient to engage the Board or give them the kind of information they need to make the right decisions for the institution. The pace of change in technology requires a more frequent reporting schedule.

“Credible Challenge”

The Board is expected to provide a “credible challenge” to management in the oversight of IT initiatives. Too often, when management brings something to the Board, they approve it without discussion. However, examiners are now expecting the Board to ask probing questions, understanding not only what they are approving, but also why, making sure it is the right strategic decision for the bank, and comprehending the consequences and risks of not taking action. Responses to questions such as: “Why are we doing this?,” “What are we doing?,” “What’s the significance of this?,” “What’s the risk?,” “What if we do it the wrong way?,” “What if we don’t do it”, and “What if it fails?,” should all be asked, answered, and documented.

The ISO needs to ensure that the Board truly understands the “why” behind the bank’s actions. The Board of Directors must get information they can digest and make sense of, and it is the responsibility of the ISO to provide such information. If the Board shows a lack of understanding, the consequences could range from a Matter Requiring Board Attention (MRBA) finding in an examination report, to an informal enforcement action; such as a Board resolution or Memorandum of Understanding, to a formal action; up to and including a Cease and Desist order and civil money penalties. In 2015, 36 percent of examinations of satisfactorily rated (CAMELS 1 or 2) institutions resulted in MRBAs.

Increasingly, community banks are being stretched to gather more and more information and develop detailed reports and summaries in order to remain compliant. Working with an outsourced service provider, such as Safe Systems, can help streamline this process. With the reports and comprehensive information Safe Systems provides banks, the ISO is able to more efficiently communicate with the Board, helping them to make the right decision for the bank. For more than 20 years, Safe Systems has successfully helped financial institutions improve their CAMELS Score, avoid (and remedy) enforcement orders, and fill in cybersecurity gaps to ensure IT audits and exams go smoothly, and all regulators expectations are met.

White Paper Download

Driving Compliance Through Technology

Learn how automation and documentation can improve your financial
institution’s compliance posture



Get a Copy



14 Nov 2016

What Community Banks Should Budget for in 2017

What Community Banks Should Budget for in 2017

Many financial institutions are entering their 2017 budget season. Creating a budget is essential in helping you execute your strategy and plan for the future, however, any shortcomings, such as the ability to respond to changes in regulation or things you didn’t adequately plan for, can quickly derail your plans and force you to make critical trade-offs. As community banks and credit unions dive into this process, it is important to evaluate all areas and think outside the box on key IT, Security and Compliance budget items that are often overlooked. Since we work with more than 300 financial institutions just like yours, we are constantly researching what’s coming next, both from technology and compliance viewpoints, and offer some points for consideration in your budgeting for 2017.

In 2016, regulatory agencies have seemed to be more aggressive. We are consistently hearing from institutions that traditionally pass exams with ease that they have now been cited for new issues or have been asked to go above and beyond their normal remediation steps. We are now seeing that it is not uncommon for institutions to be cited for their handling of Cybersecurity Assessments, Business Continuity Planning and/or Vendor Management. 2016 was also the year of malware, and examiners are now focusing more attention on it as a pervasive problem in the industry. In addition, multiple institutions have been encouraged, if not “required,” to have a forensic analysis performed if the institution did not do a thorough job of performing their incident response procedures during a malware outbreak.

Often, once regulators cite an institution for one item, they dig deeper into other processes as well. Rarely have we seen an institution written up for one issue. The shift to a more proactive approach, including better preparation for and addressing of concerns or potential regulatory issues prior to an exam, is a much more efficient course of action and one that more financial institutions are adopting.

Community Bank Budgeting Money

With these ideas in mind, here are some areas financial institutions should consider when budgeting for 2017:

  • Malware/Ransomware Layers:  $1,500 – $5,000

    While the price will depend on the layers you choose and how many you choose to add, you should really consider taking a more aggressive step in your fight against malware. If 2016 taught us anything, it is that malware, and specifically Ransomware, is back with a vengeance. More legitimate websites are unknowingly infected with malware and more emails are getting through with malware than in years past. Malware has also evolved into a more aggressive threat. It’s no longer characterized by simple aggravating popups and sluggish computers. It’s now encrypting all of the data on your machine, rendering it unusable. It’s gathering credentials of users, or even sometimes gathering documents and information on the machines themselves. Safe Systems has had more calls from both customers and non-customers about aggressive malware in 2016 than in years past and that trend looks to continue.

    Financial institutions should evaluate their current layers, their effectiveness, and what they can do to enhance their posture. This may mean more/different end user training, DNS Filtering, or actual implementation of anti-ransomware toolsets. Whatever course you choose, know that the battle to protect your data is real, and it is as important as ever.

  • Cybersecurity Policy and Incident Response Testing:  $4,000 – $7,500

    Cybersecurity has come under increased regulatory focus, and with the latest Cybersecurity Assessment Tool being released this year, it promises to be a hot topic for the foreseeable future. You need to make sure you keep your security, business continuity and vendor management policies and procedures up to date.

  • Business Continuity Planning and Testing:  $3,000 – $8,000

    Community Banker Budgeting Money
    You must ensure that your business continuity policies, procedures and practices are in compliance with constantly changing regulations. A business continuity plan (BCP) should be a living, functional document that keeps pace with any changes in your infrastructure, strategy, technology and human resources. Be sure to budget for the following:

    • BCP updated to meet current regulations
    • Annual plan testing to validate
    • Training for gaps found during test or updates to the plan
  • Robust Vendor Management Solution:  $2,500 – $5,000

    With financial institutions delivering more products via third-party vendors than ever before, regulators are looking for a thorough vendor management program that ensures that all vendors are being reviewed regularly. For the average community bank, the process to properly perform vendor due diligence and vendor management has become too cumbersome. An automated solution provides a more efficient, cost effective way to address this.

  • New and Replacement Technology:  $500 – $10,000

    Be sure that all products your vendors are “sun setting” are budgeted to be updated or replaced. Also, ensure that key applications and settings are updated to the latest best practices, including:

    • Windows® Server 2003
    • VMWare ESX nodes 5.1 or lower (end of support August 24, 2016)
    • SQL 2005 or earlier instances (end of support April 12, 2016)
    • Domain replication from FRS to DFSR
    • Extending warranties on hardware more than 3 years old
    • VEEAM Backup & Recovery version to 8 or higher
  • Training:  $500 – $1,500

    Information security is an issue that not only affects your institution, its employees and Board of Directors, but also extends to your customers. In fact, FFIEC guidelines now expect you to enhance the training programs you may already have in place. Make sure your employees and customers have access to the appropriate training commiserate with their needs. Information security knowledge and understanding affects all employees at some level, so ensure that your budget includes the appropriate training for each type of employee.

  • Vendor and User Conferences:  $1,000 – $1,800

    It is important to stay up to date with the latest features and industry changes. An effective way to achieve this is to attend a vendor conference or user group event. Make sure to budget for key vendor conferences as an educational and vendor management function.

    Some careful forethought in the budgeting process today can prevent you from having to make difficult decisions and trade-offs next year. With more than 20 years of service in the financial industry, working with more than 600 institutions, and actively managing 20,000+ devices, Safe Systems has gained a unique perspective on what is important to financial institutions and to the regulators that oversee them. We encourage you to leverage our expertise as you develop your strategic plans and budgets for the coming year.




Free White Paper



Dispelling 5 IT Outsourcing Myths within Financial Institutions

Learn why five of the most commonly believed “facts” about IT outsourcing within community financial institutions are actually myths.



Dispelling 5 IT Outsourcing Myths within Financial Institutions



05 Oct 2016

Building Success in the Banking World – Safe Systems’ 2016 NetConnect Conference Recap

Building Success in the Banking World - Safe Systems' 2016 NetConnect Conference Recap

Safe Systems hosted its 2016 NetConnect Customer Success Summit on September 13th in Athens, Georgia. The theme of the three-day conference was focused on customer success. Safe Systems brought together 73 financial institutions from around the country to hear inspiring key note speakers, attend informative educational sessions, and obtain key banking industry insights designed to help them build the best financial institutions for their communities.

A key goal of this year’s conference was to provide our banking clients with the necessary tools and guidance to build successful institutions and meet stringent regulatory demands. Safe Systems presented a short tongue-in-cheek skit that began with an FDIC examiner knocking on the front door of a bank, ready to do a full analysis. The bank felt confident that it would meet the examiner’s expectations, but ended up with less than satisfactory results. The examiner emphasized the need for the senior management and board’s involvement in all areas of exam preparation to ensure success, including cybersecurity, vendor management, business continuity planning and more. This example became an important topic of conversation and a key point that Safe Systems highlighted throughout the day.

Sticking with the theme of success, Safe Systems’ President, Darren Bridges, provided opening remarks encouraging banks to not only know what they do and how they do it, but to also have a strong understanding of why. This is an important part of creating a successful institution because the “why” is what makes a bank stand out from competitors and connect with the critical needs of its customers. During the keynote session, Dr. Randy Ross gave an energetic and memorable speech on designing a remarkable culture within financial institutions. He emphasized that culture is the single most important differentiator for community banks and sets the tone for how customers interact with the institution.

Safe Systems’ vice president of Compliance, Tom Hinkel, rounded out the day’s activities with an engaging presentation, where he highlighted some of the compliance challenges banks are facing today and provided helpful advice on how they can successfully manage this complex function.

Customer feedback sessions during the conference provided insights into current IT, security and compliance issues and trends bankers are most interested in and helped to identify areas where they will need the most support. Community bankers today wear many hats, and it can be daunting to keep up with all of the changes occurring in the world of IT. One big concern for bankers at the conference was being able to manage networks effectively and ensure that all activities are running smoothly for their institutions. Other major topics included understanding cybersecurity, managing new regulations, providing proper IT training for employees, and communicating effectively on IT issues with the board and senior management at the bank.




Free White Paper



Taking Business Continuity Planning to the Next Level:
A Better Way for Banks

Learn how examiners are increasing their focus on BCP, the risks involved in relying on a single individual, and better ways to develop your plan.



Free White Paper



Safe Systems also worked to create an atmosphere where customers could exchange ideas and learn more about the latest technologies and services in the financial services industry. The conference featured many trusted partners and vendors, who either sponsored the summit, exhibited during the trade show, or both. These companies included:

  • Thigpen, Jones, and Seaton
  • Banc Intranets, LLC
  • Consolidated Banking Services, Inc.
  • Rebycsecurity
  • iTransit Solutions
  • Porter Keadle Moore, LLC
  • Bitdefender
  • Jack Henry & Associates
  • CashTrans
  • ATM Response
  • Kaseya
  • Intronis

Overall, last month’s NetConnect Conference was an engaging and educational experience where bankers received invaluable knowledge and advice regarding technology, compliance, and security. Safe Systems continues to enhance its products and services to help community banks strengthen their businesses and build success! We look forward to the next event to grow and create new opportunities for our clients.

07 Sep 2016

TeamViewer Hacks Remind Banks to be Vigilant – Best Practices for Banks Using Remote Access Solutions

TeamViewer Hacks Remind Banks to be Vigilant - Best Practices for Banks Using Remote Access Solutions

Like many organizations today, many community banks use remote login technology, a service or software that allows individuals to log into their computers from remote locations. With such remote access solutions, bank employees have the ability to access a computer or a network from a different branch, while traveling, or when telecommuting from home. Remote control tools also allow external IT service providers and vendors to provide support and service to their applications quickly without the hassles of a site visit. While remote access software is most definitely convenient, it also introduces security issues that need to be top of mind for banks.

This has become even more apparent in light of a recent security event with TeamViewer, the maker of a cloud-based remote control solution. TeamViewer experienced a significant data breach where malicious actors were able to take control of users’ computers through their TeamViewer accounts, and, in some cases, steal personal details such as bank and PayPal account information.

It seems the cause behind this breach is unclear. TeamViewer is claiming it was compromised through a cluster of recently exposed megabreaches involving more than 642 million passwords belonging to users of LinkedIn, MySpace, and other services. These 3rd part breaches were linked to TeamViewer accounts through the “carelessness” of TeamViewer users who they claim used the same IDs and passwords across multiple sites and services; thus, when these recycled credentials were exposed elsewhere, the bad guys simply had to copy/paste stolen username and password information until they found valid credentials. In addition, TeamViewer also claims that many of its users did not take the time to set up and activate dual factor authentication features. Dual factor authentication strengthens credential strength by requiring a token in addition to username and passcode information.



Free White Paper



Dispelling 5 IT Outsourcing Myths within Financial Institutions

Learn why five of the most commonly believed “facts” about IT outsourcing within community financial institutions are actually myths.



7 Reasons Why Small Community Banks Should Outsource IT Network Management



FFIEC Guidance Around Remote Access Solutions

While remote access solutions are becoming more popular, the FFIEC has clear guidance around remote access to systems. Primarly, the guidance states that financial institutions should disallow remote access by policy and practice unless there is a compelling business justification for its use. A “compelling business justification” is a tough standard, but most banks do use some form of remote control. For instance, many banks work with vendors that require remote access in order to access their services and provide support. If your institution deems remote access a necessity, then here are a few best practices a bank can implement to ensure their system is secure and compliant with FFIEC guidance:

Best Practices for Banks Using Remote Access Solutions

  • Maintain a detailed log of who is accessing the system, when the system is being accessed, and from where
  • Audit applications on workstations to check for anything that might not look normal
  • Do not use a free remote access platform
  • Remote access solutions should be initiated by the bank directly, and not a third party
  • Ensure there are triggers to deny access and control of the solution
  • Passwords for remote access accounts should change every sixty days, or less. For more information on password safety, review our blog, Creating Strong Passwords to Protect Your Community Bank
  • Review remote control logs regularly and look for login activity originating from unknown accounts or occurring during off-hours. These reviews can be done monthly or quarterly, depending upon the amount of use.
  • Have vendors use applications that remove themselves upon completion of the session.
  • Ensure remote users are fully disconnecting when their task is complete
  • In firewalls, only white list specific IP addresses from which support is going to come
  • Utilize dual factor authentication whenever possible

What Banks Should Look for in a Remote Access Solution

While there are many remote access solutions on the market today, banks should look for solutions that have proven security measures in place. First and foremost, the solution should provide strong session encryption. In order to provide a paper trail, the solution should offer detailed logging of session details. The remote control you choose should also have a handful of additional authentication requirements, including the option to implement dual factor authentication, granular permissions that require the bank to provide specific approval for each individual support representative, and the requirement that all users have a registered account in order to access the network.
While none of our clients using TeamViewer have been hacked, the fallout has served as a reminder that banks must remain vigilant when it comes to the security of all remote access solutions they use. Enforcing security policies and access controls for employees, external IT service providers, and vendors is challenging, but when individuals have privileged access to your bank’s networks and systems, you need to ensure those accounts are managed in a secure, auditable and compliant way.

03 Aug 2016

Advice on Adding New Applications to Jack Henry Core Banking Systems

Let’s face it, keeping up with evolving banking applications, meeting customer and regulatory demands and managing and securing a network can be a huge challenge for any financial institution, especially community banks. Today, in an effort to bring customers the best features and options banking technology can provide, banks are adding applications to their networks that must integrate seamlessly with their core banking system. Each core has its own complex product matrix comprised of layer upon layer of acquired companies and products. Because of this each core has its own specific application set and standard practices, most of which have been developed in separate silos from each other.

As a result, we typically see the core-provided solutions built in a modular fashion requiring little to no analysis of the existing environment. This can result in a disjointed network comprised of extraneous hardware and licensing that are difficult to manage and do not fit into the bank’s future strategic plans. Working with an independent IT provider who understands core providers can be a huge benefit when it comes to incorporating new core systems into the existing network and wider vision for the network’s growth.

As a Jack Henry customer you may have first-hand experience overcoming some of these same hurdles. With over 100 Jack Henry clients, Safe Systems has implemented many of the JHA and various Profitstar applications in many different environments. Here are some suggestions to help you identify and avoid common implementation challenges in the future:

Adapt Your Network Configuration to Support New Applications

When you are adding an application to your network the core will often require that the application be housed on its own designated server. They will often quote you physical hardware for the application to reside on as this fits their modular one size fits all mentality. Depending on your network infrastructure, new designated servers and/or suggested physical hardware may not be necessary to support the new application. Be sure to review your bank’s specific network configuration before licensing /acquiring any new hardware. This review can be a challenging endeavor unless you have a team familiar with both the product requirements and the existing network configuration.

Once you determine the optimal set up and new servers are required, there are many tasks that must be performed to ensure they are being managed properly. These servers must be set up on the network and added into the bank’s inventory of technology assets. They must also be enrolled in a credible patch management program and accounted for in the network disaster recovery plan and backup process. Working with an experienced bank IT network provider that has a holistic view of your entire network will help ensure you are not purchasing and running unnecessary hardware and that you avoid creating network management issues.

Ensure Compliance and Security Day One

What happens after new products and services are implemented in the bank? All new applications must be secure and in compliance with FFIEC regulations (How will this impact business continuity planning? How does it factor into the incident response program?). The right outsourced IT provider should have teams that work extensively with the core provider and the bank to ensure the new product is fully implemented correctly at the bank and meet all operations, compliance and security objectives.

Ensure Patch Management Out of the Box

Patch management is more important than ever! The lack of an effective patch management process has contributed significantly to the increase in the number of security incidents in financial institutions. An effective patch management program should include policies and procedures to identify, prioritize, test and apply patches in a timely manner. The longer that a system remains unpatched the more vulnerable the institution becomes. If you choose to work with an outsourced service provider, be sure they can offer your institution a comprehensive patching program that delivers quick, accurate, and secure patch updates to all applications. This process will help mitigate the multiple risks associated with running unpatched programs and automate the time-consuming process of testing and deploying new patches.



Free White Paper



Dispelling 5 IT Outsourcing Myths within Financial Institutions

Learn why five of the most commonly believed “facts” about IT outsourcing within community financial institutions are actually myths.



7 Reasons Why Small Community Banks Should Outsource IT Network Management


Get The Right Help

Working with an experienced outsourced IT provider such as Safe Systems helps ensure your integration with Jack Henry core systems will be smooth and efficient. Safe Systems is a banking-specific technology specialist with more than 20 years in the industry and relationships with more than 600 financial institutions. We have a unique understanding of critical components such as Jack Henry core processing, 3rd party banking applications, financial industry best practices, information security, business continuity and FFIEC guidance.

We have been working with and supporting more than 100 Jack Henry core banking clients for more than 20 years. This experience has provided us with a thorough understanding of Jack Henry’s core banking solution, best practices for working with the solution and how to efficiently add applications in a secure environment. Our holistic approach to financial services ensures our financial institutions are running an efficient and secure network.

Talk with an Expert

22 Oct 2015

Eight Keys to Creating and Managing Your Passwords

In recent years, hackers have developed sophisticated methods using malware such as bots, worms and viruses to infiltrate systems and capture your critical data without you knowing until it is too late. IT staffers at community banks and credit unions around the country defend against these attacks with antivirus software and firewalls.

Despite these efforts, it is likely that the most vulnerable point in the line of defense is you, or more specifically, your passwords. The whole point of passwords is to defend against threats to your valuable and sometimes personal data. Therefore, cyber thieves often attempt to gain entrance into banks and credit unions through targeted attacks on bank employees. That is why it has become so important to understand the keys to creating, managing and securing all of your passwords.

Top 8 Keys to Password Creation and Management

  1. Make passwords impersonal.
    Avoid using names and dates such as birthdays, wedding anniversaries, spouse names, kids’ names, grandkids’ names, pet names, etc. These are some of the most popular and overused passwords today making it easy for hackers to figure out. If you are using personal names and dates as your passwords, you are not offering yourself a high level of security.
  2. Mix letters, numbers, case and symbols in your passwords. Try multiple words together separated by symbols such as “Run?Jump?Laugh?Fun?” or substitute numbers for specific letter, such as “$+@p135&0ff1c3M@x” instead of “Staples&OfficeMax.” Mixing lower-case and upper-case letters adds another layer of complexity and increases security as well.
  3. The longer the password, the better.
    Passwords should contain as many characters as possible. The length of a password is a major key to its security. When allowed, a password should be a minimum of 12 characters. With each additional character added to a password, the likelihood of the password being compromised is decreased by an increasing percentage.
  4. Use a formula to create your passwords.
    Be sure the formula isn’t easily identifiable. For example, “MarkJaneLucyBob” has a lot of characters but anyone who sees this knows you are most likely using your family names as your password. “Ma*Ja*Lu*Bo!” is much more secure and not too difficult to remember.
  5. Never reuse your passwords.
    Although it is tempting to use the same password in multiple programs or sites, it is not a good idea. If your password is compromised in one place, then you are immediately vulnerable in multiple places.Whenever possible, randomly generate a unique password for each program or site you use.
  6. Change your passwords on a regular basis.
    This key becomes more important if you are not following the previous keys regarding personalization and complexity. A complicated, lengthy, randomly generated password that is not reused on other sites might be acceptable to use for an extended period of time. Conversely, a short, simple password including personal names and dates, that are reused on multiple sights should be changed much more regularly.
  7. Use a password management program.
    While these tools have their own security issue as they are the key to all your passwords, they are really the only practical way to manage all of your user names and passwords. A heavy internet and social media user can easily have 50 passwords or more while even a novice user most likely has as many as 15 passwords. These cannot be maintained long term without help. Smart phone apps offer various password management options and the app store will provide ratings and reviews from other users. Respected industry resources, such as CNET or PC Magazine will also provide trustworthy list of options.
  8. Test the strength of your passwords.
    There are some excellent free tools available for you to test the strength and vulnerability of the passwords you create. One option that provides you with a score is The Password Meter. It gives users a percentage score and complexity rating. Another one, called “How Secure is my Password?” informs you how long it would take for your password to be cracked.

With the amount of valuable, personal data in need of protection it is important to create and maintain secure passwords as part of your overall data security strategy. As part of our Security service offerings, Safe Systems provides system hardening, system monitoring and validation. We also offer DNS Protect, which defends against internet-based threats on all servers, workstations and laptops on your network.



Free White Paper



Dispelling 5 IT Outsourcing Myths within Financial Institutions

Learn why five of the most commonly believed “facts” about IT outsourcing within community financial institutions are actually myths.



Dispelling 5 IT Outsourcing Myths within Financial Institutions



26 Feb 2015

Minding the Encryption Gap

Email technology presents a host of security concerns for financial institutions, many of which can be mitigated by implementing the proper controls. Virus and malware infection risks, for example, can be mitigated with email antivirus and spam filtering software to sniff out malicious attachments or phishing attempts. Legal or reputation risks related to employee misuse can be addressed by training users on acceptable email usage and appending email messages with a disclaimer message. However, one powerful security control designed to protect messages in transit has yet to become standard fare – email encryption.

The protocols that make modern email flow have remained largely unchanged since the early days of the Internet when the security of transmitted data was not a pressing concern. When you email a sensitive attachment to a coworker on the same mail server, there is likely little cause for worry; however, email messages to and from external parties must leave the protected space of your local network. By default, these email messages are transmitted in clear text, and are susceptible to interception, eavesdropping, or tampering while in transit. While the exposure of sensitive information is never good for any business, financial institutions face an added regulatory compliance risk if an intercepted message contains non-public customer information. While end-user training can limit the amount of sensitive data sent via email, it is not a guaranteed method of preventing the unintended disclosure of sensitive information. Bank security personnel should look toward a technology solution to fill this gap, and this is where email encryption comes into play.



Free White Paper



Dispelling 5 IT Outsourcing Myths within Financial Institutions

Learn why five of the most commonly believed “facts” about IT outsourcing within community financial institutions are actually myths.



Dispelling 5 IT Outsourcing Myths within Financial Institutions


Email encryption is almost synonymous with the Transport Layer Security (TLS) protocol. TLS was created to work alongside existing email protocols to protect messages as they traverse the wilds of the Internet. When using TLS encryption, the sender’s email server first encrypts the many individual data packets that make up an email message before transmitting them. Once the batch of packets reaches the relative safety of the recipient’s network, the receiving email server then unscrambles them using a decryption key before piecing them back together. While these encrypted packets of information can still be intercepted during the journey from sender to recipient, they are jumbled and useless to a malicious 3rd party without the proper decryption key.

In order for these secure communication sessions to work as intended, both the sending and receiving email servers must support and be configured to use TLS. So, even if you properly set up your system for TLS, there is no guarantee that your recipient’s email system can service secure communications. This potential mismatch in mail server capabilities is handled differently by different encryption solutions. Perhaps the least sophisticated way to jump this hurdle is to configure email servers and systems to use opportunistic TLS. Email systems using this method of encryption will always attempt to establish a secure channel for email communications; however, if the receiving mail system does not support TLS, then the sending system will opt to use traditional insecure delivery.

While opportunistic TLS is better than no encryption at all, this method of encryption does not provide the guaranteed security necessary for financial institutions. More robust encryption solutions close this opportunistic TLS security hole by delivering messages that are unable to be sent through secure channels to a secure portal site rather than the recipient’s email system. Instead, the recipient receives an informational email notifying them that a message is waiting for them to pick up. While there is a small hassle for the recipient to log into the SSL-secured website to collect their message, it maintains a consistent level of security.

Enabling TLS is a conscious decision, but it is not always an option. Many widely-used applications and devices have a built-in SMTP server, and can be configured to send email directly; unfortunately, many of these systems lack the sophistication to use TLS. Some common examples of such under-the-radar SMTP servers are SAN appliances that send performance and alerting information, backup software that sends backup status alerts, and standalone multifunction printing devices configured to email scanned documents. Multifunction printers in particular can be problematic. Loan packets or new account documents are goldmines of customer NPI, and if these are being sent across the Internet unencrypted, then they are at risk. For networks with an internal email solution, all email messages should be configured to flow through the internal mail server(s) to prevent any unintended email exposure. If a financial institution opts for a hosted or cloud-based email solution, they may face a trickier encryption gap.

White Paper Download

Driving Compliance Through Technology

Learn how automation and documentation can improve your financial
institution’s compliance posture



Get a Copy



Since you cannot simply stop scanning from your MFP altogether just because you use a hosted email solution, management and IT staff should make efforts to mitigate the risk of unintended exposure. Luckily, there are a few options to consider. First, older network scanning devices could be replaced with more modern equipment that supports TLS, but this is not a viable option for many institutions. If the device cannot be replaced, then investigate if the device can be configured for scanning to a network folder location in lieu of scan-to-email. Finally, if all else fails, consider adding a secure relay to your network. A secure relay is a TLS-capable hardware or software solution placed on the network that receives, encrypts, and forwards messages to the remote mail system. All devices, appliances, or software that are sending messages but are not TLS-capable must then be pointed toward the secure relay. Once properly configured, a secure relay may be the last piece necessary to finally plug the encryption gap.

It is important to note that auditors and examiners do not currently require email encryption; however, encryption is considered a security best practice for any network that needs to keep the contents of their email messages secure. Depending upon your policies, network, and email solution, setting up encryption may be as easy as enabling TLS on the Exchange server, or as complex as implementing a secure relay. To ensure consistent security, the financial institution should consider how their system will handle receiving email servers that are incapable of TLS. Regardless of your solution, you cannot achieve consistent and comprehensive email security without a full understanding of how email flows through your network. Financial institution IT staff should scour the network and compile a list of all devices and systems dispensing email to ensure that your email practices match your policies.