Now that we have closed the books on 2020 - let's take a few minutes to review the most popular blogs that we posted in the past year. Catch up on any you missed!
1. Zoom: Is it Safe?
We've all likely heard of or used Zoom in some way over the last few months. But, is it safe to use at work? How about at home? Learn more about the security risks of using Zoom, what the company is doing to become more secure, and tips for using Zoom securely.
Read the original post.
A lot happened in 2020, and almost no story rode the rollercoaster like the story of Zoom's security issues and updates. Read the most current information on this topic: Update - Zoom: Is it Safe?
2. 7 Steps to Building an Incident Response Playbook
Walk through the 7 steps to creating an Incident Response Playbook tailored to your organization. A playbook allows you to document ways to mitigate the most risk regarding the riskiest Incident Response threats to your organization. Identifying relevant threats that could be extremely impactful to your network and creating walkthrough scenarios on how to counteract those threats helps your Business Continuity and Incident Response teams focus on what needs to be addressed first.
Read the blog.
3. Top 5 Most Common Incident Response Scenarios
Whether it is phishing, malicious network scanning, or ransomware, cyber incidents can be overwhelming experiences. To help you be more prepared, let's discuss the five most common Incident Response scenarios, as well as how to protect, detect, and respond to each one.
Read the blog.
4. Coronavirus: Time to Dust Off the Pandemic Preparedness Plan
With the introduction of the Novel Coronavirus, it’s a good idea to break that Pandemic Preparedness Plan out and update that document for 2020 going forward.
Read the blog.
5. Advisory: Core Processor Finastra Services Disrupted by Breach
On Friday, March 20, 2020 Finastra notified its customers of a security incident that is currently impacting its customers.
Read the blog.
6. Threat Advisory: New Phishing Technique
SBS CyberSecurity is aware of a new style of phishing email that uses an initial link in an email to a legitimate website, pointing to user-editable content which contains the malicious link. Most of these emails are getting by filters because the initial link is to a reputable site.
Read the blog.
7. Threat Advisory: SolarWinds Orion
Our DFIR team has been collecting data from the security community at large about the SolarWinds Orion and UNC2452 supply chain compromise, and we’re bringing it to you as a source of information and guidance.
Read the blog.
8. FFIEC Releases New Cloud Computing Security Guidance
The FFIEC’s Security in a Cloud Computing Environment Joint Statement addresses the use of cloud computing services and security risk management principles for the safe and sound use of cloud computing services. Security breaches involving cloud computing services highlight the importance of sound security controls and management’s understanding of the shared responsibilities between cloud service providers and their financial institution clients.
Read the blog.
9. Six Controls to Dramatically Reduce Cyber Risk of Incidents
Get the answer to one of our most asked questions: "What is your single biggest suggestion for everyone to better prepare for a cybersecurity issue/incident?"
Read the blog.
10. Mitigating the Risk of Remote Work
Today, an unprecedented percentage of the workforce is working remotely in an attempt to help slow the spread of COVID-19 in communities across the country. One question everyone should be asking is how to ensure business continues as usual – but in as secure a way as possible.
Read the blog.
Hacker Hour webinars are a series of free webinars hosted by SBS CyberSecurity. Unlike paid webinars, Hacker Hours are aimed to meet on a monthly basis to discuss cybersecurity issues and trends in an open format. Attendees are encouraged to join the conversation and get their questions answered. SBS will also offer products and services to help financial institutions with these specific issues.