DEFENSESTORM

Cyber Security RESOURCES

Thought leadership and customer testimonials are some of the many ways we build a community of trust. These cyber security resources highlight our recent research and success stories.

Cyber security risk management solutions from DefenseStorm.
Black Friday and Cyber Monday: High Deals, Higher Cyber Risks

Threat Alerts

Black Friday and Cyber Monday: High Deals, Higher Cyber Risks

As the excitement of Black Friday and Cyber Monday draws shoppers in with unbeatable deals and discounts, it’s important to remember that the online shopping frenzy also brings increased cybersecurity risks.

Trapped by Fear: The Scam that Cost $300,000

Fraud Squad

Trapped by Fear: The Scam that Cost $300,000

Contrary to the common belief that fraud schemes are quick scams leading to minor losses, one woman was deceived into thinking she was a prime suspect in a money laundering operation for three long months. Fearing imprisonment or deportation, she became entangled in the deception and lost $300,000 before discovering it was a scam.

Remote Access Tools: Friend or Foe?

Insights

Remote Access Tools: Friend or Foe?

With the remote workforce not showing any signs of slowing down, many organizations are starting to evaluate and implement ways to access these systems through the usage of Remote Access Tools. While these tools provide an incredible amount of value to an organization to stay connected and retain access, Remote Access Tools are a significant attack vector in cybersecurity and are something that should not be taken lightly.

KnowBe4 Security Awareness and Training

Datasheets

KnowBe4 Security Awareness and Training

DefenseStorm provides KnowBe4 as an add-on service with the goal of improving security awareness among employees and, as a result, strengthening your human firewall. KB4 is the world’s largest integrated platform for security awareness training and simulated phishing. It addresses the critical threat of social engineering by educating employees on how to identify and respond to cybersecurity threats.

Online Brand Protection From Allure Security

Datasheets

Online Brand Protection From Allure Security

Strengthen your proactive cybersecurity, fraud prevention and threat visibility strategy using a layered, full cycle approach with DefenseStorm and Allure Security.

Election Scams: “URGENT – You Aren’t Registered to Vote”

Fraud Squad

Election Scams: “URGENT – You Aren’t Registered to Vote”

Election years are a critical moment for any democracy. Unfortunately, they are also prime opportunities for hackers and cybercriminals to exploit the heightened political atmosphere.  A voter registration verification scam is a common and deceptive tactic employed by cybercriminals. These scams specifically target individuals, tricking them into divulging sensitive personal information under the guise of verifying or updating their voter registration status.

Rodney Hood emphasizes the importance of enhancing risk management practices

Webinars & Videos

Rodney Hood emphasizes the importance of enhancing risk management practices

DefenseStorm Board member and former chairman of the NCUA, Rodney Hood emphasizes the importance of enhancing risk management practices for financial institutions, urging them to extend their risk disciplines to cybersecurity and information security. He highlights the necessity of conducting thorough risk assessments in-house, defining risk appetite, and establishing meaningful metrics to foster effective governance and prepare for evolving risks.

CISA Warns of Hurricane-Related Scams

Threat Alerts

CISA Warns of Hurricane-Related Scams

CISA is alerting the public to be cautious of potential cyber scams following hurricanes. After major natural disasters, fraudulent emails and social media messages—often containing harmful links or attachments—are common.

Cyber Risk Readiness Action Dashboard LIVE in GRID Active

Insights

Cyber Risk Readiness Action Dashboard LIVE in GRID Active

Announcing the NEW GRID Active Cyber Risk Readiness Action Dashboard.  The additions to DefenseStorm’s Cyber Security Risk Management platform delivers customers with an overview and actionable steps to stay ready against cyber attacks

Managing Risk with NIST Cybersecurity Frameworks 2.0

Webinars & Videos

Managing Risk with NIST Cybersecurity Frameworks 2.0

DefenseStorm’s Jessica Caballero takes an in-depth look at the updates made to NIST’s Cybersecurity Frameworks with the introduction of CSF 2.0. In this informative webinar, you’ll find out everything you need to know about the enhancements to the gold standard in cybersecurity frameworks and how CSF 2.0 will impact your institution.

This compelling webinar will covers:

  • Expanding critical infrastructure
  • The NEW core functions of cybersecurity risk
  • Mapping outcomes to your unique risk appetite
  • Incorporating cybersecurity into your ERM strategy
  • Implementing the new framework using NIST’s reference catalog and guidance data

Plus much more!

DefenseStorm Tabletops

Datasheets

DefenseStorm Tabletops

Tabletop exercises are valuable for financial institutions (FI) striving to maintain operational resilience and regulatory compliance. By regularly conducting them, FIs can ensure that they are well-prepared to navigate the complexities and uncertainties of the financial landscape. DefenseStorm Tabletops are simulation exercises used to test and improve the preparedness and response capabilities of an organization to various scenarios. 

Cybersecurity Assessment Tool (CAT) Sunset Announcement

Insights

Cybersecurity Assessment Tool (CAT) Sunset Announcement

The Federal Financial Institutions Examination Council (FFIEC) released important information surrounding the commonly used Cybersecurity Assessment Tool (CAT).

Georgia’s Own Credit Union

Case Studies

Georgia’s Own Credit Union

With over $4B in assets, Georgia’s Own Credit Union serves nearly 240,000 members across 37 offices. Georgia’s Own CU originally signed with DefenseStorm in 2021 and continues to work in partnership to maintain a robust cyber risk management program.

From Dream Home to Disaster: Business Email Compromise

Fraud Squad

From Dream Home to Disaster: Business Email Compromise

During the process of purchasing a house, newlyweds Lilah Jones and her husband were deceived into sending money to a scammer. The fraudster used the scam, Business Email Compromise (BEC), to pose as the title company. False wiring instructions were provided, leading the couple to transfer a $130,000 downpayment to a fraudulent account instead of the title company.

Peach State Bank and Trust Testimonial

Case Studies

Peach State Bank and Trust Testimonial

Peach State Bank and Trust has been a long-term, valued client of DefenseStorm since 2016, when the two companies first partnered. John Chapman, Information Security Officer at Peach State Bank and Trust sat with DefenseStorm during the 2023 Client Appreciation Event to discuss the importance of cybersecurity for their financial institution and the benefits of partnering with DefenseStorm.

Endpoint Detection and Response (EDR)

Datasheets

Endpoint Detection and Response (EDR)

Threat detection is the number one priority for cybersecurity teams. If you don’t see the bad actors in your network, you can’t respond appropriately. Learn how DefenseStorm EDR uses a mix of technology and expertise to continuously look for threats.

A Regional Bank in the Midwest Improves Cyber Risk Readiness with DefenseStorm

Case Studies

A Regional Bank in the Midwest Improves Cyber Risk Readiness with DefenseStorm

A regional bank in the Midwest was functioning with two prime challenges. First, they had various different systems with which they managed risk – from risk assessments in one platform to managing network detection tools in another to different platforms for endpoint antivirus. The second issue and what motivated them to begin seeking another cyber risk management solution was that their current vendor for managed detection and response had lost the “personal touch” they desired.

Members Credit Union

Case Studies

Members Credit Union

Members Credit Union was operating without enough visibility into their systems and did not have the bandwidth to efficiently keep up with the everyday process of cybersecurity monitoring and management. With a goal to find a vendor to support their smaller internal cyber team, Members CU sought a partnership in cyber risk management that could not only assist in monitoring but also provide 24/7/365 support.

Listerhill Testimonial

Case Studies

Listerhill Testimonial

Listerhill Credit Union is guided by core values that include prioritization of safety and soundness in cybersecurity. Listerhill CU’s VP of Network Administration and Information Security Officer sat for an interview with DefenseStorm during the 2023 Client Appreciation Event to express their confidence in the ability to rely on a partner like DefenseStorm.

Prevail Bank

Case Studies

Prevail Bank

Prevail Bank was operating with a SIEM that was very restricted in its functionality, only receiving logs from a few of the bank’s servers. Additionally, the bank was looking for a cyber risk management solution with greater visibility and improved monitoring for more efficient incident response.

What to Know about the NPD Breach

Threat Alerts

What to Know about the NPD Breach

In April 2024, a known threat actor calling themselves USDoD claimed to possess and sell approximately 2.9 billion records from National Public Data, which included individuals’ personal data from people in the US, UK, and Canada.

Imposter Scam: $740,000 in Retirement Savings Stolen

Fraud Squad

Imposter Scam: $740,000 in Retirement Savings Stolen

A common way scammers gain access to accounts is through imposter scams. This is where a fraudster poses as someone of authority to scam a victim and commit monetary theft. Fraudsters use psychological strategies, including isolation and instilling a sense of urgency, to take advantage of the trust and emotional vulnerability of their victims. This was just such a case when one senior citizen fell victim to an imposter scam that cost him $740,000 in retirement savings.

AT&T Unlawful Access of Customer Data Incident

Threat Alerts

AT&T Unlawful Access of Customer Data Incident

News is emerging about AT&T’s disclosure of what they term as ‘Unlawful Access of Customer Data.’  The majority of AT&T customer data was illegally downloaded from their workspace on a third-party cloud platform from May 2022 through October 31, 2022 and on January 2, 2023.

Cyber Risk Readiness in GRID Active

Insights

Cyber Risk Readiness in GRID Active

GRID Active now offers customer a view into their state of Cyber Risk Readiness and demonstrates the positive impact an integrated cyber risk management platform can have in managing cyber risk.

Evolve Bank and Trust Breach

Threat Alerts

Evolve Bank and Trust Breach

In late June 2024, LockBit cybercriminal group claimed responsibility for having breached a government agency with plans to release the stolen data. It was revealed that the group actually breached Evolve Bank and Trust.

GRID Active Reporting

Datasheets

GRID Active Reporting

GRID Active Reporting enables financial institutions to exercise informed decision-making through consistent metrics and ensures confidence in the execution of their cyber risk management program and strategic objectives.

“I Have Your Mom…”

Fraud Squad

“I Have Your Mom…”

What would you do if you got a frantic call from a loved one because they were in danger? Or what if an unknown caller told you that someone dear to your heart would be harmed if you didn’t comply, as the shrieks of a familiar voice begged for help in the background? Would you hang up, or would you pay up? While many people would say they wouldn’t fall for something like that, it’s becoming harder than ever to tell the difference between a scammer posing as a loved one and a genuine cry for help. And as quickly as it begins, it’s over, leaving you with emotional trauma and an empty bank account.

Risk Assessment and Governance Package

Datasheets

Risk Assessment and Governance Package

DefenseStorm offers the only built for banking cyber risk management  solution tailored to the unique needs of financial institutions while aligning risk management and governance.

Fraud Fusion Centers: The NEW Way to Stop Cyber Fraud

Insights

Fraud Fusion Centers: The NEW Way to Stop Cyber Fraud

With a resolute effort to unite against the threat of cyber fraud, Fraud Fusion Centers are being embraced across all industries to effectively combat cyber fraud.

Creating a Proactive Cybersecurity Risk Management Plan

Insights

Creating a Proactive Cybersecurity Risk Management Plan

Cybersecurity risk management is a critical component of risk for banks and credit unions and by taking a proactive approach to risk, you can identify, mitigate, and even prevent risk before it’s too late. Learn how DefenseStorm’s built for banking approach can help you tackle cybersecurity risk and keep your institution cyber risk ready.

1 2 3 5