JHA_HeaderImage_Blog_v2.png

Tammy Bangs

Tammy Bangs celebrated 14 years with JHA in 2015 and has 10 years of community banking experience. She has been hosting Educational Risk Mitigation Seminars for FI’s from coast to coast encouraging community bankers to engage in conversations with their peer banks and vendors about how best to mitigate risks within their own institutions.

Recent Posts

To Pay Or Not to Pay… And Then What?

Posted by Tammy Bangs

May 31, 2017 11:55:00 AM

 

I’ve been getting a lot of questions recently about the meaning of Cyber Resiliency.

What is Cyber Resiliency?

Wikipedia’s definition: “Cyber Resilience refers to an entity's ability to continuously deliver the intended outcome despite adverse cyber events.” In other words, it’s a migration from the strategy of protection by prevention only – into a posture of proactive readiness to address a cyber security breach or hack on every level, when it occurs, in a manner that is much less reactive than previously deemed acceptable. It’s not if you experience a breach … it’s when.

Identifying the steps that are necessary to recover and resume your business operations once a breach occurs is absolutely critical for your FI. Having rehearsed those steps, answered the myriad of questions, and identified multitudes of “what ifs” is a huge part of what could equate to your successful recovery from such an incident. If you fail to plan, you plan to fail. This is never as true as in the incident of recovery from some kind of catastrophe – cyber or otherwise. As the rate of malware infections rise exponentially, and the rate of ransomware reaches an all-time high, we understand the duty you have to protect your customers’ information and to resume your operations as swiftly and efficiently as possible after the event.

Read More

Topics: Cybersecurity, Data Management

Storing Data in a Mountain… So What?

Posted by Tammy Bangs

Nov 30, 2016 11:15:00 AM

It’s no secret that pirate folklore included countless tales of buried treasure. One famous pirate, Captain William Kidd, was even noted as having buried his loot off the coast of Long Island because to him, the safest place to store what was most important to him was under the ground.

Today, the same principle is being applied to many financial institutions around the world (in a more positive light this time around). Many banks and credit unions rely on their data so much that a crucial malfunction resulting in the loss of that data would be devastating to both the financial institution and their customers. In an effort to preserve their data, these FIs have opted to bury their information underground … literally!

Read More

Topics: Risk Mitigation, Data Management

Social Engineering, Phishing, Vishing: 3 Common Elements & How to Combat Them

Posted by Tammy Bangs

Aug 11, 2015 12:59:49 PM

 

 

Phishing and social engineering accounted for 15 percent of cyber-crime costs incurred by U.S. companies in 2014, according to Statista.comFurthermore, 44% of U.S. companies responding to a recent survey stated that they were targets of social engineering or phishing schemes (Statista).

Social engineering, phishing and vishing are everywhere you look these days.  Fake IRS telephone scammers, recent large financial institution (FI) breaches via email scams, penetration testing failures, executive level breaches, you name it – it has happened. 

Have you been lucky enough to receive a telephone call from the ‘Department of the IRS’ this year?  No?  I actually received two. Being the risk mitigation geek that I am, I couldn’t resist baiting the fraudster just a bit, asking as many questions as I could muster, keeping him on the line with me for as long as possible.  It was a fascinating glimpse into the not-so-sexy world of the vishing scheme. They were probably armed with little more than a search engine and a telephone. They didn’t even know enough about the Internal Revenue Service to use proper nomenclature. 

Read More

Topics: Risk Mitigation, Cybersecurity

Subscribe to Email Updates

Untitled Document Untitled Document

Recent Posts