Innovative Payments Association
  • About Us
    • Our Team
    • Board of Directors
    • Members
    • Partnerships
  • News & Events
    • Non-Member Newsletter
    • Newsroom
    • Events
    • Blog
    • Podcast
  • Member Resources
    • Glossaries & Reports
    • GRWG
    • Recordings
    • Government Update
    • State Legislative Tracker
    • Financial Crimes Investigators
  • Issues & Advocacy
    • Comment Letters
    • Payments Litigation
    • Current Issues >
      • Earned Wage Access
      • Fraud Prevention
      • Prepaid Rule
    • Ongoing Issues >
      • Arbitration
      • Artificial Intelligence
      • Banking as a Service
      • Brokered Deposits
      • CFPB
      • Covid Response
      • Durbin Amendment
      • FDIC & OCC
      • Privacy Legislation
      • Unclaimed Property
  • Join the IPA
    • IPA Wins
  • Boot Camp
Member Login   |   Join the IPA
Member Login   |   Join the IPA

Blog

Cybersecurity is as Much About Culture as Tech

5/20/2024

 
When companies think about cybersecurity, their first instinct is to think about what technology they have in place to stop hackers.

But technology is only half the picture, and it may not even be the most important half.

I have been attending the FBI Citizens Academy at the Bureau’s Cleveland Field Office. It is a program the FBI runs every year to explain its mission to the public. At a recent session, we heard from a cyber-squad leader who shared some of his experiences with responding to crimes.

He said that the companies that respond the best to attacks by hackers are those that have developed a good security culture within their organization. The reason is that will all of the devices, systems, and software that companies and their partners use, there is likely a technical exploit in the system. Additionally, cybercriminals have gotten increasingly sophisticated with their approaches to employees. While no one likes to think they can be tricked, the reality is everyone is susceptible.

So, what should companies do? Here are some high-level takeaways from the presentation that deal with both technical and cultural aspects.  While they are not a panacea, they can help companies think about how to improve their defenses.

Technical Defenses
  • Identify your most important digital assets and wrap them in layers of security. This offers the possibility of detecting an attack before it does severe damage.
  • Keep software up to date. Apply patches as soon as possible. (If you can’t update software immediately or need to run tests, then increase monitoring of the exposed areas.)
  • You are a risk to everyone you deal with, and they are a risk to you, so make security standards part of your contracting process with vendors.
Cultural Defenses
  • Train Your Employees – Let them know what phishing e-mails look like and create ways for them to verify requests that don’t rely on a potentially hacked system.
  • Eliminate Blame and Shame – Time is of the essence when a cyber attack occurs, you want to encourage people to report problems early, even if they were the one who clicked on a link they shouldn’t have.
  • Have a Plan – Know what you are going to do and who is responsible for what part of the response. Hacks are not just an IT problem, you will need to communicate and take action with customers, vendors, law enforcement, and internally. Are you ready for all the implications of the attack.
    • Practice – Run tabletop exercises so that people are ready when and if something happens. This can also help you find things you may have missed in initial planning.
    • Build Resiliency – Learn from your plan and practices and make adjustments.
  • Share Knowledge in Your Industry – Sharing knowledge and intelligence helps everyone defend themselves. We know that criminals work together, so the industry needs to as well. Sometimes this means working with your competitors, but it is better to help a legitimate competitor by talking than a cybercriminal by staying quiet. The IPA hosts regular calls with fraud prevention teams to encourage intelligence sharing.

Work with Law Enforcement
  • Report Attacks – If you have been hacked, let the FBI know. In some cases, they can help companies mitigate attacks and recover stolen funds.
  • Preserve Evidence – If you have intrusion and access logs or other data, use that. It can help identify and catch criminals.
  • Understand the FBI’s Role – They will not share data, publicize the breach, or seize your servers.
 
The only thing that can eliminate all cyber threats is going completely off the grid. Since that is not an option in our modern society, we all need to develop best practices to increase our security. Following the above steps can give any company a good state.

More resources can be found at:
  • Cybersecurity and Infrastructure Security Agency: Resources and Tools
  • FBI Cyber Crime 
  • Internet Crime Complaint Center

Comments are closed.

    Archives

    June 2025
    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    December 2024
    November 2024
    October 2024
    September 2024
    August 2024
    July 2024
    June 2024
    May 2024
    April 2024
    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018

    Categories

    All
    Member Profiles
    News
    Podcast
    Power Of Prepaid
    Prepaid
    Small Business
    Webinar

    RSS Feed

Contact Us   |   Member Resources

IPA

110 Chestnut Ridge Rd, Suite 111
Montvale, NJ 07645
(202) 548-7200
Save The Date 
Innovative Payments Conference​
April 29 - May 1, 2026 

IPA Info

Home
​​About Us
Advocacy
Newsroom​
Contact Us

IPA Resources

IPA News & Events
Payments Podcast
Blog​
​Events


Safe Shopping
Consumer Resources if You've Been Scammed
© COPYRIGHT 2025 ALL RIGHTS RESERVED. | Privacy Policy
  • About Us
    • Our Team
    • Board of Directors
    • Members
    • Partnerships
  • News & Events
    • Non-Member Newsletter
    • Newsroom
    • Events
    • Blog
    • Podcast
  • Member Resources
    • Glossaries & Reports
    • GRWG
    • Recordings
    • Government Update
    • State Legislative Tracker
    • Financial Crimes Investigators
  • Issues & Advocacy
    • Comment Letters
    • Payments Litigation
    • Current Issues >
      • Earned Wage Access
      • Fraud Prevention
      • Prepaid Rule
    • Ongoing Issues >
      • Arbitration
      • Artificial Intelligence
      • Banking as a Service
      • Brokered Deposits
      • CFPB
      • Covid Response
      • Durbin Amendment
      • FDIC & OCC
      • Privacy Legislation
      • Unclaimed Property
  • Join the IPA
    • IPA Wins
  • Boot Camp