The OGO Blog

Remote Working Security Assessment For Credit Unions

In today’s world, remote work is not just a reality, but a necessity. Undoubtedly, allowing our employees to work remotely, especially in larger numbers, poses a greater risk for our credit union networks. If an attacker identifies an exploitable vulnerability in your remote working solution, they may be able to access corporate data such as…

Read More

Cybersecurity During Coronavirus Pandemic

A note from the OGO Cybersecurity office on scams and best practices during the coronavirus (COVID-19) pandemic.   While preparing for the pandemic in your area, we need to ensure security is still considered in all our activities. When allowing employees to work remotely, we should confirm that the security tools that we install will…

Read More

March 2020: Credit Union Cybersecurity Tip from the OGO CISO Office – Coronavirus phishing emails: How to protect against COVID-19 scams

The plethora of news coverage surrounding the new coronavirus has created a new danger — phishing attacks looking to exploit public fears about the virus. These phishing attacks are on the rise. Pandemics and health scares of this magnitude are a dream for malicious actors. Ongoing Operations recommends that you share a communication with your…

Read More

2019 Holiday Tips from the Cybersecurity Office

The holiday season offers shoppers some of the best online deals of the year and as consumers we spend more time shopping online. However, increased shopping comes with potential, increased risk to your online safety. In addition to a rise in online shopping during December, there is also an increased risk of falling victim to…

Read More

October 2019: Credit Union Cybersecurity Tip from the OGO CISO Office

Multi-Factor Authentication Today’s threat landscape for Credit Unions is increasingly complex.  Viruses, trojans, phishing, fraud, and social engineering are just a few of the threats that we have to account for daily.  In order to conduct business, we must provide employees, vendors and our customers access to our systems and critical data. How then in…

Read More