Author Archives: Darla Liebl

How AI-Powered Automation Can Streamline Bank IT Security

woman typing into ai chat

In the banking sector, your information security is a pillar of trust, stability, and regulatory compliance. The Federal Financial Institutions Examination Council (FFIEC) has long established that a bank’s security program is “essential to the overall safety and soundness of an institution.” As cyber threats become more sophisticated and relentless, banks are turning to AI-powered […]

Creating IT Security Policies That Satisfy Bank Examiners

bank employee looking at computer and taking notes in notebook for it security policies

Bank examiners arrive with clipboards, spreadsheets, and a thorough understanding of regulatory expectations. When they review your IT security policies, they’re not just checking boxes—they’re evaluating whether your institution has a comprehensive framework that protects customer data and maintains operational resilience. IT security policies are the foundation of your bank’s cybersecurity posture. These documents define […]

How to Harden Microsoft 365 for Maximum Security in Financial Institutions

bank employee typing on computer

For community banks, Microsoft 365 is a powerful tool for productivity. But with great power comes great responsibility. Financial institutions are prime targets for cyberattacks, and a default Microsoft 365 setup leaves too many doors open for malicious actors. It’s not enough to simply use these tools; you must actively secure them. This process is […]

Budgeting for Rising Security Costs: A Practical Guide for Banks in 2026

close up of hands using laptop and smartphone with banking symbols

Banking security budgets are under unprecedented pressure. What was once a manageable line item has transformed into one of the most significant operational expenses for community banks nationwide. Does it feel that way for your bank? You may be worried about how much is too much (or too little), and how to allocate it. 70% […]

What Are vCTO Services and How Can They Help Your Bank Compete?

online meeting with vCTO

Running a community bank means juggling countless priorities. You need to keep customer data secure, pass regulatory exams, adopt new technology, and stay competitive—all while managing a lean team and a realistic budget. For many institutions, hiring a full-time Chief Technology Officer simply isn’t feasible. The salary alone can strain resources, and finding someone with […]

How to Identify and Eliminate Shadow IT in Your Bank

woman using laptop with shadow IT

What if your employees are using software and tools that your IT department knows nothing about? It happens more often than you might think. Well-intentioned team members, trying to be more efficient, often turn to unapproved applications and cloud services to get their jobs done faster. This phenomenon, known as shadow IT, opens your bank […]

What Are the Key Responsibilities of the ISO, CIO, and IT Admin in Your Bank?

information security officer

In community banking, clarity around IT and security roles isn’t just good practice—it’s a regulatory expectation. Federal examiners emphasize the separation of duties and accountability to minimize risk and ensure no single person holds unchecked power over critical systems. Without defined roles, banks risk security breaches, compliance issues, and business disruptions. That’s why it’s essential […]

Where, When, and How Banks Should Be Using Encryption

data-encryption-in-banks

Customers entrust their banks with their life savings, personal identities, and sensitive transaction data. One of the powerful tools banks have to protect this trust is data encryption. At its core, encryption transforms readable information (plaintext) into an unreadable format (ciphertext) using cryptographic keys. Only authorized parties with the correct key can reverse the process. […]

How to Detect and Stop Malware Before It Compromises Your Bank

malware-detection-in-banks

Malware—short for malicious software—is exactly what it sounds like: software designed to infiltrate, damage, or gain unauthorized access to systems. While malware comes in many forms (viruses, trojans, ransomware, spyware), its goal is the same: to compromise security, steal information, or disrupt operations. In our digital-first world, malware detection and mitigation are more critical than […]

Cybersecurity Case Study Angelina Savings Bank

Cybersecurity Case Study Angelina Savings Bank This small, home town bank in Texas experienced dramatic improvements to its cybersecurity environment within five months of installing RESULTS new cybersecurity tool, INVICTA. Prior Environment & Challenges Angelina Savings Bank relied on annual external IT audits to conduct internal vulnerability assessments and IT security reviews. Although they had […]