IT/Cyber Security Training - GLB Safeguarding
Indisputably, cybersecurity remains the single greatest compliance risk for mortgage lenders and brokers today. Hackers and ID thieves have realized that mortgage loan files hold a goldmine of financial information, and smaller, less hardened firms represent a "soft target." The liability for mortgage firms includes regulatory censure, legal action, restitution and fines.
All employees must receive annual training to achieve awareness of the threats in all forms that companies face everyday. Employees are the front line of defense against phishing and wire transfer schemes. In addition, protecting the physical plant, and ensuring all business partners participate to the same degree, also offer defense against attacks.
All employees must receive annual training to achieve awareness of the threats in all forms that companies face everyday. Employees are the front line of defense against phishing and wire transfer schemes. In addition, protecting the physical plant, and ensuring all business partners participate to the same degree, also offer defense against attacks.
Lesson 1 - Anti-Phishing Training
Once you have watched this course, please make sure you print and retain the last page. Then, proceed to the Anti-phishing Quiz to validate your training.
Lesson 2 - Accessing Public WiFi
Lesson 3 - Cyber/IT Security
While this course was written for bank directors, the information applies to the lending and financial services industry as a whole. If you are a compliance manager you MUST take this course. If you are an employee, it is not required, as long as you can pass the exam.
NOTE: Compliance managers must have significantly more training than employees in these matters. As with all compliance training, retain records of ALL completed training.
NOTE: Compliance managers must have significantly more training than employees in these matters. As with all compliance training, retain records of ALL completed training.
Lesson 3, Part 2 - Information Technology
Lesson 4 - Data Breach
What do you do if there is a breach? Best practices, as endorsed by the Federal Trade Commission, are addressed here.
Step 2 - Complete IT/Cyber Security and ID Theft Red Flags Training Quiz
Upon completing the courses, and the anti-phishing quiz, commence to take the completion exam below. REMEMBER, you MUST retain your own completion certificate and provide it to your compliance manager, as well as retain it for your own records.