GUEST BLOG: Suspicious Incidents and Behavior
Posted by Vickey Morris, SCMS, CCUE, CUDE, Unknown, Unknown on 10/16/2017

The following information has been provided to Cornerstone Credit Union League for Cyber Security Awareness Month, and is used with permission from the National Credit Union Information Sharing and Analysis Organization (NCU-ISAO), whose mission is to advance credit union-specific cyber resilience in a strategic and collaborative partnership.

October is National Cyber Security Awareness Month (NCSAM).  The National Credit Union ISAO will be sharing information and resources regarding important security topics, and encourages members to do the same. 

Being aware of signs of physical threats and potential indicators of cyber-attacks is an important step in early identification and/or prevention of incidents that can impact businesses, individuals, or the public.

Employees should be aware of company policies pertaining to reporting threats, and follow appropriate protocols as outlined in the organization’s security policies.

Companies should also make it easy for employees to report suspicious behavior and incidents by considering the following:

  • Human Resources providing and avenue to report suspected insider threats and suspicious behavior around the workplace.
  • Information Security Teams providing resources to report suspected cyber threats such as a “report phishing” button in email clients, and the use of a centralized shared mailbox (e.g. report-threats@yourcompany[.]org).

The Department of Homeland Security (DHS) offers these signs for identifying potential cyber incidents[1][4]:

  • Suspicious emails requesting information or containing suspicious attachments.
  • System failures or disruptions such as websites being down or credentials being denied.
  • Unauthorized changes, access, additions, or users to systems and configurations.
  • Suspicious questioning by individuals regarding systems, access types, networks, etc.

Additionally, DHS lists these signs for identifying behaviors that may lead to physical security breaches or other dangerous events[2][5]:

  • Observing suspicious persons around facilities, or lines of questioning regarding the workplace or personnel.
  • Stockpiling of supplies such as key cards, uniforms, badges, or potentially dangerous materials on or around the workplace.
  • Unauthorized assets deployed near company facilities .
  • Surveillance or potential “dry runs” around important facilities, or even public venues.

The additional attached resources can be printed and posted at the workplace as a reminder of what to look for and how to report cyber incidents and suspicious behavior.  These documents also contain contact information related to reporting crimes:

Report Suspicious Behavior Poster

Report Cyber Incidents Poster

Protect Your Workplace Brochure



  4. Department of Homeland Security. (n.d.). PYW - Report Cyber Incidents Poster [PDF].
  5. Department of Homeland Security. (n.d.). PYW – Report Suspicious Behavior Poster [PDF].


Categories: Compliance, Technology Consulting & Compliance
Post a Comment
Email: (Email will not be published.)
Subscribe to the Blog

Categories & Archives
Category Filter

Author Filter




Connect: FacebookTwitter©  Credit Union Resources, Inc. All rights reserved.


Contact Us
6801 Parkwood Blvd.
Suite 300
Plano, Texas 75024
Phone: (469) 385-6400
Toll Free: (800) 442-5762
Online Form