In This Article
In Part 1, we broke down how IT complexity silently drains mortgage operations. Tool sprawl. Manual data transfers. Compliance gaps from inconsistent records. MBA data from Q3 2025 puts the average cost to originate a mortgage at $11,109 per loan — 42% above the historical average since 2008 — and fragmented IT environments are a major contributor.
This is Part 2. Here, we walk through what fixing that complexity looks like in practice, with a real case study, concrete steps, and a 90-day timeline you can follow.
Quick Recap: Where Complexity Hides
Three costs compound when mortgage IT systems don't talk to each other:
- Labor waste: 70% of lending professionals spend 20+ hours per week navigating disconnected platforms
- Maintenance drag: Custom integrations break with every vendor update, pulling IT staff away from security and strategic work
- Compliance exposure: Inconsistent data across LOS, CRM, and document systems creates audit risk under GLBA and the FTC Safeguards Rule
What Changed in 2025-2026
The FFIEC officially sunset its Cybersecurity Assessment Tool (CAT) on August 31, 2025. Financial institutions must now use NIST CSF 2.0, CRI Profile, or CIS Controls for maturity assessments. If your security posture still depends on fragmented tools without a unified framework mapping, the gap just got harder to explain to examiners.
The 2025 WEF Global Cybersecurity Outlook found that 54% of large organizations cite supply chain and vendor complexity as their biggest barrier to cyber resilience. For mortgage companies juggling a dozen platforms, that finding hits close to home.
Case Study: From Fragmented to Centralized
A mid-size mortgage company with over 1,000 user accounts and nearly 2,000 managed devices came to Mortgage Workspace after a costly incident. On paper, their IT looked robust: multiple security tools, endpoint protection on most devices, MFA turned on for most accounts.
The gaps told a different story:
- 200+ devices running outdated operating systems
- 15% of accounts with incomplete MFA enrollment
- Dozens of stale accounts still active months after employees left
- No single view of security posture across the organization
Their CFO clicked a phishing email on one of those unpatched devices. Attackers stole an MFA token and accessed the company's financial systems.
Wire transfers exceeding $1 million were initiated before anyone noticed. This wasn't a failure of any single tool — it was a failure of complexity. Too many disconnected systems, too many gaps between them, and too few people with visibility into all of it.
This pattern is not unusual. The OCC disclosed in April 2025 that a single compromised admin account in its on-premises Exchange environment exposed approximately 150,000 sensitive emails from 103 executive and examiner accounts — and went undetected for 20 months. When fragmented systems lack centralized monitoring, breaches have time to compound.
How Would Your Tenant Hold Up?
The case study above started with a single unpatched device. A 15-minute security assessment shows you exactly where your gaps are before attackers find them.
Get Your Security Grade Talk to an ABT Security ArchitectBuilding Transparency Into IT Operations
After the incident, we helped this company rebuild with a different approach. Instead of adding more tools, we connected the ones they already had.
The first step was consolidation:
Before: Fragmented Stack
- 5 separate security dashboards
- Manual MFA enrollment tracking
- No automated stale account cleanup
- Patch status unknown across endpoints
- Secure Score in the low 30s
After: Centralized on M365
- Microsoft Defender as single pane of glass
- Conditional Access enforcing MFA on every login
- Automated account lifecycle (30-day flag, 60-day disable)
- Intune enforcing device compliance
- Secure Score above 80 within 90 days
The Secure Score jump was measurable, but it wasn't the point. The point was that leadership could now see their security posture in one place, updated daily, without asking IT to run manual reports.
Microsoft reported blocking 7,000 password attacks per second in 2024 — more than double the rate from 2023. Organizations relying on fragmented identity systems are the ones those attacks succeed against.
Accountability Through Automated Reporting
Visibility without accountability changes nothing. The second step was building automated reporting that made security everyone's responsibility.
The system generates weekly reports showing:
- Device compliance rates by department
- MFA enrollment gaps with named accounts
- Patch status across all endpoints
- Sign-in anomalies that need investigation
These reports go to IT, department heads, and executive leadership. When the VP of Sales sees that 3 loan officers have MFA gaps, they follow up directly. IT doesn't carry the accountability alone anymore.
The NCUA's 2026 Supervisory Priorities explicitly fold cybersecurity into operational risk management, requiring examiners to assess "effective governance, risk assessments, vendor management, and security frameworks" for payment systems and member data protection.
Automated reporting proves those capabilities exist without consuming IT hours to produce the evidence. When an examiner asks for your vendor management documentation, pulling a weekly report beats scrambling to build one from five different dashboards.
How Guardian Security Insights Fits
Guardian Security Insights is the platform that makes this centralization practical for mortgage companies. It's not another security tool to add to the stack — it's an orchestration layer that pulls data from your existing Microsoft 365 environment and presents it in one place.
Nightly Assessments
Automated security posture scans of your M365 tenant — every night, no manual effort required
Action-Prioritized Dashboards
Surface what needs attention first, so your team fixes the highest-risk gaps before examiners find them
Trend Tracking
Leadership sees whether security is improving or drifting — week over week, month over month
Compliance-Ready Reports
Pre-formatted evidence mapping to GLBA, FTC Safeguards Rule, FFIEC frameworks, and NCUA requirements
Key Takeaway
Think of Guardian Security Insights like the business intelligence tools your operations team uses to track loan pipelines. Those tools don't just show data — they surface trends, flag problems, and prioritize action. Guardian applies that same approach to your cybersecurity posture.
Your 90-Day Action Plan
You don't need a year-long project to start reducing IT complexity. Here's a practical timeline based on what we've seen work across hundreds of financial institutions:
Days 1-30: Inventory tools, map data flows, baseline Secure Score, document gaps
Days 31-60: Entra ID + Conditional Access, Intune enrollment, stale account cleanup
Days 61-90: Deploy automated reporting, weekly compliance dashboards, measurable targets
Days 1-30: Audit and Baseline
- Inventory every tool, platform, and integration in your environment
- Map data flows between systems — identify every manual transfer point
- Run a Microsoft Secure Score assessment to establish your baseline
- Document stale accounts, unmanaged devices, and MFA gaps
Days 31-60: Consolidate and Connect
- Migrate identity management to Microsoft Entra ID with Conditional Access
- Enroll all devices in Intune for compliance enforcement
- Disable stale accounts and establish automated lifecycle policies
- Connect core systems through managed APIs — including your LOS, CRM, and document management platforms
Days 61-90: Automate and Report
- Deploy automated security reporting to leadership
- Establish weekly compliance dashboards with Guardian Security Insights
- Set measurable targets for Secure Score, device compliance, and MFA coverage
- Review progress with your managed service provider
MBA data shows origination costs hit $11,109 per loan in Q3 2025 — 42% above the long-term average. Lenders who invest in integration and automation capture savings that fragmented operations leave on the table.
Start Your 90-Day Simplification Plan
The mortgage company in this case study went from a Secure Score in the 30s to above 80 in 90 days. Here's what that engagement includes:
- Full environment audit with Secure Score baseline
- Identity consolidation roadmap (Entra ID + Conditional Access)
- Guardian Security Insights deployment for automated compliance reporting
- 90-day progress tracking with weekly executive dashboards
Frequently Asked Questions
Guardian Security Insights is an orchestration platform from Access Business Technologies that consolidates cybersecurity data from your Microsoft 365 environment into a single dashboard. It runs nightly automated assessments, tracks security trends over time, and generates compliance-ready reports aligned with GLBA, FTC Safeguards Rule, and FFIEC requirements.
A structured 90-day plan produces measurable results. The first 30 days focus on auditing your current environment and establishing baselines. Days 31 through 60 address identity consolidation, device compliance, and core system connections. The final 30 days deploy automated reporting and establish ongoing monitoring.
Microsoft Entra ID manages identity and access with Conditional Access policies. Microsoft Intune enforces device compliance across all endpoints. Microsoft Defender centralizes threat detection and response. Microsoft Purview handles data governance and compliance. Together, these tools replace multiple disconnected security products.
Automated reporting generates weekly or daily security posture summaries without requiring manual IT effort. Reports cover device compliance rates, MFA enrollment, patch status, and sign-in anomalies. These reports provide audit-ready evidence for GLBA, FTC Safeguards Rule, and FFIEC examinations while distributing accountability beyond the IT team.
The FFIEC officially sunset its Cybersecurity Assessment Tool on August 31, 2025. Financial institutions must now adopt alternative frameworks such as NIST CSF 2.0, CRI Profile, or CIS Controls for cybersecurity maturity assessments. There is no single mandated replacement, so institutions choose the framework that best fits their size and complexity.
Justin Kirsch
CEO, Access Business Technologies
Justin Kirsch has managed cybersecurity and IT consolidation projects for hundreds of financial institutions during his 25+ years in the industry. Before founding ABT in 1999, he built and led a large IT organization at a national mortgage servicing corporation — an experience that taught him how quickly fragmented systems turn manageable risks into costly incidents.