|By Yuri Frayman||
|September 21, 2016 05:00 PM EDT||
Financial Institutions are Vulnerable to Cyber Attack as the Increase in Technologies Improves
It is impossible to go outside and not notice banks offering consumers new ways to save, send, spend, and access their money at a bank. This trend-to ease access to funds – extends well beyond the retail banking sector and is equally prevalent among investment banks, private banks, hedge funds, mutual funds, ETFs and just about any financial institution, large or small. It is arguably the single most compelling commercial driver in the financial services sector. Financial institutions compete aggressively and continuously for dominance in this regard and technology is, in all cases, the single most important differentiator across institution, customer, and geography.
Unfortunately the introduction of nascent technologies to improve financial access is also accompanied by increased vulnerability to the very currency and associated details at the heart of the financial services industry. This is the cost of an increasingly open marketplace for financial services and a dynamic that is only further complicated by the growing array of devices and techniques customized for each device to engage in financial transactions. Fortunately there are technologies and strategies available that can be embedded within the security infrastructure of financial institutions to defensively and prospectively detect and eliminate threats, which vary in scope and nature.
General Scope of Threat
Financial institutions are ripe for cyber attacks because of the breadth of personal and business data embedded within their networks as well as financial information. An approximately 35-40% increase in cyber crime targeting the financial sector was recorded in 2015 and a staggering record 21 million fraud attacks and 45 million BOT attacks were detected in Q4 of 2015 alone. Q3 to Q4 BOT attacks increased tenfold and there is little reason to see this trend reversing course. The threat is neither one dimensional or lacking in sophistication – attacks are highly organized and are multi-channel in nature. BOTs and other complex attacks (e.g., malware) are structured to behave as authentic customers to circumvent traditional security defenses. The consequences and costs are severe: data loss and its wide-reaching proximate impact as well as direct financial losses that can easily reach billions of dollars for a single firm.
At Risk Sub-Sectors
The complex nature of financial institutions demands different technological approaches and structures for each sub-sector. This is also the inherent challenge in devising dynamic strategies to protect against cyber attacks across all vulnerability points of a firm or specific categories of firms. Mobile usage as well as online lending and alternative payment techniques are primary target areas with perceived weak security infrastructure. Part of this vulnerability comes from the speed of the transaction cycle, compared to traditional lending, but also due to the less traditional and smaller lenders that are enabled by online lending to issue loans and are less likely to have powerful security infrastructure on par with traditional lenders. Vulnerability from a single lender can create systemic vulnerabilities reaching beyond the lender itself. A weakness in a small lender can create a vulnerability that exposes a larger institution on the other side of the transaction.
Financial institutions involved in e-commerce are also soft targets for cyber attacks. Mobile transaction volume increased more than 200% between 2014 and 2015 and is estimated to maintain that growth trajectory as more mobile devices, with greater sophistication and applications tied to financial institutions, enter the e-commerce system. With multiple technologies and institutions collaborating to enable e-commerce, the complexion of any approach to cyber security must be multi-layered to enable businesses to detect and prevent various attacks such as malware, device spoofing, and mobile bot attacks.
Methods and Strategies
In an environment where the challenges are not static or one-dimensional, neither should the solution. Speed and comprehensiveness of a defense and response system is critical to effectiveness in minimizing risks and mitigating damages in the event of an attack. Unified risk assessment and threat prevention techniques must be core to a financial institution's cyber attack strategy. Financial institutions must recognize their central role in core financial services activity as well as e-commerce and mobile payment products. But how should financial institutions with disparate sizes, services, and, most importantly, balance sheets make decisions about cyber security? How can varied budget sizes be accounted for in maintaining consistently effective approaches to similar threats?
For large institutions the risks are too considerable and far-reaching to implement anything short of the most comprehensive systems available in the market. Speed, synchronization and uniformity should be paramount considerations and, fortunately, there are technologies available that accomplish these objectives while retaining a degree of malleability to adjust with evolving threats and risk points.
For smaller firms the solutions that are being implemented tend to be more patchwork (though even larger financial institutions have similar ‘band-aid' approaches). "Cyber-as-a-service" firms are increasingly common service providers for smaller and medium sized companies as well as concentrated on key risk areas through the utilization of dedicated computers for sensitive transactions, which can be monitored for unusual activity. These methods, while often effective defensively, lack the key elements of speed and comprehensiveness; they are reactionary in nature, but lack the embedded and dynamic technical characteristics to be prospective in their approach to risk.
In devising a cyber attack strategy financial institutions should be mindful of four dynamics:
- The role that the interconnected nature of the financial services industry, regardless of firm size and scope of services offered, plays in widening the scope of vulnerabilities outside the immediate ambit of a firm
- The value of an integrated and uniform solution to ensuring responsiveness across platforms and vulnerability points
- The importance of speed in detection and responsiveness to preventing attacks and mitigating damages
- The crucial role that comprehensive internal and external monitoring will play in anticipating unforeseen attacks that exploit vulnerabilities in newly introduced technologies
- Cloud Expo New York Speaker Profile: Dave Linthicum – Cloud Technology Partners
- Don’t forget to register for FOSE 2013
- Streamline Health® Engages KPMG as Its New Independent Registered Public Accountants
- Red Hat U.S. Public Sector Chief Technology Strategist to Speak at NC Datapolooza
- Best CIO Practices Shared from SHI’s Customers
- Cloud Business Solutions, Social Media, and Platform Systems of Engagement Market Shares, Strategies, and Forecasts, Worldwide, 2013 to 2019
- DEvOps and SDDC Among Top 10 Strategic Technology Trends for 2014
- Application Server Market
- Commander of U.S. Cyber Command and National Security Agency Director, General Keith Alexander, To Keynote Day One of Black Hat USA 2013
- Cloud Computing: Rethinking Control of IT