One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2210442
Date de publication 2021-01-18 11:00:00 (vue: 2021-01-18 12:05:31)
Titre 5 New cybersecurity threats and challenges facing the financial services sector
Texte This blog was written by an independent guest blogger. It’s been a mixed year for the financial services sector. Some companies have seen increased demand for their services, while others have struggled to deal with the downturn in mortgage deals and reduced consumer spending.  At a more granular level, many financial services companies have also had to deal with new ways of work, including putting in place virtual CISOs and scrambling to protect remote workers from increased levels of cyber threats. It’s worth recognizing, however, that very few of the threats that remote employees face are completely new. In fact, most of the challenges facing the sector – and particularly the increased complexity of supply chains and consumer networks – have been around for at least a decade.  Still, as 2020 draws to a close, it’s a good moment to cast an eye over the threat landscape that financial services companies find themselves in, and to highlight the key challenges on the road ahead. In this article, we’ll do just that. 1. Misinformation and trust This year saw several newspapers in the US, including The New York Times, launch new initiatives to track viral misinformation. While most of this misinformation was focused on ostensibly political opponents, it also appears to have had an effect on confidence in financial services.  Not only is this a business challenge for established financial services companies, it also creates real cybersecurity challenges for them. One of these is... 2. Complex supply chains Perhaps the biggest of these challenges is the fact that the increasing complexity of the financial services sector offers a larger attack surface for hackers and malware.  Customers are increasingly keen to manage their finances via an interconnected network of traditional banking tools and novel accountancy apps. Any personal accounting software consumers use to track their finances should come PCI DSS compliant to ensure that their financial data is stored encrypted in a secured environment, and thus reduce the odds of them falling victim to a cyberattack. This approach might provide added convenience and security for businesses and consumers alike, but it’s also not enough. To be more specific, financial services organizations will need to focus on protecting remote endpoints in order to deal with the increased number of potentially exposed endpoints. This includes developing inventories of assets and software, running patch detection and vulnerability scannings to locate issues, and then an automated remediation validation phase to ensure that any patches or configuration changes used to fix the vulnerability were effective. 3. Credential and identity theft Though the financial services sector has had to deal with the consequences of identity theft for years now, 2020 was the year that identity and credential theft exploded. Early analyses show that during the pandemic, the rate of identity theft increased significantly. This increase has come despite increased consumer awareness of the risks of identity theft, and shows that awareness of these dangers is not enough. Consumers know that they should be careful to protect their data, but also lack the expert knowledge necessary to protect every aspect of their online lives. For the financial services sector, this
Envoyé Oui
Condensat 2020 about access accountancy accounting across added additional adoption agile ahead alike all already also always analyses another any appears approach apps are around article aspect assets assistance attack attackers attacks attention automated awareness bad banking based becoming been before being beyond biggest biometric blog blogger blue both business businesses but can capabilities careful cast chains challenge challenges changes cisos clear close combat combating come comes committing companies completely complex complexity compliant concern conclusion  confidence configuration consequences constant consumer consumers continue convenience cooperation course creates credential credit crimes current customer customers customers’ cyber cyberattack cyberattacks cybersecurity cyberthreats dangers data deal deals decade deep demand department despite detection developing directly downturn draws dss during early effect effective election emerge emergence emergency emerging employees encrypted encryption endpoints engineers enough ensure environment established every example expert exploded exposed eye face facing fact fake falling far federal finally finances financial find firm fix focus focused fool formed from generation gives good government granular great greater group guest hackers had has have highlight however hurts identify identity immediate implementation implemented includes including increase increased increasing increasingly independent indicates information initiatives instead interconnected inventories issues it’s just keen key know knowledge lack landscape larger lately launch least level levels likely lives locate loss malware manage many might misinformation mixed mobile moment more mortgage most necessary necessitates need network networks new news newspapers next not novel now number obsolete odds offer offers one online only opponents opportunity order organizations ostensibly others out over pandemic part particular particularly past patch patches paying pci perennial perhaps permit personal phase phishing place political posed potentially prerequisite presents previously privacy problem produce programs prominence promoting protect protecting protection provide public putting ransomware rate real realized really recently recognizing reduce reduced relied remediation remote repair restoration rise risks road running saint saw scale scannings scrambling second sector secured security seeing seen selling seriously services several should show shows significantly similarly sky sms software some sometimes sophisticated specific specifically speculation speed spending stay stealing stored strong struggle struggled struggling success successful such supply support surface systems take taking technologies technologies  technology than theft them themselves then these thieves though thought threat threats thus times tools track traditional trend trends trust two type unprecedented use used validation vectors very victim videos vigilance vigilant viral virtual vulnerability way ways we’ll we’ve welcome when which widespread will willing work workers worth written year years york
Tags Ransomware Vulnerability Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: