Security Trends In The Financial Services

Security Trends In The Financial Services

Security Trends In The Financial Services

Readers who subscribe to our newsletter will have already read Fridays news about Microsoft’s latest report into key security trends in financial services. The report is part of a series which looks at security trends in cloud computing across four specific industries – financial services, healthcare, retail, and public sector.

Microsoft chose to focus on financial services as one of their key industries because of its scale and omnipresence across all areas of society and business. Financial services organisations handle trillions of transactions each year, and have huge amounts of sensitive data about individuals, companies, and other parties. Protecting that information is a critical component in building trust with customers.

The Problem

Several countries use regulatory bodies to try and force financial services firms to take greater responsibility for data protection. The UK’s regulatory body – the ‘Financial Services Authority’ (FSA) – uses its ‘Principles for Business’ to state that a firm must conduct its business with “due skill, care and diligence, while taking reasonable care to organise and control its affairs responsibly and effectively”. Across the Atlantic, the American government takes a similarly hard-line approach, using its Securities and Exchange Commission to force some financial services firms to have a disaster recovery plan as a fiduciary responsibility. Sadly, in many cases, either companies do not heed their government’s advice, or they do not have strict government guidelines to adhere to.

Microsoft’s report highlights several shortcomings in firm’s security measures. 38 percent of financial services firms do not have budgeted disaster recovery plans, 22 percent have no formal risk management program, 23 percent have inadequate policies for secure data disposal, 29 percent do not have a plan for responding to security breaches, 37 percent do not use standardised data classification – the list goes on.

The financial industry appears susceptible to what an FSA report termed ‘The Five Fallacies’. They believe there are five key misconceptions amongst companies that serious impact on their security; 1) a belief that the customer data they held was too limited or too fragmented to be of value to fraudsters, 2) a belief that only individuals with a high net worth are attractive to hackers, 3) a belief that that only large firms with millions of customers are likely to be targeted, 4) an assumption that threats to data security are exclusively from external sources, and 5) a belief their security systems are already adequate and fool-proof.

These misconceptions feed poor decision-making with regard to security issues. Some firms regard data security as the sole responsibility of IT staff, whereas others fail to recognise that data security is their responsibility. Some firms that do recognise the risk t rate it so low that it never attracts the attention of senior management, nor is it allocated adequate financial or human resources.

All this creates a problem, especially as these institutions are now starting to move into the cloud. As the uptake of cloud services increases, so does the vulnerability of a firm’s data. Yet, perhaps the cloud is also the answer to the problem? Perhaps it can in fact help solve some of the vulnerabilities?

Microsoft’s Recommendations

Microsoft believe that hiring a cloud service provider can help financial organisations improve their data security profile.

They claim that switching to the cloud can shift the burden of regulatory compliance and managing risk to the cloud provider. Experienced providers typically employ large teams of IT security and compliance experts who can manage their customers’ systems more efficiently and troubleshoot when something goes wrong.

Cloud service providers already offer several solutions to the current security issues posed in the report – for example, they conduct regular pre-hire and post-hire background checks on their employees, they classify data and other assets according to well-defined policies, they maintain a data backup and recovery framework that is consistent with industry practices, and they conduct regular risk assessments that evaluate threats to the confidentiality, integrity, and availability of data under their control.

The Future

Do you agree with Microsoft’s findings? Do you work in a financial services firm and have experienced poor security practices? Do you think the cloud is the answer? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…