Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Top Stories > Cyber security breaches prompt financial services to reassess existing systems
    Top Stories

    Cyber security breaches prompt financial services to reassess existing systems

    Cyber security breaches prompt financial services to reassess existing systems

    Published by Gbaf News

    Posted on May 30, 2018

    Featured image for article about Top Stories

    Nick Hammond, lead advisor for financial services at World Wide Technology, discusses the steps financial services firms need to take to overcome the rising threat of cyber security breaches

     More than four in ten businesses experienced a cybersecurity breach over the last year, according to The Government’s Cyber Security Breaches survey.

    Investment in cybersecurity by finance and insurance firms doubled in the last year, and 51 percent of businesses have implemented all the five basic technical controls listed under the Government endorsed Cyber Essentials scheme.[1]

    But this is not enough to keep modern IT systems secure. Changes to the way financial services firms use technology means that information cannot simply be kept on a closed system and protected from external threats by a firewall. Data now regularly goes beyond the four walls of a company and is shared across thousands of locations. Multiple third parties, such as credit ratings services or interbank payment systems, need access to data to provide their services. It is also shared with employee and customer devices through mobile banking apps and bring-your-own-device solutions. This makes the traditional “firewall” approach to protecting IT systems outdated, as it leaves firms susceptible to attacks. There must be a fundamental rethink in the approach to security.

    It is no longer possible to draw a perimeter around the whole system, so instead each individual application has to be protected and only allowed to share data with other applications that need it.

    The sprawling, interdependent nature of modern financial IT infrastructures means creating this boundary and these permissions is often easier said than done. Over the years, programmers have had to keep up with each new software development that comes along, and integrate each of them into the system. But no one has had an end plan in mind for the larger architecture. What began as relatively simple structures twenty years ago have been patched and re-patched in various guises and stitched together. The teams who setup the original systems have often moved on from the firm, and their knowledge of the original body has gone with them.

    This means that trying to isolate one application within the system architecture in order to secure it can mean something else simply stops working. For example, e-commerce systems often rely on credit card databases to work and would stop working if the communication between the two was cut off in the interest of security.

    To adapt to the current security climate, application owners and compliance officers need to first talk about infrastructure, and get a clear sense of what is going on in their systems, before putting the most appropriate solution in place. If they are to tackle threats of cyber breaches in a future-proof way, financial services firms need a bespoke security policy that traces every interdependency within their systems and adapts protection policies accordingly.

    Many firms invest in security products before working out how they can function in the existing environment and try and work backwards from this point once they run into problems. But this is the wrong way to approach securing functions. Without starting from a point of visibility over the infrastructure, there is no way of telling which product will be the most appropriate.

    This visibility is even more necessary in order to comply with new regulations that come into effect this year. One of, for instance, requires that testing and production environments cannot communicate to make sure that any rogue untested code does not affect the wider working system. GDPR, now in effect, calls for companies to have the technologies in place to prevent and detect any kind of leak or cyber breach and report it in the space of 72 hours. This kind of awareness about the communication between testing and production environments, or the existence of a breach, is impossible without visibility over the entire network.

    Furthermore, if strict processes aren’t in place to protect against dangerous changes, or if staff do not follow the guidelines around this, systems will still be vulnerable to a breach of regulation or of system security – no matter how secure their technology. Financial firms need to have the correct processes in place and the right people to oversee them.

    Getting an in-depth understanding of the existing systems will enable financial services firms to then upgrade current processes, complete documentation and implement standards to mitigate risk. Having an active rather than reactionary approach will allow financial services firms to not only comply with regulations, but also be able to tackle any attempt of a cyberattack head on.

    [1]https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/702074/Cyber_Security_Breaches_Survey_2018_-_Main_Report.pdf

    Nick Hammond, lead advisor for financial services at World Wide Technology, discusses the steps financial services firms need to take to overcome the rising threat of cyber security breaches

     More than four in ten businesses experienced a cybersecurity breach over the last year, according to The Government’s Cyber Security Breaches survey.

    Investment in cybersecurity by finance and insurance firms doubled in the last year, and 51 percent of businesses have implemented all the five basic technical controls listed under the Government endorsed Cyber Essentials scheme.[1]

    But this is not enough to keep modern IT systems secure. Changes to the way financial services firms use technology means that information cannot simply be kept on a closed system and protected from external threats by a firewall. Data now regularly goes beyond the four walls of a company and is shared across thousands of locations. Multiple third parties, such as credit ratings services or interbank payment systems, need access to data to provide their services. It is also shared with employee and customer devices through mobile banking apps and bring-your-own-device solutions. This makes the traditional “firewall” approach to protecting IT systems outdated, as it leaves firms susceptible to attacks. There must be a fundamental rethink in the approach to security.

    It is no longer possible to draw a perimeter around the whole system, so instead each individual application has to be protected and only allowed to share data with other applications that need it.

    The sprawling, interdependent nature of modern financial IT infrastructures means creating this boundary and these permissions is often easier said than done. Over the years, programmers have had to keep up with each new software development that comes along, and integrate each of them into the system. But no one has had an end plan in mind for the larger architecture. What began as relatively simple structures twenty years ago have been patched and re-patched in various guises and stitched together. The teams who setup the original systems have often moved on from the firm, and their knowledge of the original body has gone with them.

    This means that trying to isolate one application within the system architecture in order to secure it can mean something else simply stops working. For example, e-commerce systems often rely on credit card databases to work and would stop working if the communication between the two was cut off in the interest of security.

    To adapt to the current security climate, application owners and compliance officers need to first talk about infrastructure, and get a clear sense of what is going on in their systems, before putting the most appropriate solution in place. If they are to tackle threats of cyber breaches in a future-proof way, financial services firms need a bespoke security policy that traces every interdependency within their systems and adapts protection policies accordingly.

    Many firms invest in security products before working out how they can function in the existing environment and try and work backwards from this point once they run into problems. But this is the wrong way to approach securing functions. Without starting from a point of visibility over the infrastructure, there is no way of telling which product will be the most appropriate.

    This visibility is even more necessary in order to comply with new regulations that come into effect this year. One of, for instance, requires that testing and production environments cannot communicate to make sure that any rogue untested code does not affect the wider working system. GDPR, now in effect, calls for companies to have the technologies in place to prevent and detect any kind of leak or cyber breach and report it in the space of 72 hours. This kind of awareness about the communication between testing and production environments, or the existence of a breach, is impossible without visibility over the entire network.

    Furthermore, if strict processes aren’t in place to protect against dangerous changes, or if staff do not follow the guidelines around this, systems will still be vulnerable to a breach of regulation or of system security – no matter how secure their technology. Financial firms need to have the correct processes in place and the right people to oversee them.

    Getting an in-depth understanding of the existing systems will enable financial services firms to then upgrade current processes, complete documentation and implement standards to mitigate risk. Having an active rather than reactionary approach will allow financial services firms to not only comply with regulations, but also be able to tackle any attempt of a cyberattack head on.

    [1]https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/702074/Cyber_Security_Breaches_Survey_2018_-_Main_Report.pdf

    Related Posts
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    A Notable Update for Employee Health Benefits:
    A Notable Update for Employee Health Benefits:
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust
    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference
    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Top Stories

    Explore more articles in the Top Stories category

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    A Gateway for U.S. Capital: Inside Kazakhstan’s Expanding Financial Hub

    A Gateway for U.S. Capital: Inside Kazakhstan’s Expanding Financial Hub

    View All Top Stories Posts
    Previous Top Stories PostSun Life Global Investments and Excel Funds Management announce unitholder approval of fund changes
    Next Top Stories PostA Quarter Of Small Businesses Would Cut Staff If They Couldn’t Access New Finance