Connect with us

Top Stories

DATA SECURITY ON THE ROAD

Published

on

DATA SECURITY ON THE ROAD

By Dave Anderson, senior director, Voltage Security

We all know the demands that executives have to always be available, to be able to access and share corporate data at any time with their staff and other stakeholders, and being on the road doesn’t alter this to any degree.  Executives demand the ability to use mobile devices to continue to run the business.  The challenge is not simply how to keep these devices and the data stored on the devices safe, but how to keep the data secure as it moves and is communicated across and through these devices.  I was recently disembarking a flight, when the CFO I was sitting next to had to run back on the plane to retrieve her corporate iPad, which she had inadvertently left in the seat pocket.  Most seasoned travelers have likely experienced a similar feeling of despair as they try to recapture their device that holds all the sensitive data.

DATA SECURITY ON THE ROAD

DATA SECURITY ON THE ROAD

The existence of security controls that help “lock down” the device have been available for some time, and are positioned to help protect against the loss or theft of the device.  Access and authorisation controls are intended to limit access to the device to only the authorised user, and mobile data management (MDM) security solutions enhance the access controls by focusing on locking the device, making the device theoretically unusable by anyone other than the owner.  These controls that secure only the “device” have a much stronger probability of actually working if the data on that device is static, and doesn’t move into, or out of, said device.  The whole intent of a mobility platform is in direct conflict with this notion.  Executives are using, and will continue to use, smartphones and tablets to access business systems and applications and send sensitive communications across and outside of their organisation, regardless of where they are in the world.  Unfortunately, these “device-only” controls, those that simply try to place a protective wrapper around the device, are not effective in protecting the sensitive corporate and customer data as it is accessed and communicated across these devices.

Because data dynamically moves across mobile devices, the best way for anyone to protect sensitive data is through a data-centric security strategy, one which protects the actual data level itself through encryption, tokenisation or data masking capabilities.  Data-centric security travels with the data, wherever it moves, both inside and outside of an organisation, which is something that traditional “endpoint” security technologies cannot provide.  This ability allows any form of data, whether structured or unstructured, to be protected from the moment of creation through its entire lifecycle.  Corporate or customer information that is accessed by a mobile device can be protected before it even reaches that device; any sensitive data that is created on the device and then communicated outward can be protected.

The efficiencies promised by adopting mobile initiatives are obviously real and valuable to most organisations and executives.  This allows anyone to be “always on, anywhere and anytime”.  It also allows your sensitive data to be always on and accessible anywhere and anytime.  Effective data protection is not delivered through simply locking down the device, and especially not through the guidance of “use your VPN or avoid public wi-fi”.  The only way to effectively protect any sensitive information is by protecting the data itself, not just the container or device where that data momentarily sits.  This ensures the use of sensitive data can be secured and in compliance to security and privacy regulations, regardless of what country you are in and into which network you’re connected.

I’m sure that CFO understood that the simple access and authorisation controls that are generally implemented on these mobile devices weren’t going to be enough to protect her corporate and financial information from anyone who was intent on capturing it from her device.  A simple data-centric protection strategy would likely have saved her from the panic and the potential risk caused by losing her tablet, and possibly exposing whatever sensitive data that was on it.

We will continue to travel, and continue to look for new ways to access and communicate information wherever we are, at any time.  This is how most of us run our businesses.  However, in doing so, we have to look at new ways that can effectively protect our corporate and customer data, and reduce our risk, and there are now effective ways to do so, which are seamless and fit into how we do business, which is a winning strategy that aligns the business, IT and security to jointly and securely move the business forward.

Media Contact:

Lara Lackie
Eskenzi PR
+44 (0)207 183 2834
[email protected]

Top Stories

Securing Information Throughout the Supply Chain – Preventing Supplier Vulnerabilities 

Published

on

Securing Information Throughout the Supply Chain – Preventing Supplier Vulnerabilities  1

By Adam Strange, Data Classification Specialist, HelpSystems 

The financial services sector is experiencing extreme disruption coupled with rapid innovation as established institutions strive to become more agile and meet evolving customer demand. At the same time, new market entrants compete fiercely for customers. Increasing operational flexibility, through the deployment of cloud infrastructure or via digital transformation initiatives, is critical for future competitiveness but it has also driven regulatory and security challenges, particularly around working with suppliers.

That said, the benefits of a diverse, interconnected supply chain are compelling: agility, speed, and cost reduction all weigh on the positive side of the equation, prompting financial institutions to pursue close, collaborative relationships with suppliers, often numbering in the hundreds or thousands.

Weakness in the supply chain

On the negative side is the increased cyber threat when enterprises expose their networks to their supply chain. In our modern interconnected digital ecosystems, most financial organisations have many supply chain dependencies and it only takes one of these to have cybersecurity vulnerabilities to bring a business to its knees.

As a result, breaches originating in third parties are common and costly – a Ponemon Institute/IBM study found that breaches being caused by a third party was the top factor that amplified the cost of a breach, adding an average of $370,000 to the breach cost.

Concern around the supply chain was also evidenced in a recent report we have just issued, whereby we interviewed 250 CISOs and CIOs from financial institutions about the cybersecurity challenges they face and nearly half (46%) said that cybersecurity weaknesses in the supply chain had the biggest potential to cause the most damage in the next 12 months.

But sharing information with suppliers is essential for the supply chain to function. Most financial services organisations go to great lengths to secure intellectual property, personally identifiable information (PII) and other sensitive data internally, yet when this information is shared across the supply chain, does it get the same robust attention?

Further amplified by COVID-19

Financial service organisations have always been a key target for cyber attacks.  Our research showed that since COVID-19 hit, the risk has elevated further, with 45% of the respondents seeing increased cybersecurity attacks during this period. Likewise, hackers are rejecting frontal assaults on well-defended walls in favour of infiltrating networks via vulnerabilities in suppliers.

But financial services organisations must maintain reputations and ensure customer trust. Firms are keen to demonstrate that they are protecting customer assets, providing an ultra-reliable service and working with trustworthy partners. So, what can they do to better protect their supplier ecosystem?

At the very least, they need to ensure basic controls are implemented around their suppliers’ IT infrastructure.  For example, they must ensure suppliers maintain a secure infrastructure with a minimum of Cyber Essentials or the equivalent US CIS certification controls. Cyber Essentials defines a set of controls which, when implemented, provide organisations with basic protection from the most prevalent forms of threats, focusing on threats which require low levels of attacker skill, and which are widely available online.

Likewise, they need to ensure good information management controls are in place and this begins with accurate information/data classification. After all, how can you apply appropriate controls to your information unless you know what it is and where it is?

How ISO27001 helps organisations put in place a data classification process

The international standard on information security, ISO27001, describes the basic ingredients for data classification to ensure the data receives the appropriate level of protection in accordance with its importance to the organisation. It comprises three basic elements:

  • Classification of data – in terms of legal requirements, value, criticality and sensitivity to unauthorised disclosure or modification.
  • Labelling of data – an appropriate set of procedures for information labelling should be developed and implemented in accordance with the organisation’s information classification scheme.
  • Handling of assets – procedures for the handling of assets developed and implemented in accordance with the organisation’s information classification scheme.

Adoption of this methodology will help financial services organisations and their supply chain take a more data-centric information security approach. However, there are essentially four key stages for implementing a data risk assurance supply chain approach and these are:

 1. Approval – in organisations with complex supply chains senior management, vendor management, procurement and information security will all need to support a robust risk-based information management approach. Details of previous incidents and their impact alongside the business benefits will be essential to gain stakeholder buy in.

 2. Preparation – Organisations should start with Tier 1 suppliers and initially identify the contracts with the highest business impact/risk. They should identify and record information repositories and the data that they contain together with the responsible business owners. Define a business taxonomy based on information categories of that data and include supply chain factors such as what information categories are shared.

For example, they need to understand the business impact of compromise against each of the information categories. Have any suppliers suffered security incidents? What assurance mechanisms are in place? Once all this information is collated the organisation can create a data classification policy and define a set of controls for each data category.

 3. Discovery – Select each data category and identify the associated contracts. Then prioritise the data category based on the risk assessment and verify that the data security controls and arrangements for each data category and contract meet the overall requirements. Once complete, hand over the contract for inclusion in the vendor management cycle.

4. Embed process – the overall objective is to embed information risk management into the procurement lifecycle from start to finish. Therefore, whenever a new contract is created there are a number of actions required which embed data risk at each stage of the bid, tender, procurement, evaluation, implementation and termination phases of the contract.

To summarise, organisations should start by researching the information risk and security frameworks such as ISO27001 and others. They should then focus on defining their business taxonomy and data categories together with the business impact of compromise to help develop a data classification scheme. Finally, they should implement the data classification scheme and embed data risk management into the procurement lifecycle processes from start to finish. By effectively embedding data risk management and categorisation into their procurement and vendor management processes, they are preventing their suppliers’ vulnerabilities becoming their own and are more effectively securing data in the supply chain.

Continue Reading

Top Stories

Deloitte: Middle East organizations need to rethink their workforce in the wake of COVID-19

Published

on

Deloitte: Middle East organizations need to rethink their workforce in the wake of COVID-19 2

Organizations in the Middle East have had to take immediate actions in reaction to the COVID-19 pandemic, such as shifting to remote and virtual work, implementing new ways of working and redirecting the workforce on critical activities. According to Deloitte’s 10th annual 2020 Middle East Human Capital Trends report, “The social enterprise at work: Paradox as a path forward,” organizations now need to think about how to sustain these actions by embedding them into their organizational culture.

“COVID-19 has created a clarifying moment for work and the workforce. Organizations that expand their focus on worker well-being, from programs adjacent to work to designing well-being into the work itself, will help their workers not only feel their best but perform at their best. Doing so will strengthen the tie between well-being and organizational outcomes, drive meaningful work, and foster a greater sense of belonging overall,” said Ghassan Turqieh, Consulting Partner, Human Capital, Deloitte Middle East.

According to the Deloitte report, many organizations in the Middle East made quick arrangements to engage with employees in the wake of the pandemic through frequent communications, multiple webinars where senior leaders addressed employee concerns, virtual employee events, manager check-ins, periodic calls and other targeted interactions with the workforce.

The report also discussed how UAE and KSA governments have reexamined work policies and practices, amended regulations and introduced COVID-19 initiatives to support companies and the workforce in the public and private sectors. Flexible and remote working, team-building and engagement activities, well-ness programs, recognition awards and modern workspaces are among the many things that are now adding to the employee experience.

Key findings from the Deloitte global report include:

  • Only 17% of respondents are making significant investments in reskilling to support their AI strategy with only 12% using AI primarily to replace workers;
  • 27% of respondents have clear policies and practices to manage the ethical challenges resulting from the future of work despite 85% of respondents saying the future of work raises ethical challenges;
  • Three-quarters of leaders are expecting to source new skills and capabilities through reskilling, but only 45% are rewarding workers for the development of new skills; and
  • Only 45% of respondents are prepared or very prepared to take advantage of the alternative workforce to access key capabilities despite gig workers being likely to comprise 43% of the U.S. workforce this year according to the Bureau of Labor Statistics.

“Worker well-being is a top priority today, and similarly to the rest of the world, companies in the Middle East are focusing their efforts to redesign work around well-being by understanding workforce well-being needs,” said Rania Abu Shukur, Director, Human Capital, Consulting, Deloitte Middle East.

Continue Reading

Top Stories

One in five insurance customers saw an improvement in customer service over lockdown, research shows

Published

on

One in five insurance customers saw an improvement in customer service over lockdown, research shows 3

SAS research reveals that insurers improved their customer experience during lockdown

One in five insurance customers noted an improvement in their customer experience over lockdown, according to research conducted by SAS, the leader in analytics. This far outweighed the 11% of customers who felt it had deteriorated over the same period.

This is positive news for insurers during such challenging times, with 59% of customers also saying that they would pay more to buy or use products and services from any company that provided them with a good customer experience over lockdown.

The improvement in customer experience also coincides with a rise in the number of digital customers. Since the pandemic started, the number of insurance customers using a digital service or app has grown by 10%. Three-fifths (60%) of new users plan to continue using these digital services moving forward.

However, while the number of digital users grew over lockdown, half of the insurance customer base has not yet chosen to move to digital insurance apps or services.

Paul Ridge, Head of Insurance at SAS UK & Ireland, said:

“It’s impressive that there was a net improvement in customer experience during lockdown, despite the challenges the industry was facing with a transition to remote working and increased claims for things like cancelled holidays. While many were forced to wait on customer help lines for long periods, part of the improvement may be explained by even a small (10%) increase in the number of digital users.

“However, it’s clear that a huge number of customers are still yet to make the move online. It’s vital that insurers provide the most accurate, timely and relevant offerings to customers, and this is best achieved by having additional insight into online customer journeys so they can understand them better. Using analytics and AI, insurers can seize this opportunity to digitalise their customer experience and offer a more personalised approach.”

Meanwhile, for insurers that fail to offer a consistently satisfactory customer experience, the price could be severe. A third (33%) of customers claimed that they would ditch a company after just one poor experience. This number jumps to 90% for between one and five poor examples of customer service.

For more insight into how other industries across EMEA performed during lockdown, download the full report: Experience 2030: Has COVID-19 created a new kind of customer? 

Continue Reading
Editorial & Advertiser disclosureOur website provides you with information, news, press releases, Opinion and advertorials on various financial products and services. This is not to be considered as financial advice and should be considered only for information purposes. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third party websites, affiliate sales networks, and may link to our advertising partners websites. Though we are tied up with various advertising and affiliate networks, this does not affect our analysis or opinion. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you, or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish sponsored articles or links, you may consider all articles or links hosted on our site as a partner endorsed link.

Call For Entries

Global Banking and Finance Review Awards Nominations 2020
2020 Global Banking & Finance Awards now open. Click Here

Latest Articles

Securing Information Throughout the Supply Chain – Preventing Supplier Vulnerabilities  4 Securing Information Throughout the Supply Chain – Preventing Supplier Vulnerabilities  5
Top Stories2 mins ago

Securing Information Throughout the Supply Chain – Preventing Supplier Vulnerabilities 

By Adam Strange, Data Classification Specialist, HelpSystems  The financial services sector is experiencing extreme disruption coupled with rapid innovation as...

RegTech 2020: The rise of Open Banking 6 RegTech 2020: The rise of Open Banking 7
Banking1 hour ago

RegTech 2020: The rise of Open Banking

This month on the RegTech 20:20 podcast, host Alex Ford is joined by industry experts Gavin Littlejohn, Chairman of The...

The case for AI technology adoption in financial back-office roles to improve efficiency 8 The case for AI technology adoption in financial back-office roles to improve efficiency 9
Technology2 hours ago

The case for AI technology adoption in financial back-office roles to improve efficiency

By Tomas Gogar, AI CEO, Rossum In this era, digital transformation isn’t anything new. Nonetheless, it can still cause a...

Gain financial regulation qualification online 10 Gain financial regulation qualification online 11
Finance3 hours ago

Gain financial regulation qualification online

Gain financial regulation qualification online   Warwick Business School in partnership with the Bank of England are delighted to offer...

COVID-19: Dealing with fraudulent applications for the Bounce Back Loan Scheme 13 COVID-19: Dealing with fraudulent applications for the Bounce Back Loan Scheme 14
Finance7 hours ago

COVID-19: Dealing with fraudulent applications for the Bounce Back Loan Scheme

By Ed Lloyd, EVP Global Head of Sales, Encompass The COVID-19 pandemic is still having a devastating impact on businesses...

EU Commission sets out new intellectual property action plan affecting SEPs, patent pooling and EU design protection 15 EU Commission sets out new intellectual property action plan affecting SEPs, patent pooling and EU design protection 16
Business8 hours ago

EU Commission sets out new intellectual property action plan affecting SEPs, patent pooling and EU design protection

By Andrew White, Partner and UK & European patent attorney at intellectual property firm, Mathys & Squire The EU Commission...

InsurTech is helping to drive the digital evolution of the UK motor retail industry 17 InsurTech is helping to drive the digital evolution of the UK motor retail industry 18
Technology8 hours ago

InsurTech is helping to drive the digital evolution of the UK motor retail industry

By Alan Inskip, Tempcover CEO & Founder If the last nine months have made anything clear, it is that the...

Five ways enterprises are using the public cloud 19 Five ways enterprises are using the public cloud 20
Technology8 hours ago

Five ways enterprises are using the public cloud

By Michael Chalmers, MD EMEA at Contino The public cloud is the most significant enabler in a generation. It’s causing a...

Another ‘new normal’? Five challenges CTOs will face in 2021 21 Another ‘new normal’? Five challenges CTOs will face in 2021 22
Technology9 hours ago

Another ‘new normal’? Five challenges CTOs will face in 2021

By Amit Dattani, Director of Technology at Conosco We’re one year into the new decade, and arguably technology has guided...

An inside look at how both the global pandemic and the March and November 5th National Lockdowns are affecting mental health within the workforce 23 An inside look at how both the global pandemic and the March and November 5th National Lockdowns are affecting mental health within the workforce 24
Interviews10 hours ago

An inside look at how both the global pandemic and the March and November 5th National Lockdowns are affecting mental health within the workforce

By Lianne Harrington, Director SMP Healthcare Ltd     Part One: Real life insights into the deteriorating mental health of three employees...

Newsletters with Secrets & Analysis. Subscribe Now