Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > DOES THE BANK OF ENGLAND’S CYBER CRIME TESTING GO FAR ENOUGH?
    Technology

    DOES THE BANK OF ENGLAND’S CYBER CRIME TESTING GO FAR ENOUGH?

    DOES THE BANK OF ENGLAND’S CYBER CRIME TESTING GO FAR ENOUGH?

    Published by Gbaf News

    Posted on June 24, 2014

    Featured image for article about Technology

    The Bank of England recently announced its latest cyber security initiative to help protect the UK’s financial institutions. The plan involves employing a team of ethical “white hat” hackers to test the perimeter cyber security of more than 20 major banks and financial institutions, reported to include RBS and the London Stock Exchange.

    This round of testing is the latest in a series of cyber defence exercises designed to protect the UK’s financial services industry from the growing threat of cyber attacks. The Bank of England’s most recent exercise follows November’s “Operation Waking Shark II” – a simulated cyber attack designed to test the resilience of UK banks, payment providers and the stock market.

    Geoff Webb

    Geoff Webb

    Clearly the financial services industry as a whole is well aware of the risks posed by cyber crime, and a KPMG report from 2013 shows the potential scale of the risk. The report stated that the next major shock to the economy “could come from an, as yet, unforeseen event, such as a massive systems outage or a new breed of cyber attack.” When talking about cyber attacks on a scale which could potentially trigger the next financial crisis, it’s easy to see why the industry in the UK is taking the cyber threat so seriously.

    All of this helps to explain why the Bank of England has embarked on its most recent programme to shore up banks’ defences. Ethical hackers share the same skills as their criminal cousins, but use their talents for good – often to find weaknesses in companies’ IT security. Ethical hackers can think and act like the bad guys (some are even former hackers), but rather than doing harm to companies they act as consultants and help to improve IT security measures and strategies.

    In this exercise, ethical hackers will be used to investigate the firewalls and perimeter defences of the country’s major financial institutions to look for weaknesses and holes which could be exploited by cyber criminals. This type of exercise is known as “penetration testing” and it’s useful to a point because a secure perimeter is still a very good way to keep the bad guys out. But does it go far enough?

    Well, penetration testing is fine up to a point. But no firewall on earth can claim to be 100 per cent effective, meaning banks have to assume that skilled and determined hackers will breach that perimeter and get inside the network. It is worth remembering at this point that state-sponsored cyber crime is on the increase: teams of highly-skilled hackers who are extremely well funded by governments with the intention of disrupting other nations.

    So despite your best efforts, the fact is that these guys are likely to get inside your network. Once they’re inside, the question then becomes: how do you spot them and mitigate the risk and damage they can cause? The first thing a skilled hacker will do is make themselves look like one of your employees; a wolf in sheep’s clothing, making them even more difficult to locate and neutralise. Some organisations look to identify the tools a hacker is using, but this method is flawed as it’s easy to build unidentifiable tools. What can be spotted and tracked however is the unusual activity and behaviour that a hacker demonstrates. For example, is there a particularly high level of traffic going to an area of the bank or is data moving in new ways around the business? The ability to spot and identify signs such as these give banks a far greater chance of detecting an attack.

    This boils down to ensuring that the IT department is carefully controlling what employees can access, ensuring that it is only what is strictly necessary. For example, if an individual moves departments, the set of rights that they had previously may no longer be necessary. While seemingly a straightforward process, many businesses and financial services institutions struggle to implement this properly, leaving themselves exposed.

    By limiting access across an organisation, it is easier to spot hackers who have masked themselves as employees looking to steal resources. Once this process is in place, it’s far easier for the IT team to identify suspicious hacker behaviour, mitigating their impact.

    The latest cyber security initiative by the Bank of England should be commended in many respects, but it’s potentially placing emphasis upon the wrong areas of security. Perimeter defences will inevitably be breached as a firewall will never be 100% effective. However, by investing heavily in these areas of cyber security, the insider threats that could cause significantly more damage are being overlooked. If access rights and privileges are monitored and managed closely by IT, a bank will be in a far stronger position to spot threats and take action against them.

    The Bank of England is right to employ cyber security initiatives as online crime poses a great threat to financial security and stability. But the Bank of England needs to take a broader view, shifting focus away from the perimeters of financial institutions to the potential dangers posed by insider threats.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostMALWARE THREAT GROWS, BUT IT’S NOT ‘GAMEOVER’ YET
    Next Technology PostIMPACT OF TECHNOLOGY ON THE FINANCIAL SECTOR

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts