Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Top Stories > How defence in depth can sink cyber attacks
    Top Stories

    How defence in depth can sink cyber attacks

    How defence in depth can sink cyber attacks

    Published by linker 5

    Posted on October 5, 2020

    Featured image for article about Top Stories

    By Carolyn Crandall, Chief Deception Officer at Attivo Networks

    The cybersecurity of financial institutions is appearing as a top priority for the Bank of England in the coming months. The central bank will focus on stress testing IT defences for online attacks and establishing new standards for how quickly and effectively financial institutions should contain these breaches. The objective is to improve banks’ operational resilience to withstand unforeseen future crises, such as the impact of COVID-19.

    The decision comes as organisations adjust to a new wave of threats, in which opportunistic cybercriminals have continued to exploit weaknesses across a larger digital attack surface. While business email compromise (BEC), phishing attacks, and malware are still dangerous weapons in a threat actor’s arsenal, they are increasingly using advanced persistent threat (APT) tactics to circumvent defences and avoid detection. CISOs need to deploy a layered approach to security to prevent their most valuable assets from falling into the wrong hands to defend against these attacks.

    Pandemic opportunists  

    Threat actors are opportunists that have used the COVID-19 chaos and uncertainty to their advantage. They know that the crisis caught many businesses off guard at the beginning and exploited the rapid shift to remote working en masse to target vulnerabilities in devices and networks and weaker remote worksite security controls. According to figures from the FBI’s Internet Crime Complaint Center, the result has been a 400 percent increase in cyber attacks since the start of the pandemic.

    Virtual Private Networks (VPNs) are among the most popular methods for connecting staff to corporate networks remotely. However, these are also a popular entry point for threat actors exploiting unpatched vulnerabilities or using credentials stolen via phishing campaigns. Microsoft recently revealed that COVID-related phishing campaigns rose to more than 30,000 a day, while independent research from industry consortium FS-ISAC found that phishing emails against bank employees rose by a third over the first quarter of 2020.

    In regular times, perimeter security often stops such activity. However, with workforces accessing the network at different times and from other locations and systems, spotting unauthorised infiltration has become much harder.

    Attackers go low and slow to avoid detection

    Threat actors are not only using COVID to their advantage but are also changing tactics to avoid detection and maximise the payout. Gone are the days of the ‘smash and grab’ approach, in which threat actors go in heavy and fast, triggering an immediate alert that attackers had compromised the corporate network.

    Instead, they have now switched to a “low and slow” approach, taking their time to move carefully through an IT network looking for the most valuable assets. Attackers are using port scanning or credentials stolen either from the users themselves or via Active Directory, which conventional security tools will struggle to identify. These allow attackers to lurk in the system for several months to gain a foothold in the network and move laterally to more secure areas to access sensitive data. In 2019, attackers  spent, on average, 206 days on a network before detection, a number that is likely to increase in 2020.

    Another waiting game tactic is now yielding results as working practices change. Dormant malware infections have compromised vulnerable systems operating outside the perimeter, waiting to activate weeks or months later when staff return to the office. In effect, they are jumping the firewall.

    Defence through depth

    Attackers will use a range of tactics, techniques, and procedures (TTPs) to achieve their objectives, and once they’ve compromised the network, it’s typically only been a matter of time before they get what they want. However, there are ways for CISOs to get on the front foot and prevent attackers from establishing a foothold.

    Carolyn Crandall

    Carolyn Crandall

    Creating defences that include multiple elements, each designed to detect, triage, and remediate various attacks at different points both outside and inside the network, provides defenders with an advantage. The more defensive layers there are, the harder it is for an attacker to break through.

    While endpoint security and even behavioural analytics are commonplace, they can leave gaps in an organisation’s defences. These tools can’t provide the full spectrum of early detection of in-network threats and activities related to credential theft, discovery, lateral movement, and data collection.

    One way to fix this is to combine deception and concealment technologies. These protect valuable assets – such as Active Directory objects, files, and folders – by hiding them from attackers and presenting any unauthorised person with fake data designed to derail their attack and steer them into decoy engagement servers for observation. These deceive attackers into thinking that the assets they have found are genuine, when, in fact, they have fallen into a deceptive environment where their every action is monitored and recorded.

    The moment intruders attempt unauthorized access or interact with the deception environment, the CISO and their team receive alerts. In response, they may shut down the attack or study the attackers’ TTPs, enabling the security team to build a threat informed defence where they can identify and remediate any weaknesses in their security controls. Defenders can also use this attack information to update defences for threat hunting other incidents and identifying similar suspicious activities quickly in the future.

    Deception and concealment technologies can integrate with a range of other security measures, including Endpoint Detection and Response (EDR), to improve detection coverage and to share threat data quickly for faster response and remediation. In fact, combining EDR with data concealment gives organisations an average 42 percent boost in detection.

    Businesses operating in financial services are under greater pressure than ever before to secure their IT networks and build resilience in the face of persistent attacks. Deception and concealment technologies provide a powerful diversion that hides and prevents access to valuable assets whilst gathering new insights for strengthening existing security measures.  As part of a robust, layered cyber defence, it provides a vital deterrent that prevents attackers from achieving their ultimate goal.

    Related Posts
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    A Notable Update for Employee Health Benefits:
    A Notable Update for Employee Health Benefits:
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust
    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference
    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Top Stories

    Explore more articles in the Top Stories category

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    A Gateway for U.S. Capital: Inside Kazakhstan’s Expanding Financial Hub

    A Gateway for U.S. Capital: Inside Kazakhstan’s Expanding Financial Hub

    View All Top Stories Posts
    Previous Top Stories PostDeloitte releases mid-year outlooks for the energy industry sectors
    Next Top Stories PostWhy climate-related financial disclosure is top of mind in a COVID-19 world