Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >KEEPING UP WITH THE CYBERCRIMINALS
    Business

    Keeping up With the Cybercriminals

    Published by Gbaf News

    Posted on November 18, 2016

    8 min read

    Last updated: January 22, 2026

    Add as preferred source on Google
    Allianz Trade celebrates winning the Global Banking & Finance Review award for Best Trade Credit Insurance Company Asia Pacific 2022, highlighting its excellence in credit insurance solutions.
    Award ceremony celebrating Allianz Trade as Best Trade Credit Insurance Company Asia Pacific - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Matt Goche, Vice President of Global Security Services, Sungard Availability Services

    What do supermarkets, video games and search engines have in common? They all belong to sectors that have seen major hacks over the last few years. The cyberattacks on Tesco Banking, Sony and Yahoo, are just some of the most public examples in demonstrating that the ‘hacker industry’ is continuing to gather strength, attacking vulnerabilities in both the public and private sector for profit.

    From corporate industries and political groups, to universities and healthcare systems – even Twitter – no one is immune. And yet cyber security is still misunderstood, or worse, underestimated. Cyber criminals are becoming more creative; for each loophole we close or flaw we patch, hackers continually are finding new methods to beat defences.

    As I scan the cyber horizon looking for emerging threats, here are just a few of the key areas at risk: 

    Web Applications:

    Perhaps the area of highest risk, the threats to web applications are not new but they are increasing. Worryingly, we are seeing more malware targeted specifically at web applications, rather than aimed directly at end points, such as devices or users.

    The move towards cloud-based software means that more data than ever is available through the web, presenting a potentially low friction access point for hackers to gain entry to an organisation’s network.

    Spear Phishing Attacks:

    The second area that has seen a major increase is spear phishing attacks. Far more dangerous than the general phishing scams that have been prevalent since the mid-nineties, the new generation uses targeted attacks against specific organisations. They often include malware tailored for the victim’s organisation and which meet the hacker’s objective.

    To illustrate, a spear phishing attack may include malware specifically designed for a certain organisation’s end points, or some of the capabilities and applications within the target victim’s environments. These targeted attacks, when combined with the nature of the malware that’s sent, can be even more damaging. 

    The Internet of Things:

    Although a relatively new phenomenon, the Internet of Things (IoT) – connected devices – is already being targeted by cyber criminals. There are a growing number of applications that aren’t built from traditional platforms, or unique commercial-off-the-shelf products (COTS) in the way you would normally think of COTS products. Instead, they are one-offs designed for a specific function and tend to have underlying systems that are fairly unique and have received limited vulnerability testing.

    In the recent past, the potential security vulnerabilities of IoT devices were not a main concern. However, with more and more malware being specifically designed to take advantage of the vulnerabilities of IoT appliances and their capabilities to access a network, not to mention botnets, IoT has quickly jumped up the CIO’s agenda.

    Firmware:

    Another area expected to see more attacks is at the firmware level. As organisations have moved to the cloud, much of the malware that’s been designed looks to attack within the container of the hosted tenant. For instance, as the hosted tenant migrates their standard operating systems and applications, the malware is deployed against those systems.

    More attacks and malware specifically designed for one layer deeper are expected at either the firmware or the orchestration layer. The virtualisation layer could also be a target as it would potentially allow an attacker to compromise more than just the single container. The risk of such attacks has a massive impact on cloud vendors as well as other types of hosting providers.

    What’s a Company to Do? 

    Businesses need to approach the security of their environments in a comprehensive manner, looking at every level of the technology stack to see where a potential new or existing vulnerability could originate and/or be exploited. Some of the proactive measures all organisations can follow to guard against any form of cyberattack:

    • Implement a Defence in Depth model
    • Network edge security
    • Invest in Intrusion Detection and Prevention software
    • Install robust firewalls including Web Application Firewalls
    • Conduct regular vulnerability scans
    • Penetration testing
    • Safeguard VPN access
    • Adopt a virtual desktop environment for remote devices.
    • Block users from installing unauthorised applications
    • Insist on strong password controls for users
    • Adhere to basic security doctrines
    • Disable macro scripts
    • Implement proxy internet access
    • Segregate networks
    • Backup regularly and verify the integrity of those backups
    • Draw up an Information Security Policy
    • Create an education programme for users
    • Develop a practical incident response plan.

    With so many moving parts and layers within the business, and so many routes towards ensuring the security of environments, networks, and applications, pairing with an expert security partner can help.  Not only can this augment resources, it means you have an army of knowledge on your side, ready to identify, take on and overcome the ever changing and emerging threat-scape all companies face.

    Matt Goche, Vice President of Global Security Services, Sungard Availability Services

    What do supermarkets, video games and search engines have in common? They all belong to sectors that have seen major hacks over the last few years. The cyberattacks on Tesco Banking, Sony and Yahoo, are just some of the most public examples in demonstrating that the ‘hacker industry’ is continuing to gather strength, attacking vulnerabilities in both the public and private sector for profit.

    From corporate industries and political groups, to universities and healthcare systems – even Twitter – no one is immune. And yet cyber security is still misunderstood, or worse, underestimated. Cyber criminals are becoming more creative; for each loophole we close or flaw we patch, hackers continually are finding new methods to beat defences.

    As I scan the cyber horizon looking for emerging threats, here are just a few of the key areas at risk: 

    Web Applications:

    Perhaps the area of highest risk, the threats to web applications are not new but they are increasing. Worryingly, we are seeing more malware targeted specifically at web applications, rather than aimed directly at end points, such as devices or users.

    The move towards cloud-based software means that more data than ever is available through the web, presenting a potentially low friction access point for hackers to gain entry to an organisation’s network.

    Spear Phishing Attacks:

    The second area that has seen a major increase is spear phishing attacks. Far more dangerous than the general phishing scams that have been prevalent since the mid-nineties, the new generation uses targeted attacks against specific organisations. They often include malware tailored for the victim’s organisation and which meet the hacker’s objective.

    To illustrate, a spear phishing attack may include malware specifically designed for a certain organisation’s end points, or some of the capabilities and applications within the target victim’s environments. These targeted attacks, when combined with the nature of the malware that’s sent, can be even more damaging. 

    The Internet of Things:

    Although a relatively new phenomenon, the Internet of Things (IoT) – connected devices – is already being targeted by cyber criminals. There are a growing number of applications that aren’t built from traditional platforms, or unique commercial-off-the-shelf products (COTS) in the way you would normally think of COTS products. Instead, they are one-offs designed for a specific function and tend to have underlying systems that are fairly unique and have received limited vulnerability testing.

    In the recent past, the potential security vulnerabilities of IoT devices were not a main concern. However, with more and more malware being specifically designed to take advantage of the vulnerabilities of IoT appliances and their capabilities to access a network, not to mention botnets, IoT has quickly jumped up the CIO’s agenda.

    Firmware:

    Another area expected to see more attacks is at the firmware level. As organisations have moved to the cloud, much of the malware that’s been designed looks to attack within the container of the hosted tenant. For instance, as the hosted tenant migrates their standard operating systems and applications, the malware is deployed against those systems.

    More attacks and malware specifically designed for one layer deeper are expected at either the firmware or the orchestration layer. The virtualisation layer could also be a target as it would potentially allow an attacker to compromise more than just the single container. The risk of such attacks has a massive impact on cloud vendors as well as other types of hosting providers.

    What’s a Company to Do? 

    Businesses need to approach the security of their environments in a comprehensive manner, looking at every level of the technology stack to see where a potential new or existing vulnerability could originate and/or be exploited. Some of the proactive measures all organisations can follow to guard against any form of cyberattack:

    • Implement a Defence in Depth model
    • Network edge security
    • Invest in Intrusion Detection and Prevention software
    • Install robust firewalls including Web Application Firewalls
    • Conduct regular vulnerability scans
    • Penetration testing
    • Safeguard VPN access
    • Adopt a virtual desktop environment for remote devices.
    • Block users from installing unauthorised applications
    • Insist on strong password controls for users
    • Adhere to basic security doctrines
    • Disable macro scripts
    • Implement proxy internet access
    • Segregate networks
    • Backup regularly and verify the integrity of those backups
    • Draw up an Information Security Policy
    • Create an education programme for users
    • Develop a practical incident response plan.

    With so many moving parts and layers within the business, and so many routes towards ensuring the security of environments, networks, and applications, pairing with an expert security partner can help.  Not only can this augment resources, it means you have an army of knowledge on your side, ready to identify, take on and overcome the ever changing and emerging threat-scape all companies face.

    More from Business

    Explore more articles in the Business category

    Image for Submit Your Entry for Years of Excellence Awards 2026
    Submit Your Entry for Years of Excellence Awards 2026
    Image for Nominations Open for Travel & Hospitality Awards 2026
    Nominations Open for Travel & Hospitality Awards 2026
    Image for Submit Your Entry Today for Telecom Awards 2026
    Submit Your Entry Today for Telecom Awards 2026
    Image for Submit Your Entries for The Next 100 Global Awards 2026
    Submit Your Entries for the Next 100 Global Awards 2026
    Image for Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Image for Nominations Invited for Real Estate Development Awards 2026
    Nominations Invited for Real Estate Development Awards 2026
    Image for Submit Your Entry: Process & Product Awards 2026
    Submit Your Entry: Process & Product Awards 2026
    Image for Call for Entries: HR & Recruitment Awards 2026
    Call for Entries: HR & Recruitment Awards 2026
    Image for Submit Your Nominations Today for Education & Training Awards 2026
    Submit Your Nominations Today for Education & Training Awards 2026
    Image for Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Image for Submit Your Entry Today for Business Awards 2026
    Submit Your Entry Today for Business Awards 2026
    Image for Decentralized Masters’ ‘family culture’ building trust instead of hierarchy
    Decentralized Masters’ ‘family Culture’ Building Trust Instead of Hierarchy
    View All Business Posts
    Previous Business PostResearch Reveals Lower Cost of Instant Payments Implementation Is Opening the Market for Small and Mid-Sized Banks
    Next Business PostOver a Third of UK People Think Thomas Whitmore From Independence Day Will Be Joined by Donald Trump in Disney’s Hall of Presidents