Connect with us

Technology

Putting data protection back on the financial agenda

Published

on

Putting data protection back on the financial agenda 1

By Wim Stoop, CDP Customer and Product Director, Cloudera

Despite the wave of changes that Brexit has brought financial organisations, from the end of ‘passporting’ to uncertainty over the longer-term equivalence rules, one thing has remained a constant — data privacy regulations are a core responsibility to protect sensitive data and mitigate data breaches. From PSD2 to GDPR, financial institutions need to ensure they are still processing and transferring data in accordance with the industry’s stringent rules and regulations. If not, they risk fines of up to £17.5 million or 4% of their company’s annual global turnover.

As the stakes get higher, the amount of data which financial enterprises are having to deal with is on the rise too. In fact, research by IDC estimated that businesses created and captured 6.4 zettabytes of new data last year alone. This increase in data production has linked to the pandemic and the move to remote working. Replacing face-to-face interactions with online communications has meant that financial businesses suddenly had to cope with a larger amount of data flowing through their networks. In addition, employees working from home are increasingly doing so on potentially unsecured devices, outside of the corporate network, risking exposure and data breaches according to numerous cybersecurity reports.

With an extensive stock of sensitive customer data and so many regulations to keep on top of, remaining compliant can feel overwhelming for financial organisations. However, this shouldn’t be the case. Today we often see businesses trying to retrofit data protection strategies, or take a reactive approach to external forces. Instead, they should be taking a proactive stance on data management. In doing so, security becomes a natural side-effect and financial companies can operate with the assurance that no matter what new regulations come into play, they are compliant. The question is, how to achieve this?

Taking a proactive approach to data privacy

To remain compliant, financial institutions need to get on top of their data. When data is sat in siloes, on legacy systems, it’s inaccessible to all and it becomes a challenge to identify what is sensitive and what isn’t. Poorly managed data can’t be protected and the risk of data breaches increases. By contrast, when properly controlled and stored, it becomes easy to apply data security rules.

From customer names and contact details to transaction records and PINs, financial organisations hold a lot of personal and financial data on customers. However, the trick is understanding that all data holds varying degrees of sensitivity and thus, needs to be managed accordingly. For instance, a customer’s bank account details are more sensitive, compared to their basic personal data, such as name and address, which are usually publicly accessible. By proactively identifying, prioritising and classifying data by its degree of sensitivity, financial companies can apply any and all data protection rules that are necessary, such as restricting certain users from accessing highly confidential information.

Yet, this identification process is often looked at as a reactive measure by many financial businesses. The challenge in proactive data management lies in an organisation’s ability to eliminate the frictions it has in tracking, identifying and classifying information, as opposed to doing so retrospectively. After all, data classification plays a vital role in ensuring data protection is upheld.

A proactive approach is integral to effective data management and governance. The first step in achieving this approach involves creating a data marketplace, or a curated, secured and governed data repository. Having something like a data marketplace in place means that as soon as data enters an organisation, enterprises can determine its degree of sensitivity, how it should be managed, and which analytics need to be run, to extract the most value out of the data.

Once these steps are taken, compliance and data privacy happen almost naturally and become ingrained in the business. When companies are aware of every single piece of data in their possession, they can know exactly how it’s being protected. Such a robust strategy ensures that institutions meet the high standards of trust that their customers have bestowed upon them in protecting their personal data. And, with this level of control, enterprises can avoid data lockout, reduce friction for employees, and optimise the value they unlock from their data. At the same time, they can have the peace of mind that they are compliant and protected.

A business-ready solution for data protection

With so many rules and regulations to keep track of, data protection shouldn’t be another worry to add to the list. Financial companies can maximise the efficacy of their existing security and governance strategies by applying it to all datasets across the enterprise – whether that be on-premise, in the cloud, or a combination of the two. In particular, as a scalable and low-cost solution, organisations are increasingly turning to the cloud for their data management needs. It’s expected that over half (51%) of business data will be stored in the cloud by 2024.

This is where an enterprise data cloud (EDC) really shows it’s worth, allowing financial companies to keep their data protected, compliant, and successfully governed. Simply put, an EDC is a hybrid and multi-cloud platform that harnesses analytics at every stage of the data lifecycle. It enables organisations to extract the true value of their data while still providing a consistent layer of security.

An EDC gives financial businesses a single source of truth, built on technology that operates on any cloud environment and right through to the edge. Armed with an EDC, companies have complete visibility over their data, no matter where it resides in the enterprise or the data lifecycle, easing the task of managing and protecting data. On top of this, an EDC supports a variety of data functions, including the data marketplace, and works to provide control, visibility and examination over data. With all these aspects working together, financial institutions can ensure that all data which passes through their infrastructure and into the data marketplace is efficiently governed and protected.

Bringing technology, people, and process together

Technological solutions, like an EDC, work at their maximum potential when they are in harmony with people and process. But, the triad has been thrown off balance by the rise of remote working and reduction in staff numbers. While all businesses recognise that sensitive data needs to be encrypted and access should be restricted, this has been a difficult feat as employees work from home and use devices outside of the traditional network security parameters. In fact, nearly half (48%) of employees are less likely to follow safe data practices when working from home. This will exponentially increase the risk of data breaches.

In addition, with almost a fifth (18%) of the UK workforce on furlough and team numbers shrinking, companies don’t have the same amount of manpower to validate both the systems being used, as well as the data being run in these systems, to ensure that they are compliant. Within the office environment, organisations were able to create ‘islands of perfect governance’, with all departments being aware of the applications used to manage data and therefore, guaranteeing higher levels of compliance. However, these safety nets have collapsed during home working and it’s become more difficult to ensure the security and privacy of data within an enterprise.

What’s needed here is an overarching framework that provides a standard for data governance. This is enabled by having the right technology solution, a proactive approach to data management and people within a business supporting it from the bottom up in place — forming a triad that works in perfect harmony. A framework such as this also enables enterprises to assess what they need to do to create data protection rules internally that ensure compliance, and allows employees to self-check their data security protocols eliminating any uncertainty about protecting sensitive data.

It is important to remember that the right technology alone won’t make people compliant – whether they are working in an office or remotely. Rather, as pointed out above, it is technology, people, and process, working in sync, that will ensure that regulations are adhered to and data is managed and protected.

Long-lasting success with data protection

With data volumes growing and remote working creating security vulnerabilities, financial businesses need to get on top of their data from the get-go. By proactively identifying sensitive data, accurately securing it, and delivering trusted data to end-users, the right data can be put into the hands of the right people.

Creating a watertight data privacy strategy requires financial organisations to deliver a uniform approach to data management and protection across departments to ensure compliance. In addition, harnessing technology, such as an EDC, will provide visibility and control over sensitive data, enabling financial institutions to unlock real-time insights from their data while still providing a consistent layer of security. With technology, people and process in harmony, enterprises can operate with the confidence that their data is being managed successfully and they are compliant with both existing and new regulations.

Technology

Optimising and Securing Device Management in a Corporate Environment

Published

on

Optimising and Securing Device Management in a Corporate Environment 2

By Nadav Avni, Marketing Director at Radix Technologies

The proliferation of digital devices used in every organisation has only grown in the past few years. Digital devices provide greater flexibility and mobility for companies, but they also create more of a burden on IT teams and administrators to manage it all. Is there a device management solution powerful enough to support your corporate needs?

What Is Mobile Device Management (MDM)?

Mobile devices have more capabilities than ever before – and they’re accessing more sensitive and property data, too. In fact, 42% of enterprises now consider themselves mobile-first. As more employees moved to remote work, it underscored the need for greater security. At the same time, it made device management more difficult for IT teams.

Mobile Device Management (MDM) allows the remote management of every device in an organisation’s fleet from a centralised platform that’s accessible from anywhere. It gives complete control of devices and provides a way to manage settings, policies, and security in one place.

The Importance of MDM

Nearly three-quarters (74%) of CFOs said they expect to keep some employees working from home and shift others to remote work permanently. The need to manage devices remotely isn’t going away even when the pandemic is over. Even when employees are working on-site, they still use mobile devices.

Smartphones, laptops, tablets, and other single-use devices all need management. Workers may be in different locations than IT administrators. MDM allows efficient remote management of every device in the fleet regardless of the administrators’ and employees’ location.

Some of the core functions of mobile device management include:

  • Managing setting and policies
  • Monitoring app usage and performance
  • Updating equipment, software, and applications
  • Monitoring health of equipment
  • Monitoring equipment location, status, and activity
  • Remote device control for diagnosis and troubleshooting
  • Encryption of email and files
  • Segregation for work and personal device use, creating separate and secured environments for work data.

More than Security

Most MDM solutions focus mainly on Enterprise Mobility Management (EMM) and the security layer. A fully-featured MDM/EMM system adds another layer that provides comprehensive device management. This gives IT administrators the ability to manage nearly every type of device running on every major operating system from one platform.

Flexible solutions can be installed as an on-premises solution or on the cloud for reduced latency, redundancy, and end-to-end security with encryption. When you’re running a mobile device management platform in the cloud, the service provider automatically applies updates and patches. Hence, it’s one more thing you won’t need to worry about. It also makes it easier for administrators to access the platform remotely.

Managing Compliance

Nadav Avni

Nadav Avni

Mobile devices increase the possibility of data breaches or leaks. Besides the possibility of cyber-attacks, a staggering number of laptops and smartphones are lost or stolen. On average, 70 million devices are lost or stolen annually, with less than 10% of ever being recovered. This is an exceptionally big problem for managing compliance in regulated industries, such as healthcare, financial, and other businesses.

A robust MDM/EMM software provides end-to-end security and encryption to protect data. Devices can be tracked with geofence and anti-theft filters. If a device leaves an authorised area, it triggers a warning note to administrators, who can remotely lock the device or wipe the data. MDM/EMM apps with advanced security features also create snapshots on the fly even while devices are running to make restoring or recovery from virus attacks or system crashes easier.

Besides automated data audits, these functions help organisations comply with even the most stringent compliance regulations, including GDPR, the EU’s General Data Privacy Regulations. It also acts as an essential element in complying with HIPAA, SOX, FISMA, PCI DSS, and other regulations.

More Efficient Deployment

Devices can be deployed in batches with preset configuration, settings, and corporate policies. By automating enrollment tasks, the devices can be up and running in your environment without user intervention. It all happens in the background the first time a device is fired up and connected to a network.

Besides the platform’s native and priority enrollment modules, devices can also be deployed using a range of platforms. This provides an extremely friendly out of the box experience (OOBE) for employees without tying up IT teams for hours to configure new devices.

Tools for All Stakeholders

Modern MDM/EMM tools also provide sophisticated reporting tools to all stakeholders in the organisation. IT teams can manage the entire device fleet holistically or drill down to any individual device. Managers can look at adoption and usage rates. CFOs can look at the ROI. Each automated report can be customised to show what each group of stakeholders needs to make data-driven business decisions.

Tools for OEMs and Vendors

APIs are usually available for solution developers. That means the platform can be embedded in device firmware and integrated at the factory level for OEMs. System-level integration is also possible, so mobile device management software can be pre-installed and ready to go upon device delivery.

Managing Use and Content

Not every employee needs every functionality on every device. MDM software allows you to apply single-app or multi-app kiosk mode. This creates an encapsulated environment with access to the functionality and apps you determine.

It creates a consistent look-and-feel for devices and control device elements, such as locking down external ports or preventing unauthorised interaction of non-company installed apps. You can limit external internet use or enable/disable Wi-Fi or Bluetooth connections.

Device Management Solution

One of the biggest barriers to continued remote work is the lack of technology and infrastructure to allow remote employees to work productively. Therefore, implementing a modular and flexible MDM/EMM solution is key to successfully and efficiently managing your devices. Look for one that not only accomplishes the points listed above but one that also allows customisation for just about any use case. Take control of your entire mobile device fleet and gain the ability to finally manage nearly every aspect with ease.

Continue Reading

Technology

2021: A year of digital enablement

Published

on

2021: A year of digital enablement 3

By Peter O’Halloran, Vice President, Global Digital Commerce, Fiserv

In 2021, digital innovation will continue to accelerate, allowing businesses to shift to new ways of operating and adapt to changing consumer behaviour and expectations. We will continue to see an increase in digital commerce and alternative payment methods, and more intertwined physical and digital experiences. Here are my five predictions for the year ahead.

  1. Digital commerce will continue to rise

This year, businesses will be focused on ramping up existing avenues of growth and generating new ones, leaning into experiences and incorporating lessons learned during the pandemic. To stay ahead of the competition, drive sales, and continually engage with customers, we’ll see businesses send out special offers on a more regular basis, integrate loyalty and gift schemes, as well as offer additional value-added services, such as click-and-collect services that allow people to pick up online orders in store, free shipping and better options on returns.

  1. Physical and digital environments will blend

A growing consideration for businesses is how to optimise and connect digital and physical experiences. There has been an exponential rise in click-and-collect services, virtual queuing and appointment systems. According to 2019 research from Barclaycard, a third of retailers (34%) saw in-store sales increase after offering click-and-collect services. And by digitalising certain parts of the customer experience, businesses from restaurants to salons can operate more safely in their physical locations. Apps that allow customers to order and pay for food in advance, or book time slots for in-person services, are some examples of how businesses will continue to connect the physical and digital environments as they navigate the current landscape.

  1. Alternative payment methods will proliferate

Consumer payment habits have shifted significantly since the start of the pandemic. The recent Expectations & Experiences report from Fiserv found that a large number of consumers have increased their use of mobile payment apps and person-to-person (P2P) payments, and that they expect those changes to last. We will also likely see an increase in the adoption of proximity payments, such as mobile payments, NFC payments and QR codes.

Peter O’Halloran

Peter O’Halloran

In addition, the rise of digital payments could also accelerate the adoption of local or regional payment methods to better engage with customers. There are a number of methods that have emerged and already gained popularity, such as Klarna across Europe, Paytm in India and Brazil’s Boleto voucher system.

  1. Commerce-enabled Internet of Things (IoT) will grow

As consumers continue to expect new payment forms and digital experiences, businesses will continue to adopt more innovative capabilities. There is a growing usage trend for IoT in commerce, such as smartphone-based or voice-enabled capabilities. From grocery, fashion to other day-to-day activities such as paying for petrol, IoT devices can enable businesses to harness customer data to gain further insight into their behaviour and provide personalised offers and services. The new year will see commerce-enabled IoT increase, as well as further digital innovations to help grow revenue streams and enhance customer experience.

  1. Security will continue to be a priority

As more activity moves online, security is more vital than ever. 2020 saw a proliferation of COVID-19 related scams and fraud, such as phishing emails on relief funds or health information. These trends will likely continue, evolving to latch on to the concern of the moment, and we will see businesses, payment providers and financial institutions increasing their investment in the appropriate fraud solutions to protect both their organisation and customers.

Regulatory requirements will also continue to bolster security and fraud management. In Europe, regulations such as Strong Customer Authentication (SCA), which is part of the EU Revised Direction on Payment Services (PSD2), help ensure that payments are secured with multi-factor authentication, providing additional security and assurance for consumers.

A digitally-enabled future

Many businesses have successfully adapted to a new way of operating. As we go into the new year and continue to navigate the challenges posed by the pandemic, businesses will be able to rely on those learnings to adjust quickly to changes that come their way.

Continue Reading

Technology

Viewpoint: Autonomous Cloud Security 

Published

on

Fortinet Expands Integration of Cloud Security Offerings with Microsoft Azure to Provide Advanced Protection

By Scott Dodds, CEO Ultima 

Moving to the cloud securely remains a significant challenge of flexible working 

While the end may be in sight for full-scale remote working, most companies are looking to continue with flexible working in some form or other. The benefits that both employers and employees have reaped in terms of cost reductions and flexibility are unlikely to be given up quickly. But in a recent survey of customers, Ultima has found that many challenges still exist for companies if they are to embrace flexible working successfully in the long-term.

The pandemic has forced many companies to innovate at an unprecedented rate, and digital transformation has moved on in a year to a place it would have taken five or more years to do. But many businesses are still struggling with the new normal. They have become more susceptible to cyberattacks, and poor IT infrastructure has resulted in poor employee experience causing productivity and profits to fall.

In a recent survey of over 200 prospective customers, Ultima asked about the challenges they were facing due to current requirements for remote working. Nearly half (41%) cited security concerns as an issue and 17% application access.

IT infrastructure is a cause for concern too. While many companies have embraced the advantages of cloud computing during the lockdown, over a third (37.5%) of respondents, don’t believe they have the capability to move to the cloud. There were a variety of reasons why the respondents don’t think they have the capability, with 16% saying it was due to legacy applications and another 16% saying it was due to budget constraints or challenges. A further 12% per cent blamed lack of in-house technical expertise and another 10% on investment being made in on-premise infrastructure.

The pandemic has created exponential growth in companies requiring cloud services, but their IT staff don’t have all the technical skills to effectively and safely move them to the cloud. This leaves companies open to security vulnerabilities as well as meaning they are not optimising their cloud environment.

While many businesses have risen to the challenges of remote working, infrastructure and security remain an issue. But automated cloud services with in-built security solutions can solve these problems. They can be bought on a pay-as-you-go basis, addressing large CAPEX outlay issues and allowing companies to overcome legacy application issues and provide security that protects both employee and company from outside attack.

Lack of capability and capacity solved  

For those companies who’ve still not made the leap to the cloud, automated cloud migration services exist that can overcome the financial and skills shortage barriers to entry. Managed Service Partners (MSPs) can provide technical expertise and technical solutions to make this possible. The results of moving to the cloud can be spectacular too: from an average 30% reduction in expenditure and up to a 750% increase in productivity. They also have no upfront costs.

Using Microsoft Azure’s open and flexible cloud computing platform, for example, combined with automated migration, you no longer need to look after and buy hardware, or sort out power and cooling. Your IT infrastructure and security can be run on a pay-as-you-go basis. And if you need increased capacity, automation means you can extend your on-premises data centres and infrastructure to Azure within a few hours, providing the extra capacity required for critical systems and applications.

Poor security solved  

We know that traditional security solutions don’t work well in the cloud. When customers move to the cloud, they try and take their traditional security solutions with them. But as the cloud works in a very different way to on-premises, this leaves companies open to vulnerabilities. You need a made for purpose solution, based on cloud security best practice.

With the latest automation technology security and monitoring solutions are automatically applied to existing and new workloads. It scans the collected data and includes proactive monitoring around security events that will let you know exactly what’s happened in clear-to-understand alerts, and where action should be taken if needed, covering critical areas such as anti-malware. IT staff can view in real-time their security and compliance reporting. Soon we will be able to scan a customer’s environment for security-related bad practice or incidents and make recommendations on how to fix them and even give them a score as to how they are doing.

At Ultima, we’ve also found that on moving to the cloud customers have poor visibility of what is going on in their environment. We know about 25% of companies don’t even realise they have high severity patches missing. This is down to a skills shortage and a lack of time – as patches are often done manually.

With automated cloud services, patching happens automatically on repeat and even scales as your infrastructure grows. If a patch is due and fails for whatever reason the system will automatically create an alert. This information will go to the third line technical team, and they will investigate it themselves, whether that’s your MSP or your own IT staff. The time savings to the IT department are huge – often 100’s of hours a year – enabling them to focus on other projects and have peace of mind about security.

Traditionally, you would do a true-up every month or quarter of your IT environments to bring new things, including security issues, to the management. But when you are in the cloud, you can spin things up so fast, that you will have a gap if you are only doing a true-up every month or quarter. With an automated service, you can automatically onboard things, so you don’t have to wait for the true-up process, which means you have a more proactive security service and less vulnerability. We’ve found that customers who are using automated cloud services have a 66% reduction in security incidents.

Lack of visibility of critical data solved  

With ever increasing cloud resources, it can be hard to get visibility into your cloud infrastructure. The technology exists now to automatically scan and configure your cloud resources with centralised logging and telemetry capabilities. As your environment grows, this process repeats itself automatically as it scans and configures itself when new resources are added. This means that all logging information is available, and you can also see on one dashboard insights into your security posture. Usually, it’s hard to see what’s happening from a security perspective – what data is coming in and going out, top destinations, any malicious activity detected in the last 24 hours, etc. Automated services give customers a dashboard that centralises all the information to see what is happening in a simplified format and how your infrastructure is performing at a high level.

These new autonomous cloud services enable companies to free up 100’s of hours of IT staff time and reduce security incidents. Moving to the cloud has previously been a struggle for some companies as costs escalated for support, maintenance and security. New technology has changed that and is ensuring security and infrastructure are no longer barriers to successful cloud deployments and productive, flexible working.

Continue Reading
Editorial & Advertiser disclosureOur website provides you with information, news, press releases, Opinion and advertorials on various financial products and services. This is not to be considered as financial advice and should be considered only for information purposes. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third party websites, affiliate sales networks, and may link to our advertising partners websites. Though we are tied up with various advertising and affiliate networks, this does not affect our analysis or opinion. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you, or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish sponsored articles or links, you may consider all articles or links hosted on our site as a partner endorsed link.

Call For Entries

Global Banking and Finance Review Awards Nominations 2021
2021 Awards now open. Click Here to Nominate

Latest Articles

Putting data protection back on the financial agenda 4 Putting data protection back on the financial agenda 5
Technology7 seconds ago

Putting data protection back on the financial agenda

By Wim Stoop, CDP Customer and Product Director, Cloudera Despite the wave of changes that Brexit has brought financial organisations,...

UK jobless rate hits 5.1% as Sunak readies more job support 6 UK jobless rate hits 5.1% as Sunak readies more job support 7
Top Stories1 min ago

UK jobless rate hits 5.1% as Sunak readies more job support

By William Schomberg and David Milliken LONDON (Reuters) – Britain’s jobless rate rose to 5.1% in the last three months...

Britain's G4S recommends $5.4 billion Allied Universal bid, ending takeover tussle 8 Britain's G4S recommends $5.4 billion Allied Universal bid, ending takeover tussle 9
Business6 mins ago

Britain’s G4S recommends $5.4 billion Allied Universal bid, ending takeover tussle

(Reuters) – Private security firm G4S on Tuesday recommended shareholders vote for Allied Universal’s final offer valuing the British firm...

Deloitte launches its Doing Business Guide for the United Arab Emirates: Business agility in a COVID environment 10 Deloitte launches its Doing Business Guide for the United Arab Emirates: Business agility in a COVID environment 11
Business7 mins ago

Deloitte launches its Doing Business Guide for the United Arab Emirates: Business agility in a COVID environment

Since the onset of the COVID-19 pandemic, the United Arab Emirates (UAE) has taken vast measures to ease doing business...

Damage to United Boeing 777 engine consistent with metal fatigue - NTSB 12 Damage to United Boeing 777 engine consistent with metal fatigue - NTSB 13
Top Stories9 mins ago

Damage to United Boeing 777 engine consistent with metal fatigue – NTSB

By David Shepardson and Jamie Freed WASHINGTON (Reuters) – Damage to a fan blade on an engine that failed on...

Oil prices jump more than $1 as U.S. output slow to restart 14 Oil prices jump more than $1 as U.S. output slow to restart 15
Top Stories11 mins ago

Oil prices jump more than $1 as U.S. output slow to restart

By Jessica Jaganathan SINGAPORE (Reuters) – Oil prices jumped by more than $1 on Tuesday, underpinned by optimism over COVID-19...

Total sells wind and solar farm stakes to Credit Agricole and Banque des Territoires 16 Total sells wind and solar farm stakes to Credit Agricole and Banque des Territoires 17
Business14 mins ago

Total sells wind and solar farm stakes to Credit Agricole and Banque des Territoires

PARIS (Reuters) – French energy group Total has agreed to sell off stakes in some wind and solar farms to...

What banks need to know about observability 18 What banks need to know about observability 19
Banking49 mins ago

What banks need to know about observability

By Abdi Essa, Regional Vice President, UK&I, Dynatrace More aspects of our everyday lives are taking place online – from how we...

What finding Alice has taught us about the pitfalls of no will 20 What finding Alice has taught us about the pitfalls of no will 21
Investing56 mins ago

What finding Alice has taught us about the pitfalls of no will

ITV’s latest television drama Finding Alice has been a necessary diversion during these endless winter weeks of lockdown, but it...

Unlocking the potential of APIs 22 Unlocking the potential of APIs 23
Top Stories1 hour ago

Unlocking the potential of APIs

Corporate expectations for fast, efficient and convenient payment services are now the norm. BNY Mellon Treasury Services’s Sindhu Vadakath, Head...

Newsletters with Secrets & Analysis. Subscribe Now