Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > The Importance of Browser Security in Financial Institutions
    Technology

    The Importance of Browser Security in Financial Institutions

    The Importance of Browser Security in Financial Institutions

    Published by Jessica Weisman-Pitts

    Posted on February 1, 2023

    Featured image for article about Technology

    By Alon Levin, VP of Product Management at Seraphic Security

    Once upon a time, financial institutions had to deal with criminals like John Dillinger, Bonnie (Parker) and Clyde (Darrow), and Valerio Viccei who committed crimes worthy of—and sometimes depicted in—Hollywood movies. While the threats facing the average financial institution are less sensational than the Knightsbridge Security Deposit robbery or the Banco Central burglary at Fortaleza, there is a reason the cybersecurity industry remains rife with references to the apocryphal Willie Sutton quip about banks being “where the money is. ” The threats—though less dramatic—remain pervasive.

    Instead of individuals, modern villains are criminal gangs with sinister names like “Carbon Spider” and “Stardust Chollima.” Instead of physical break-ins, modern “heists” are more likely to be cyberattacks, though the risk is not limited to hard currency. Financial services firms also hold a wealth (pun intended) of information on their clients and customers. No doubt, this combination of assets and data is why the Boston Consulting Group found that financial services firms are 300 times more likely to be targeted by cyberattacks than companies in other sectors. The same research also found that, even though the cost of addressing a cyberattack is especially high for banks and wealth managers, most are not equipped to respond to cyberthreats.

    Software, not safe deposit boxes

    Even though much of what financial services companies do relates to physical assets, most of the work is digital. Both employees and customers conduct their business electronically and they both use a common tool: web browsers. In the case of employees, many (if not most) core business applications have been “webified” and even legacy “green screen” applications can be delivered through the browser.

    However, unlike legacy software applications, browsers can and do access resources outside the enterprise network. Similarly, online banking is the norm rather than the exception for most customers, but they do more with browsers than handle their finances. Because of their pervasiveness, portability, and mixed-use browsers can be the target of several types of attacks:

    • Phishing – While this technique is usually associated with email, the browser is where the real damage is done. Attackers use official-looking emails to lure victims to authentic-looking websites and harvest their credentials, deliver malware, or trick them into authorizing fraudulent transactions. Attackers can use the stolen credentials and malware to further compromise and extort the organization, or just “take the money and run.”
    • Adversary-in-the-Middle – This technique enables an attacker to eavesdrop on and potentially manipulate data in transit between the browser and a server. Such an attack may enable an attacker to steal sensitive data and disrupt business operations.
    • Exploitation – Browsers are complex pieces of software, and all software has bugs, some of which can be leveraged by attackers to execute malicious code. Organizations are particularly susceptible to exploitation if they are unable to rapidly deploy the patches that mitigate the underlying vulnerabilities. Attacks of this type have similar consequences to those listed above and can give attackers an important foothold in a critical tool that provides broad access to enterprise resources.

    Securing the virtual premises

    There are a variety of physical security measures ranging from specialized vault doors to motion detectors to silent alarms that have developed to make bank robberies more difficult. Many IT security solutions also exist, although browsers have historically been under-defended. But ignoring the browser is like failing to protect the teller window: they are where important transactions take place and where criminals can gain critical access.

    Fortunately, solutions exist that can embed better security directly in the browser and prevent the attacks described above. These solutions allow for safe browsing so that end-users can perform both work and personal tasks, using whatever browser on whatever device they choose, without risk to themselves or to the organization. These solutions also include data leakage/ loss prevention (DLP) and other policy controls to protect sensitive data—such as customer information—from accidental or intentional disclosure. Embedding these capabilities in the browser, instead of trying to implement them with external tools, provides both a better defense and a better user experience. It also means that, even as hybrid and remote work persists, organizations can provide consistent protection and policy enforcement, regardless of employee location.

    To torture an old banking idiom a bit, it’s important to “look after the pennies so the pounds will look after themselves.” That is to say that starting with something small, like browser security, can help build an important foundation for securing the rest of the organization. The technology exists and—like any investment—the best time to start is yesterday. The second-best time is now.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostThe Rise of ‘Super Apps’ in Fintech
    Next Technology PostWhy identity silos and entitlement creep could be 2023’s most overlooked cybersecurity threats

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts