Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Top Stories > WHATSAPP INSIDER TRADING BRINGS GROWING DATA THREAT FOR FIRMS TO LIGHT
    Top Stories

    WHATSAPP INSIDER TRADING BRINGS GROWING DATA THREAT FOR FIRMS TO LIGHT

    WHATSAPP INSIDER TRADING BRINGS GROWING DATA THREAT FOR FIRMS TO LIGHT

    Published by Gbaf News

    Posted on May 6, 2017

    Featured image for article about Top Stories

    By Phil Beckett, MD, Alvarez & Marsal

    Technology is a part of our world which is constantly in flux, changing and evolving at a pace which we haven’t witnessed since the likes of the industrial revolution. The past 20 years has seen society flipped completely on its head: social media and smart phones are now commonplace on a global level, and access to the internet has gone from being a luxury to bordering on a basic human right.

    However, this comes with a price – and that price is security. All the technology and digital communication methods we use leave data trails behind them, collecting enormous amounts of information about who we are, what we do, and how we communicate. We are sending and receiving knowledge at a faster rate than we ever have before – and with Facebook announcing the development of things like mind-reading technology, this is only set to increase. Unfortunately, this will not come without consequences.

    We need multiple devices – such as laptops, tablets and phones – just to do our day jobs, and these all possess lengthy and sensitive data histories. On top of this, many employees have personal phones which are brought into the workplace on a day to day basis. These devices also come with huge amounts of information: with the problem being that this is data which isn’t logged by businesses. This opens up the possibility of rogue records being shared unwittingly or left largely unmonitored by people and organisations who may want to protect them.

    This presents firms of all sizes across every sector with a problem: how can the data coming in and going out of the business be tracked?

    In reality, it is becominga near impossible challenge for firms to successfully monitor all of their data (and what exactly is being done with it) without complex sets of rules that can be stifling and stringent. Guidelines about how employees utilise technology – and even their social media accounts – are now extensive and commonplace. The consequences of such rules being broken were highlighted recently in the widely-reported Financial Conduct Authority (FCA) case: a former employee was found guilty of passing confidential client information to a personal acquaintance and friend using Whatsapp.

    According to the National Security Agency (NSA), the former employee “received client confidential information during the course of his employment and, on a number of occasions between 24 January and 16 May 2016, shared that information with both a personal acquaintance and a friend, who was also a client of the firm”. Essentially, the NSA found that an employee shared private information with a friend in order to gain social capital. Worryingly, this was not a junior employee seeking a pay rise or behaving in a juvenile manner due to inexperience. It was a senior executive in a leadership position, who is now facing a £37,000 fine as a penalty for the breach.

    Obviously, this case is highlighting quite an alarming issue. All of this information was passed digitally, through an app that the employee’s company did not have access to. If that employee had been asked to pass over hard copy documents of this information, would he have done so? Or is there a perception that sensitive information is less important when it’s transmitted via email or social media, instead of a hard copy? Although we may view digital communication as a more casual medium, the content is still going to be the same, and this issue needs to be addressed quickly.

    We are aware from the media that data threats are almost omnipresent – we encounter new ones each day. Thus, the implications of how poorly organised and monitored data can contribute to these threats must be recognised. As the General Data Protection Regulation (GDPR) comes into action next year, there will now be formalised rules around how firms should be utilising data. Businesses must therefore put controls into place to ensure their data is stored in a compliant manner so that it is safe from abuse and protected from penalties or leaked information which could hurt their finances and reputations.

    But how can this be achieved?

    Most firms, unfortunately, keep data as an afterthought at best, with mismanagement being commonplace. This can thankfully be resolved by advising the implementation of templates and processes which dictate how data can be utilised by businesses without being manipulated or misused. Audits and detailed analysis will also be required to determine the exact data that businesses are holding, outlining who has access to it and if there is any potential for abuse to take place.

    Auditing – identifying the potential risks

    A large challenge for most firms is figuring out what data to keep in their information libraries, and what should be permanently erased. Names, addresses, employment, legal history or payment details are usually necessities – however this can create huge amounts of information which takes up lots of space. This will generate issues when ensuring safety and locating specific data sets, particularly if data goes back for many years and is held across multiple locations.

    It’s also not unusual for large amounts of data to be sent across multiple mediums of communication, and stored on multiple servers and data bases. There’s also the issue of information extracts which people will make from databases as and when they need them. This creates issues around duplication (such as customer information) – valuable information can be forgotten about easily when multiple copies exist. This obviously creates wastage in terms of value, from both a financial and time perspective.

    This is not how proper data governance should be. Information should only be held in one, secure location: this is the only way to allow for the presentation of accurate and accountable material. Dissipated data is a nightmare in terms of both legality and time wastage: if data exists across multiple platforms, and must be located quickly, it can create a black hole in terms of resources.

    What it means moving forwards

    As demonstrated by the widely reported Whatsapp case, tracking how sensitive business data is utilised is another difficulty for data management. Tracing who is accessing what data is difficult, as while some data may be confined to different parts of a business (such as HR or finance), other sets of data can be readily accessed by a broad range of people across an organisation. This can sometimes be the case in client facing firms, with client teams that have varying levels of seniority clearance to view budgets and sensitive information. Whilst you would think non-disclosure agreements (NDA) would cover this issue, what’s to stop an employee Whatsapping information to a friend? The fact a prosecution has now been made is the first public example of social media being utilised to transfer sensitive information to external personnel.

    How can we know that this is the only case? The fact that this instance has come to light suggests there are potentially other, undetected cases of employees transferring data in and out of businesses via various digital communication mediums – of which we now have many to choose from.

    Businesses can no longer afford to ignore this issue and must take action to safeguard their data. Employing technologies and techniques such as Data Loss Prevention, periodic forensic analysis of devices and regular and robust analysis of relevant network logs can help firms to identify who is accessing what data and how they are accessing it. Following this analysis, organisations can begin to develop rules about who is able to access certain data sets and how it can be utilised both internally and externally.

    When it comes to data access, there should be restrictions around accessibility to sensitive data, with a clear chain of command in terms of approving employee access. This procedure can also help to flag deadweight data which either has no further use or is simply being stored for historical purposes – allowing for deletion to save space where appropriate.

    Keeping a close eye on what data is being accessed and how will be key for firms moving forwards. The FCA Whatsapp case highlighted the ease with which employees could access sensitive information and pass it to an external person. The worrying truth is that far worse cases could be going on. Firms could be blissfully unaware of damage being done under their noses, as the data governance they are undertaking does not allow for proper prevention. Data can no longer be overlooked in terms of the legal threat it poses: we must begin to treat it as the “gold dust” it truly is by recognising it as equal in importance to financial information.

    Making sure that data access within an organisation is closely monitored will be key for firms moving forwards if they wish to comply with data regulations as they stand.

    My advice would be as follows: When it comes to data, take action, take care, and take it seriously.

    By Phil Beckett, MD, Alvarez & Marsal

    Technology is a part of our world which is constantly in flux, changing and evolving at a pace which we haven’t witnessed since the likes of the industrial revolution. The past 20 years has seen society flipped completely on its head: social media and smart phones are now commonplace on a global level, and access to the internet has gone from being a luxury to bordering on a basic human right.

    However, this comes with a price – and that price is security. All the technology and digital communication methods we use leave data trails behind them, collecting enormous amounts of information about who we are, what we do, and how we communicate. We are sending and receiving knowledge at a faster rate than we ever have before – and with Facebook announcing the development of things like mind-reading technology, this is only set to increase. Unfortunately, this will not come without consequences.

    We need multiple devices – such as laptops, tablets and phones – just to do our day jobs, and these all possess lengthy and sensitive data histories. On top of this, many employees have personal phones which are brought into the workplace on a day to day basis. These devices also come with huge amounts of information: with the problem being that this is data which isn’t logged by businesses. This opens up the possibility of rogue records being shared unwittingly or left largely unmonitored by people and organisations who may want to protect them.

    This presents firms of all sizes across every sector with a problem: how can the data coming in and going out of the business be tracked?

    In reality, it is becominga near impossible challenge for firms to successfully monitor all of their data (and what exactly is being done with it) without complex sets of rules that can be stifling and stringent. Guidelines about how employees utilise technology – and even their social media accounts – are now extensive and commonplace. The consequences of such rules being broken were highlighted recently in the widely-reported Financial Conduct Authority (FCA) case: a former employee was found guilty of passing confidential client information to a personal acquaintance and friend using Whatsapp.

    According to the National Security Agency (NSA), the former employee “received client confidential information during the course of his employment and, on a number of occasions between 24 January and 16 May 2016, shared that information with both a personal acquaintance and a friend, who was also a client of the firm”. Essentially, the NSA found that an employee shared private information with a friend in order to gain social capital. Worryingly, this was not a junior employee seeking a pay rise or behaving in a juvenile manner due to inexperience. It was a senior executive in a leadership position, who is now facing a £37,000 fine as a penalty for the breach.

    Obviously, this case is highlighting quite an alarming issue. All of this information was passed digitally, through an app that the employee’s company did not have access to. If that employee had been asked to pass over hard copy documents of this information, would he have done so? Or is there a perception that sensitive information is less important when it’s transmitted via email or social media, instead of a hard copy? Although we may view digital communication as a more casual medium, the content is still going to be the same, and this issue needs to be addressed quickly.

    We are aware from the media that data threats are almost omnipresent – we encounter new ones each day. Thus, the implications of how poorly organised and monitored data can contribute to these threats must be recognised. As the General Data Protection Regulation (GDPR) comes into action next year, there will now be formalised rules around how firms should be utilising data. Businesses must therefore put controls into place to ensure their data is stored in a compliant manner so that it is safe from abuse and protected from penalties or leaked information which could hurt their finances and reputations.

    But how can this be achieved?

    Most firms, unfortunately, keep data as an afterthought at best, with mismanagement being commonplace. This can thankfully be resolved by advising the implementation of templates and processes which dictate how data can be utilised by businesses without being manipulated or misused. Audits and detailed analysis will also be required to determine the exact data that businesses are holding, outlining who has access to it and if there is any potential for abuse to take place.

    Auditing – identifying the potential risks

    A large challenge for most firms is figuring out what data to keep in their information libraries, and what should be permanently erased. Names, addresses, employment, legal history or payment details are usually necessities – however this can create huge amounts of information which takes up lots of space. This will generate issues when ensuring safety and locating specific data sets, particularly if data goes back for many years and is held across multiple locations.

    It’s also not unusual for large amounts of data to be sent across multiple mediums of communication, and stored on multiple servers and data bases. There’s also the issue of information extracts which people will make from databases as and when they need them. This creates issues around duplication (such as customer information) – valuable information can be forgotten about easily when multiple copies exist. This obviously creates wastage in terms of value, from both a financial and time perspective.

    This is not how proper data governance should be. Information should only be held in one, secure location: this is the only way to allow for the presentation of accurate and accountable material. Dissipated data is a nightmare in terms of both legality and time wastage: if data exists across multiple platforms, and must be located quickly, it can create a black hole in terms of resources.

    What it means moving forwards

    As demonstrated by the widely reported Whatsapp case, tracking how sensitive business data is utilised is another difficulty for data management. Tracing who is accessing what data is difficult, as while some data may be confined to different parts of a business (such as HR or finance), other sets of data can be readily accessed by a broad range of people across an organisation. This can sometimes be the case in client facing firms, with client teams that have varying levels of seniority clearance to view budgets and sensitive information. Whilst you would think non-disclosure agreements (NDA) would cover this issue, what’s to stop an employee Whatsapping information to a friend? The fact a prosecution has now been made is the first public example of social media being utilised to transfer sensitive information to external personnel.

    How can we know that this is the only case? The fact that this instance has come to light suggests there are potentially other, undetected cases of employees transferring data in and out of businesses via various digital communication mediums – of which we now have many to choose from.

    Businesses can no longer afford to ignore this issue and must take action to safeguard their data. Employing technologies and techniques such as Data Loss Prevention, periodic forensic analysis of devices and regular and robust analysis of relevant network logs can help firms to identify who is accessing what data and how they are accessing it. Following this analysis, organisations can begin to develop rules about who is able to access certain data sets and how it can be utilised both internally and externally.

    When it comes to data access, there should be restrictions around accessibility to sensitive data, with a clear chain of command in terms of approving employee access. This procedure can also help to flag deadweight data which either has no further use or is simply being stored for historical purposes – allowing for deletion to save space where appropriate.

    Keeping a close eye on what data is being accessed and how will be key for firms moving forwards. The FCA Whatsapp case highlighted the ease with which employees could access sensitive information and pass it to an external person. The worrying truth is that far worse cases could be going on. Firms could be blissfully unaware of damage being done under their noses, as the data governance they are undertaking does not allow for proper prevention. Data can no longer be overlooked in terms of the legal threat it poses: we must begin to treat it as the “gold dust” it truly is by recognising it as equal in importance to financial information.

    Making sure that data access within an organisation is closely monitored will be key for firms moving forwards if they wish to comply with data regulations as they stand.

    My advice would be as follows: When it comes to data, take action, take care, and take it seriously.

    Related Posts
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    Chase Buchanan Private Wealth Management Highlights Key Autumn 2025 Budget Takeaways for Expats
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    PayLaju Strengthens Its Position as Malaysia’s Trusted Interest-Free Sharia-Compliant Loan Provider
    A Notable Update for Employee Health Benefits:
    A Notable Update for Employee Health Benefits:
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Creating Equity Between Walls: How Mohak Chauhan is Using Engineering, Finance, and Community Vision to Reengineer Affordable Housing
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    Upcoming Book on Real Estate Investing: Harvard Grace Capital Founder Stewart Heath’s Puts Lessons in Print
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    ELECTIVA MARKS A LANDMARK FIRST YEAR WITH MAJOR SENIOR APPOINTMENTS AND EXPANSION MILESTONES
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Hebbia Processes One Billion Pages as Financial Institutions Deploy AI Infrastructure at Unprecedented Scale
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Beyond Governance Fatigue: Making ESG Integration Work in Financial Markets
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Why I-9 Verification Matters for Financial Institutions: Building a Culture of Compliance and Trust
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    Curvestone AI partners with The White Rose Finance Group to enhance compliance file reviews
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust
    LinkedIn Influence in 2025: Insights from Stevo Jokic on Building Authority and Trust
    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference
    Should You Take the Dealer’s Bike Insurance or Buy Online Yourself? Here’s the Real Difference

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Top Stories

    Explore more articles in the Top Stories category

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    ID-Pal Unveils ID-Detect Enhancements to Counter Surge in Digital Manipulation and Deepfakes

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    TRUST TAKES THE LEAD: HALF OF UK SHOPPERS HAVE ABANDONED ONLINE PURCHASES OVER SECURITY CONCERNS

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Why Choose Premium Driver Service in Miami Over Rideshare Apps for Business Travel and Special Events?

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Over 30 Million Users Benefit From Ant International’s Bettr Credit Tech Solutions

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    Side-Hustle Economics: How Part-Time Service Work Can Strengthen Your Financial Plan

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    London to Host Major Summit on “New Horizons” for Islamic Economy in the UK

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    BLOXX Launches World’s First Home Equity Subscription, Creating a New Residential Asset Class

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    LiaFi Addresses Gap Between Business Transaction and Savings Accounts

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Ant Group Chairman Eric Jing Outlines Strategy for Inclusive AI, Collaboration on Tokenised Settlement

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Deeply Cultivating the Syndicated Loan and Cross-Border Financing Fields: Empowering Chinese Banks’ Global Expansion with Professional Excellence

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    Ant International’s Antom Launches AI‑Powered MSME App for Finance and Business Operations

    A Gateway for U.S. Capital: Inside Kazakhstan’s Expanding Financial Hub

    A Gateway for U.S. Capital: Inside Kazakhstan’s Expanding Financial Hub

    View All Top Stories Posts
    Previous Top Stories PostSTATE STREET COMMENTS ON FRENCH GENERAL ELECTION RESULTS
    Next Top Stories PostPUTTING THE RIGHT FINGER FORWARD: WHY CONSUMER TECHNOLOGIES ARE ENCOURAGING BIOMETRIC BANKING