Attacks On Financial Services Are Increasingly Sophisticated

Phishing attacks, in which carefully targeted digital messages are transmitted to fool people into clicking on a link that can then install malware or expose sensitive data, are becoming more sophisticated, but the other main reason UK businesses are ‘up at night’ in terms of cyber security is because of untrained and malicious users. 

IT security has become more highly prioritised by organisations, due in some cases to increased threats and in other cases, tougher legislation and cyber attacks were found to be the joint second most cited risk to the stability of the UK financial system in a recent survey by the Bank of England.

Maintaining organisational security against cyber threats is a unique challenge of trying to hit an always moving target with a Tool kit that’s trying to keep up. Cyber criminals are focused on the targeted game; identifying specific industry verticals, organisations, and even individuals, and devising tailored scams and attacks to maximise success.

In addition, there are notable increases in frequency, sophistication, and scope of ransomware, phishing, business email compromise, and malware attacks.
 
Ransomware has grown to include data theft and extortion to increase the chances of successful attack. The use of deepfake audio is now being used to trick users over the ‘phone, and attackers are no longer satisfied with raking in thousands of dollars when millions are plausible.

The challenge for Information Security leaders is to establish and maintain a layered security strategy that protects the organisation and its users. But the ever-changing landscape of threats, attacks, and malware has some of them deeply worried.

Ransomware, phishing, business email compromise, and malware attacks are becoming greater in frequency, sophistication and scope.

As for compliance with data and related security regulations, the survey of some 200 UK organisations found US-based regulations HIPAA and SOX that have both been around for decades appear to be as much an issue for UK firms as newer regulations, such as the 2018 GDPR Which is the EU-wide new data protection law.

Almost every initial attack vector, emails, links, attachments, webpages, requires the interaction of a user, whether malicious and either negligent or unwitting.

As the survey put it, the executive management of UK firms is more concerned with strategy and any business disruption that may keep those initiatives from succeeding, while IT professionals generally concern themselves with a more tactical perspective around keeping the business running; hence by and large, IT staff concerns are misaligned with those of their executives.

Bank of England:     Professional Security:     KnowB4:         ITProportal:

You Might Also Read: 

Financial Executives Are Out Of Touch With Cyber Threats:

 

« US Companies Hit With A New Ransomware Campaign
Australia To Spend Another A$1billion On Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.