Securing The Future Of Open Finance

The world of finance has changed dramatically over the past few years. From consumer relationships with banks to the software financial institutions (FIs) are deploying to create a seamless experience for customers, those operating within the banking industry have had to adapt accordingly. With this adoption offers new opportunities, but also new challenges. 

The correlation between advancing technology and cyber security concerns is not new. In recent years, vulnerabilities have often been exploited as quickly as new technologies are rolled out, and while FIs are far wiser to the risks than they once were, there is still more that can be done. 

A key example of this is the continued rise of Open Banking on a global scale. Through Open Banking initiatives, Fintechs can utilise relevant consumer data, direct from banks and non-bank financial institutions, through Application Programming Interfaces (APIs) to build improved customer offerings. In turn Open Banking offers customers the opportunity to access these enhanced services across many different institutions and service providers, thus creating hyper personalisation and an improved user experience. While Open Banking has the potential to revolutionise the financial industry, recent research from Curity shows that concerns such as data sharing are prevalent amongst financial institutions, in part due to the introduction of several data protection regulations. 

Common Concerns & How To Address Them 

While 71% of businesses plan to adopt Open Banking in the next 18 months, the same number have concerns around security issues and the largest concern these businesses have on a global scale is related to outdated systems.  Businesses need reliable systems in place in order to manage the data sharing process, to introduce new applications and services that require a robust technology support system.

Without these systems businesses risk falling behind their more advanced counterparts and will lose customers who can find better experiences elsewhere. 

To the benefit of many businesses, Open Banking is built on data protection regulation on a global scale and requires financial-grade security protocols to be in place. OAuth 2.0 and OpenID Connect, while considered complex, support businesses in offering robust security frameworks that deliver Open Banking at no cost of safety to customers.

By implementing financial-grade security, businesses can gain peace of mind that the systems they are building are appropriate for their consumer audience. 

OAuth 2.0 is a crucial authorisation framework specifically designed for API security. It allows unrelated servers to authorise access without sharing the original log-on credential, and without giving third-parties full, permanent access. It offers businesses the flexibility to add additional layers on top of its framework, such as OpenID Connect. 

OpenID Connect is built as an identity layer that sits on top of the OAuth 2.0 protocol. It is the leading industry standard for cross-domain single sign-on and identity, and is known for its ease of use for web, mobile and script users who wish to request and receive information about authenticated sessions and end-users. By using JSON Web Tokens, and sitting atop of OAuth 2.0, it is considered API-ready, and feeds vital information back to businesses by showing who is logging on, and how regularly. Its main benefit is that it is “oven-ready” meaning businesses aren’t faced with surprises or additional add-ons due to the standardised set-up, instead operating as a standard protocol on how to authenticate log-in attempts, and how these results are presented. 

Paying Attention To Financial-Grade Security Is Key

Other concerns businesses have when it comes to Open Banking are around managing external third-party data providers and legacy systems. We know that ignoring these concerns and not effectively deploying the appropriate technology to manage them can have catastrophic consequences, in particular, increasing the risk of data breaches.                     

Businesses must ensure they are paying attention to financial-grade security, as well as regulatory requirements in order to maintain customer relationships and build their business acumen.  In doing so, this should give businesses peace of mind about their handling of customer data.

This will also provide organisations with the tools necessary to manage the Open Banking adoption and implementation, thus improving their offering to customers and addressing a key business concern. 

Jacob Ideskog is CTO at Curity

You Might Also Read: 

Identity Access Management  Essentials:

 

« Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure
Why Companies Need A Next-Gen Approach To Business Continuity »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Shield-IOT

Shield-IOT

Shield-IoT provides real-time analytics and cyber security solutions for deployment in mass scale B2B and IIoT networks.

Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment. We destroy all data passed to us safely and securely.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Anura

Anura

The world’s most accurate ad fraud solution protects your web assets by eliminating bots, malware and human fraud, ensuring your content is seen by real people.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

BestDefense

BestDefense

BestDefense offers proactive cybersecurity solutions that adapt in real-time to outpace evolving threats and ensure resilient protection for your critical assets.