• Latest
  • Trending
  • All
Why zero trust security is central to operational resilience

Why zero trust security is central to operational resilience

November 21, 2022
Lufthansa Joins First Movers Coalition Amid Sustainability Drive

Lufthansa Joins First Movers Coalition Amid Sustainability Drive

March 28, 2023
How to Modernize Legacy Tech With Start-up Disruptors

How to Modernize Legacy Tech With Start-up Disruptors

March 28, 2023
BAR LAB HOSPITALITY INTRODUCES MESIBA IN WILLIAMSBURG

BAR LAB HOSPITALITY INTRODUCES MESIBA IN WILLIAMSBURG

March 28, 2023
5 reasons why you should stay for more than 3 days at Plitvice Lakes National Park

5 reasons why you should stay for more than 3 days at Plitvice Lakes National Park

March 28, 2023
How To Choose the Right Tech for Your Restaurant | Modern Restaurant Management

How To Choose the Right Tech for Your Restaurant | Modern Restaurant Management

March 28, 2023
Virgin Orbit rescue talks with investors collapse, say reports – Australian Aviation

Virgin Orbit rescue talks with investors collapse, say reports – Australian Aviation

March 28, 2023
Strikes Prompt British Airways To Cut Easter Flights

Strikes Prompt British Airways To Cut Easter Flights

March 27, 2023
Planning a long layover with kids? Tips and tricks I learned along the way

Planning a long layover with kids? Tips and tricks I learned along the way

March 27, 2023
2 former Domino’s execs leading German Doner Kebab as CEO, CDO

2 former Domino’s execs leading German Doner Kebab as CEO, CDO

March 27, 2023
An Amazing Photo Tool for Travelers

An Amazing Photo Tool for Travelers

March 27, 2023
Dunkin’ introduces Breakfast Tacos | QSR Web

Dunkin’ introduces Breakfast Tacos | QSR Web

March 27, 2023
Mountain Mike’s Pizza Doubles Down in Nevada With Las Vegas-Area Development Deal

Mountain Mike’s Pizza Doubles Down in Nevada With Las Vegas-Area Development Deal

March 27, 2023
  • Travel info
  • Airport
  • Restaurant
  • Banking & Credits
Wednesday, March 29, 2023
  • Login
nich info
  • Home
  • Travel info
  • Airport
  • Restaurant
  • Banking & Credits
No Result
View All Result
nich info
No Result
View All Result
Home Banking & Credits

Why zero trust security is central to operational resilience

by admin
November 21, 2022
in Banking & Credits
0
Why zero trust security is central to operational resilience
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Cybersecurity Awareness Month might have come to an end for another year, but as any cybersecurity expert will point out, the actual awareness never stops.

Today’s cybersecurity challenges are almost overwhelming for businesses

When, in 2004, the Bush administration in the US decided to give cybersecurity an officially designated month of awareness, the goal was to help individuals stay safe online in the face of increasingly common threats to their technology and their confidential data.

For today’s security professionals, those look like almost innocent times. The challenges then were real and significant, but today’s are almost overwhelming.

Modern and complex

Businesses of all sizes now operate with extremely complex and fast-evolving IT estates that span on-premise and cloud deployments, home and hybrid working, legacy systems and the latest applications.

Our own research from November 2021 indicated how eye-watering all this can be. At more than 80% of financial institutions, the IT system had changed more in the previous 12 months than over the company’s entire lifespan. Systems were presenting operational issues at a rate of at least one a day or 365 a year.

Other organisations identified similar challenges. VMware reported that the first half of 2020 saw a 238% increase in cyberattacks on financial institutions. With failures increasing all the time, that number can only be higher today. As to the cost, IBM and the Ponemon Institute’s annual research found that the average cost of a data breach in the financial sector was $5.72 million.

Ticking time bombs

Inevitably, the pandemic played a major role in these numbers. But who is to say when the next disruptive event will occur, or how trading conditions will evolve? After all, it was only three months after our research that Russia – itself one of the world’s greatest exporters of cyber-disruption – invaded Ukraine.

The fact is that although IT complexity helps deliver modern, customer-focused financial services and creates efficient, productive workplaces, it also presents a wide variety of enticing vulnerabilities to threat actors with various degrees of sophistication.

The following are just some of the most common vulnerabilities today. Imagine these multiplied over multiple systems:

  • Misconfigurations: Manual configuration of any software or system is always a risk and many application security tools still require it, which makes it a major threat to both cloud and app security.
  • Unsecured APIs: A particular vulnerability in the era of open banking, unsecured application programming interfaces (APIs) can become an easy target for attackers to breach – and the process for securing APIs is another one that is prone to human error.
  • Unpatched software: This is an old favourite, but the sheer number of updates issued and end-points to protect makes it all too easy to get behind on patching, or even completely miss a new release.
  • User credentials: How many employees really create unique and strong passwords for each of their accounts? Reused and recycled IDs and passwords are relatively easy to exploit with brute computational force. Once inside, the criminal appears to be just another legitimate user. This is particularly problematic when employees are routinely given more access and permissions than they need.
  • Runtime threats: Much of a cloud network’s underlying infrastructure is secured by the cloud service provider, but not much else is. Users can find themselves running workloads in an inadequately protected public cloud, exposing operating systems and apps.
  • Zero-day vulnerabilities: These are the security flaws that the threat actor knows about but the software vendor doesn’t, and consequently has had zero days to develop a patch.

These and others make the risk of system outages, data loss, and privacy breaches intolerably high and seriously challenge operational resilience. And addressing this threat is no longer a question of basic survival instinct. Understanding infrastructure vulnerabilities and prioritising their safeguarding is now a regulatory requirement. From the UK and the EU to Hong Kong and Australia, relevant authorities require financial firms to achieve operational resilience, measure service-level agreements (SLAs) for critical business services, and to publish proof that they have done so.

New security for a new era

The most effective response to this is a zero trust approach. As the name suggests, this assumes that no piece of software and no person accessing the system can be trusted. It assumes that hackers can – and will – penetrate outer defences and wreak havoc once inside the network, as many of the vulnerabilities above suggest.

Every individual should therefore be challenged each time they carry out a given action or access a certain system and prove their right to be there. If legitimate users don’t have free run of the place, then neither do criminals.

This may involve a marginal increase in load, and consequently a marginal decrease in performance. But that is nothing compared to the catastrophic loss of performance that a full system outage causes. Advanced system monitoring plays a key role in the adoption of zero trust and checking that software and unreliable users are not introducing new vulnerabilities to the system.

But the biggest challenge is that the financial services industry – like most other technology-reliant sectors – operates legacy systems that were not designed with zero trust in mind. Long-established middleware and mainframes struggle to cope with the model, and the security threat alone is reason to modernise the software architecture.

As systems get more complex, dependency on IT grows, and cyber threats proliferate, there is no room for security approaches that are no longer fit for purpose. Firms must better equip themselves to protect their business and their customers. Designing systems with a zero trust approach built in from the start must become a fundamental step in the security process.





Source link –

Share234Tweet146Pin53
admin

admin

J

Recent Posts

  • Lufthansa Joins First Movers Coalition Amid Sustainability Drive
  • How to Modernize Legacy Tech With Start-up Disruptors
  • BAR LAB HOSPITALITY INTRODUCES MESIBA IN WILLIAMSBURG
  • 5 reasons why you should stay for more than 3 days at Plitvice Lakes National Park
  • How To Choose the Right Tech for Your Restaurant | Modern Restaurant Management

Recent Comments

No comments to show.

Archives

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022

Categories

  • Airport
  • Banking & Credits
  • Restaurant
  • Travel info
nich info

Copyright © 2017 JNews.

Navigate Site

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Follow Us

No Result
View All Result
  • Travel info
  • Airport
  • Restaurant
  • Banking & Credits

Copyright © 2017 JNews.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In