Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > Cyber insecurity: Managing the threat from within
    Business

    Cyber insecurity: Managing the threat from within

    Cyber insecurity: Managing the threat from within

    Published by Gbaf News

    Posted on December 23, 2019

    Featured image for article about Business

    By Chris Bush, Head of Security, ObserveIT, a Proofpoint company

    No industry experiences a higher volume of online attacks than financial services, and more than half of those attacks (58%) come from insiders (Forrester 2019). Even more eye-opening is that the financial services sector experiences the highest cost of insider threats, at $12.05 million per year.

    Chris Bush

    Chris Bush

    An insider threat can happen when someone close to an organisation with authorised access misuses it to negatively impact the organisation’s critical information or systems. This makes all organisations vulnerable from the inside out. Crucially, that person does not necessarily need to be an employee – third party vendors, contractors and freelancers, and trusted business partners could pose a threat as well.

     Often, when companies think about data loss, they naturally think of it as a data problem. They prioritise visibility into data when it is really a people problem. After all, data does not move itself; people move data. Yet, employees, privileged users, or third parties must be given access to critical applications, systems, and data to do their jobs effectively. So, what can companies do?

     As a first step, it’s vital to understand what motivates an insider threat. By knowing what types of insider threats are within your organisation, along with their potential motivations and characteristics, it becomes easier to identify if and when your organisation has become a victim of an insider data breach or incident.

     Perhaps the most well-known insider cases to those in the financial services world are those that are driven by malicious intentions. For example, as a front office employee is jumping ship to a competitor, they decide to take proprietary trading strategies or client research with them to their next employer by exfiltrating that intellectual property via email, printing the files or using a USB drive. In the hedge fund and proprietary trading world, significant sums of money and competitive advantages are at stake when malicious insiders get away. Even in the back office, privileged users may attempt to manipulate trading systems or reconciliation servers for financial gain or due to professional frustration.

    Yet, many insider breaches are also caused accidentally, driven principally as a result of negligence or poor security hygiene. Just think for a moment about how a well-meaning quantitative code developer may mistakenly leave servers in the cloud unprotected. Equally, in the modern age, convenience often overpowers almost all else. If your cybersecurity policies, tools, etc. make it difficult for insiders to do their work in a quick and efficient manner, they will likely look to circumvent the in-place systems. And, lest you believe these accidents are trivial, negligence-based insider threat incidents are 3 times more frequent than malicious insider activity and waste endless hours of your Security Operations team to remediate. By the way, such accidents also cost organisations an average of $3.8 million per year.

     Whether intentional or accidental, it’s understandable that user-posed risks to critical IP leave many financial management firms worried about insider threats. However, there are many ways companies can be empowered protect themselves from the inside out. Insider risks can be identified and eliminated when companies choose to invest in a people-centric Insider Threat Management strategy – one that is driven by technology, offering complete visibility and context into what users are doing when, where, why, and how – but also supported by policies and processes that empower employees and trusted insiders to be part of the solution, and not the problem.

    When it comes to technology, financial service firms are often run by mature security programmes with a focus on lean efficiency. These demands heighten the need for comprehensive insider threat detection systems that can catch insider threats from both classic vectors (like email, print jobs, USB usage) and newer technologies (such as file-sharing apps, cloud storage sync jobs, and more).

    In theory, traditional endpoint DLPs can look like the answer but what they fail to detect is the worrying or strange changes in behaviour or out-of-policy conduct that indicates either a malicious or negligent breach in motion. DLPs are heavy on endpoints and don’t provide enough context into both user and data activity. Similarly, though many SIEM or UEBA can detect anomalous user behaviour, they cannot correlate the critical IP with specific users to tell the whole security story of what happened to cause the breach.

    Companies need solutions that provide full, granular visibility into the who, what, and why behind any breach. With solutions that deliver the full context around user and data activity, security teams can separate accidental from malicious activity and appropriately respond either through prevention technologies, user education or more punitive measures. Crucially, with this deep-dive information, businesses can put changes into action to prevent the situation from occurring again in the future and save valuable time. It might come as a surprise to learn that, on average, it takes a significant 72 days to contain an insider threat. It can take weeks, months, or even years to piece together what happened without the right tools.

    Ultimately, quickly detecting and containing the insider threat is essential to managing both data security risk and the subsequent expenditure that comes with limiting the impact of a breach on the company’s bottom-line. With the right detection and prevention technology, plus supporting policies and processes in place, exposure to unnecessary risk is significantly reduced. Another positive is that with complete visibility into all activity on your network, organisations can not only catch and stop insider threats, but meet and surpass all compliance and regulatory requirements with ease – a big plus for those in the financial services sector.

    Related Posts
    Cybersecurity as a Profit Engine: Turning Financial Services Security into Measurable Business Value
    Cybersecurity as a Profit Engine: Turning Financial Services Security into Measurable Business Value
    How Investability Helps Companies Navigate Transformational Times
    How Investability Helps Companies Navigate Transformational Times
    88% of UK and US organisations concerned about state-sponsored cyber attacks as national threat levels surge, IO research reveals
    88% of UK and US organisations concerned about state-sponsored cyber attacks as national threat levels surge, IO research reveals
    One in three SME leaders do not fully understand cash flow, despite 82% facing cash flow problems
    One in three SME leaders do not fully understand cash flow, despite 82% facing cash flow problems
    Inside the Company that Predicted the Remote Work Mega-Trend Before It Became Mainstream
    Inside the Company that Predicted the Remote Work Mega-Trend Before It Became Mainstream
    SEO Consultant Adrian Czarnoleski on How to Increase Business Value Before Exit
    SEO Consultant Adrian Czarnoleski on How to Increase Business Value Before Exit
    No SOC 2, No Deal: Why You’re Already Losing Clients - and What You Can Do About It
    No SOC 2, No Deal: Why You’re Already Losing Clients - and What You Can Do About It
    Jose Tolosa Guides Organizations Forward with Clarity, Purpose, and Integrity
    Jose Tolosa Guides Organizations Forward with Clarity, Purpose, and Integrity
    Reducing Freight Costs to Drive Global Trade Expansion
    Reducing Freight Costs to Drive Global Trade Expansion
    The Psychology of Music in the Modern Workplace
    The Psychology of Music in the Modern Workplace
    Revealed: Low-Cost/No-Cost Marketing Hacks For Results Oriented Businesses
    Revealed: Low-Cost/No-Cost Marketing Hacks For Results Oriented Businesses
    Finance teams still stuck in spreadsheets as manual processes stall digital transformation
    Finance teams still stuck in spreadsheets as manual processes stall digital transformation

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Business PostBleak Midwinter: Chilly 2019 Economic Climate Leads SME Business Leaders to Forgo Christmas Bonuses
    Next Business PostWant to fall in love with work again in 2020? These are some key areas you need to focus on if you work in finance…

    More from Business

    Explore more articles in the Business category

    The Future of Remote & Hybrid Leadership: Leading With Data-Driven Foresight

    The Future of Remote & Hybrid Leadership: Leading With Data-Driven Foresight

    2025-2030: The Next Technological Innovations for Business

    2025-2030: The Next Technological Innovations for Business

    The CFO’s New Playbook: 5 Ways AI Is Redefining Finance with Insights from Rishi Oberoi

    The CFO’s New Playbook: 5 Ways AI Is Redefining Finance with Insights from Rishi Oberoi

    Revolutionizing Payments: Secure, Scalable, Sovereign

    Revolutionizing Payments: Secure, Scalable, Sovereign

    Why Trademark Abuse in Paid Search Is a Growing Risk for Financial Institutions

    Why Trademark Abuse in Paid Search Is a Growing Risk for Financial Institutions

    E-commerce Customer Service: Tips

    E-commerce Customer Service: Tips

    When to Automate Your Warehouse: The Tipping Point for Operations Growth

    When to Automate Your Warehouse: The Tipping Point for Operations Growth

    Hurt at Work? 5 Financial Facts You Need to Know

    Hurt at Work? 5 Financial Facts You Need to Know

    Against the Odds: Resilience in Consumer Subsectors Offers Prime Opportunities for Investors

    Against the Odds: Resilience in Consumer Subsectors Offers Prime Opportunities for Investors

    Empower Your Workforce With Financial Wellness This Labor Day

    Empower Your Workforce With Financial Wellness This Labor Day

    Build a brand that stands out with five simple strategies, from defining your UVP to using storytelling and building loyalty. Find out more.

    Build a brand that stands out with five simple strategies, from defining your UVP to using storytelling and building loyalty. Find out more.

    The Hybrid Office Playbook for Financial Services: How to Design Hybrid Offices to Optimize People and Spaces

    The Hybrid Office Playbook for Financial Services: How to Design Hybrid Offices to Optimize People and Spaces

    View All Business Posts