Posts Tagged ‘Cyberattacks’

Data Aggregation and Artificial Intelligence in Financial Services

My last blog highlighted security audits and penetration testing. This final blog of the series discusses security data aggregation and artificial intelligence (AI) implementations in financial services. Should a breach occur, gathering log data from all critical security, network, and endpoint devices is key to a forensic investigation to determine how the firm’s defenses were […]

COVID-19

Security Audits and Penetration Testing in Financial Services

Previously, I discussed the cybercrimes of phishing and the signs it’s happening. This blog will highlight security audits and penetration testing. Given the ever-changing landscape of cybersecurity threats, coupled with the dynamic nature of new hardware and software deployments, it is imperative to perform security audits and penetration testing on a regular and frequent basis. […]

Phishing and Cybercrimes in Financial Services

My last blog discussed the benefits of data encryption and application programming. This blog dives into the cybercrimes of phishing and the signs it’s happening. Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing […]

Web API Using Azure

Data Encryption and Application Programming in Financial Services

Previously, I outlined the how and why of server and endpoint protection. This blog will discuss the benefits of data encryption and application programming. Data Encryption All of a firm’s data should be encrypted both at rest (stored on media) and in flight (in transit on the network). This provides the best protection from a […]

Server and Endpoint Protection in Financial Services

My last blog explored network infrastructure and proactive measures to take to keep the network secure. This blog analyzes the how and why of server and endpoint protection. In a network context, an endpoint is defined as any computing device that communicates with a network to which is it connected. It includes all of a […]

Change management mistakes to avoid

The Importance of Network Infrastructure in Financial Services

Previously, I analyzed the risk of a cyberattack in financial services. This blog explores network infrastructure and proactive measures to take to keep the network secure. While firewalls have been the cornerstone of network security for years, there are newer, much more capable devices now available. These next-generation firewalls (NGFW) are capable of performing the […]

Cyberattacks in Financial Services - keyboard

[Guide] Mitigating Cyberattacks in Financial Services

Cyberattacks and data breaches in financial services firms are more common than in any other industry. In fact, financial services firms fall victim to cybersecurity attacks 300 times more frequently than businesses in other industries and the rate of breaches in the industry has tripled over the past five years. Cyberattacks also cost financial services […]

COVID-19

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

Banks Might Not Have To Cover Fraudulent Activity

I recently received a letter from American Express, warning me about a data breach that occurred with a third-party service provider several years ago. Although the letter doesn’t name the company who suffered the breach, it does mention that I’ve done business with them. The letter goes on to say American Express will continue to […]

The Effect Of Anonymous’ Operation Icarus On Financial Services

Anonymous, an international network of hackers, recently pledged to take on the financial services industry in a 30-day cyberattack campaign called “Operation Icarus,” more commonly referred to online as #OpIcarus. While the information about the group’s plan is somewhat spotty, various videos (purportedly, the group’s very own) and news articles indicate that the group is […]