While companies are keeping a tight watch over every penny, fraud and financial crimes are causing an estimated annual revenue loss of $3.5 trillion across industries. This loss has a major impact on the economy and the bottom line since a dollar lost to fraud is equivalent to a dollar in profit. No less important, the reputational damage associated with major cyber and fraud events is immediate.

The Internet has given criminals unprecedented access to data, technology and networks of specialists in the underground supply chain. These criminals are constantly evolving their techniques to bypass the latest defenses. The question for enterprises is no longer just, “How do we prevent our customers’ credentials from being compromised?” It’s also become, “Assuming credentials are compromised, how do we stop criminals from using those credentials to steal money?”

Indeed, we are not speaking about victimless crimes here. Data theft is just a small step from fraud and identity theft. At this moment, someone could be filing a tax return or submitting a health insurance claim with your identity or that of your customers’. The same stolen data can also have national security implications: It may be used to launder money for illicit activities such as the drug trade or even terrorism.

Leading enterprises have figured out that no one technique is sufficient to adapt to the changing threats. They must be able to constantly adjust, to layer defenses and to know more than the criminals think they know. For instance, one current trend is to more actively link cyber intelligence to customer behavior and transactional intelligence across other channels in order to better identify financial crimes. It’s an arms race, and we need a deep arsenal to counter the threat effectively.

Read the white paper: Accelerating growth and digital adoption with seamless identity trust

More from Banking & Finance

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

DORA and your quantum-safe cryptography migration

5 min read - Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. Unfortunately, this also introduces threats to the digital economy and particularly the financial sector.The Digital Operational Resilience Act (DORA) is a regulatory framework that introduces uniform requirements across the European Union (EU) to achieve a "high level of operational resilience" in the financial services sector. Entities covered by DORA — such as credit institutions, payment institutions, insurance undertakings, information and communication technology…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today