The financial services industry remains an attractive target for cybercriminals and was, in fact, the most attacked industry in 2016. Hacking groups that target financial institutions are now focusing more on financial gain rather than digital sabotage with account takeovers, data breaches and targeted malware attacks.

It’s important to recognize that some of the very conveniences that financial firms now routinely offer their customers, including automated teller machines, credit cards and mobile banking apps, have introduced a level of accessibility that goes a long way toward making financial systems highly vulnerable to cyberattacks. As you would expect, customer loyalty is not preserved when a financial institution is breached.

 

 

But there are things that can be done to protect assets and your customers against loss. This infographic shows how pressing business concerns can impact your security posture.

Learn how IBM Security can help you make better-informed decisions about the threats your business faces

More from Banking & Finance

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

DORA and your quantum-safe cryptography migration

5 min read - Quantum computing is a new paradigm with the potential to tackle problems that classical computers cannot solve today. Unfortunately, this also introduces threats to the digital economy and particularly the financial sector.The Digital Operational Resilience Act (DORA) is a regulatory framework that introduces uniform requirements across the European Union (EU) to achieve a "high level of operational resilience" in the financial services sector. Entities covered by DORA — such as credit institutions, payment institutions, insurance undertakings, information and communication technology…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today