Threats from Within: Social Engineering to Malicious Intent
- Date:August 27, 2020
- Author(s):
- Krista Tedder
- Alexander Franks
- Report Details: 23 pages, 10 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
Mistakes happen every day within financial services organizations due to the complexity of the organization, system integrations, and procedural events. Most mistakes cause no harm, but one incident, if not identified, can result in data exfiltration, financial loss, and regulatory fines. Twitter’s recent insider incident has highlighted the significant reputational and monetary cost of the failure to identify insider threats. To minimize risk without dramatically increasing the budget, a non-negotiable culture of cybersecurity throughout the organization is required.
There is no one-size-fits-all solution, and a majority of financial services organizations have components of a culture in place. However, the shift to remote work has significantly raised the threat profile of insiders. Organizations must respond to the new cybersecurity landscape and adjust their procedures and culture accordingly. This report will look at malicious insiders, non-malicious insiders, and accidental threats that can be identified and mitigated before a financial loss occurs. The report will also highlight how the threat landscape, both economic and situational, has been negatively affected by the coronavirus lockdowns.
Key questions discussed in this report:
- Where do the primary risks reside within the financial services industry?
- What type of behavior needs to be monitored for?
- What does a culture of cybersecurity look like when implemented?
Methodology
The data in this report was primarily collected from a random sample of 506 cybersecurity professionals conducted in May 2020.
Book a Meeting with the Author
Related content
Data Transparency in the Age of Cyber and Privacy Risk
As open banking and new privacy regulations accelerate, financial institutions face rising pressure to enhance privacy and cybersecurity transparency to strengthen consumer trust. ...
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
SMS Blasters: An Expanding Frontier in Smishing Attacks
Cybercriminals use SMS/text blasters in smishing attacks, sending a wide range of fraudulent messages. By mimicking legitimate cell towers, SMS/text blasters bypass carrier-level p...
Make informed decisions in a digital financial world