PREVIOUS ARTICLENEXT ARTICLE
MISC
By 19 October 2020 | Categories: Misc

0

VIEWING PAGE 1 OF 1

TechSmart Business News sponsored by:

By Rick Vanover, Senior Director of Product Strategy at Veeam

The financial services industry is an appealing target for cyber criminals today. Arguably, consumers' financial, banking, trading and superannuation information is some of the most important data held by organisations today. The stakes are incredibly high for the financial services industry to properly protect and secure this data. Failure on this front will result in incredible damage to the company’s reputation and huge financial costs.

Last year it was reported that the financial sector was the second-largest source of data breaches between April-June with 42 major service breaches taking place in just one quarter and in South Africa, several banks suffered attacks that resulted in a loss of service. According to the Accenture Insight into the Cyberthreat Landscape in South Africa report, the financial sector has contributed to South Africa moving up to third globally in cybercrime rankings; this is due to more people using banking apps, which are targets for hackers, contributing to a 100% increase in mobile banking application fraud. 

While ransomware is incredibly complex and a huge responsibility for organisations, there are steps that can be taken to mitigate risk from the get-go.

Understanding the threat

The main points of entry into any business for ransomware is through Remote Desktop Protocol (RDP) or other remote access mechanisms, phishing emails and software vulnerabilities. Knowing that these are the three main mechanisms is a huge help in focusing the scope of where to invest the most effort to be resilient from an attack vector perspective.

Most IT administrators use RDP for their daily work, with many RDP servers directly connected on the Internet. The reality is that Internet-connected RDP needs to stop. IT administrators can get creative on special IP addresses, redirecting RDP ports, complex passwords and more; but the data doesn’t lie that over half of ransomware comes in via RDP. This tells us that exposing RDP servers to the Internet does not align with a forward-thinking ransomware resiliency strategy.

The other frequent mode of entry is via phish mail. We’ve all seen email that doesn’t look right. The right thing to do is delete that item. Combined with training to help employees identify phishing emails or links, self-assessment tools can be an effective mode of first-line defense.

The third area that comes into play is the risk of exploiting vulnerabilities. Keeping systems up to date is an age-old IT responsibility that is more important than ever. While this is not a glamourous task, it can quickly seem a good investment should a ransomware incident exploit a known and patched vulnerability.

Back up data

With so much at stake, organisations in the financial services industry must also prepare for the worst-case scenario and prepare an ultra-resilient backup storage.

The 3-2-1 rule is a good starting point for a general data management strategy. The 3-2-1 rule recommends that there should be at least three copies of important data, on at least two different types of media, with at least one of these copies being off-site. The best part is that this rule does not demand any particular type of hardware and is versatile enough to address nearly any failure scenario.

Do not pay the ransom


In spite of these techniques, businesses must still be prepared to remediate a threat if introduced. Our approach is simple. Do not pay the ransom. The only option is to restore data. Additionally, organisations need to plan their response when a threat is discovered.

In disasters of any type, communication becomes one of the first challenges to overcome. Have a plan for how to communicate to the right individuals out-of-band. This would include group text lists, phone numbers or other mechanisms that are commonly used to align communications across an extended team. In this contact book you also need security, incident response and identity management experts – internal or external.

There are also conversations to have around decision authority. Businesses must decide who makes the call to restore or to fail over before an incident takes place. Once a decision to restore has been made, organisations need to implement additional safety checks before putting systems back online. A decision also has to be made as to whether an entire virtual machine (VM) recovery is the best course of action, or if a file-level recovery makes more sense. Finally, the restoration process itself must be secure, running full anti-virus and anti-malware scans across all systems as well as forcing users to change their passwords post-recovery.    

While ransomware is becoming an inerasably dominant threat across the financial services’ industry, there are definitely steps that can be taken to mitigate risk and prepare for the worst-case scenario. For all businesses today, having a full proof back up plan in place is incredibly important in ensuring the business survives and thrives through any potential cybercrimes.

VIEWING PAGE 1 OF 1

USER COMMENTS

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (43 votes)
Technological breakthroughs (27 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (27 votes)
Biotechnology or medical advancements (21 votes)
Better business applications (132 votes)