Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 6 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

FCA lays out new rules for banks on reporting operational and security incidents to customers

by The Gurus
August 17, 2018
in Editor's News
Banking security
Share on FacebookShare on Twitter

On Wednesday 15th August, the Financial Conduct Authority (FCA) enforced new rules requiring providers of personal and business accounts to publish information that will help current customers to compare bank accounts from different providers. Banks will have to report major operational and security incidents that have taken place and disclose whether 24-hour customer helplines are available.

The pressure for banks to report system failures is further compounded by the Bank of England and FCA’s fast approaching 5 October deadline, by which they must report on their exposure to risks and how they will respond to outages.[1]  With customers having more visibility and banking options than ever, finding new ways to mitigate risk is top of mind for banks in order to maintain their reputation as secure and trusted institutions.

Financial Services firms are increasingly moving from a product-centric approach to cybersecurity. Instead, they are focusing on compartmentalising and individually securing their critical applications, such as online banking or interbank payments, in order to prevent a domino effect if one area comes under attack.

But due to outdated infrastructure, it can be difficult for financial institutions to gauge how applications are built into the network and communicating with each other in real time. This is a crucial first step when it comes to writing security policies for individual applications, and consequently preventing operational and security incidents, says Nick Hammond, Lead Advisor for Financial Services at World Wide Technology.  

Nick Hammond, from World Wide Technology, comments:  “Financial Services firms are under significant pressure to be both quick and transparent when it comes to reporting operational and security incidents. To alleviate this pressure and maintain stringent security, they are working towards ensuring a high level of application assurance.

“Whilst older rules required yearly tick-box compliance exercises, new regulations necessitate continued assurance of critical applications. But the complex nature of existing systems throws a spanner in the works. Legacy infrastructures were often built with different and sometimes conflicting metrics over the years, meaning that an intricate patchwork of applications communicate with each other in complicated ways.

Nick Hammond continues: “The network of opaque interdependencies creates a big hurdle for banks, which means many are drawing on infrastructural expertise as the first step towards securing their internal software. By gaining insight into infrastructure, firms can create a real-time picture of the entire network, allowing them to confidently rationalise the way that different applications share data within the system.

“Consequently, firms can fit the right security policies to each segmented application, preventing unnecessary or illicit data flows. In turn, this will help them maintain their reputations as trusted and secure institutions.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Chatbots Say Plenty About New Threats to Data

Next Post

AlienVault Unveils Free Threat-Scanning Service for Endpoint Devices through Open Threat Exchange.

Recent News

Phone with app store open

$400,000 Fine for Stalkerware App Developer

February 6, 2023
london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information