Page 130 - Cyber Defense eMagazine January 2023
P. 130

Using algorithms, intelligent systems can later recognize phishing messages as they don’t fit the profile.
            They can also recognize harmful links and flag messages as potential attacks.



               3.  A broader scope of cyber attacks

            Ensuring better protection for the global financial system is a priority. Financial firms, institutions, tech
            companies,  and  government  agencies  must  work  together  internationally  to  create  a  threat-centric
            approach.

            A threat-centric approach means creating a security framework within the financial secretary capable of
            learning  about  threats  and  adjusting  security  strategies.  However,  to  do  this  effectively,  all  parties
            involved must work together, including the government, tech companies, and financial companies.


            For example, SQL injections facilitate significant financial threats, and in 2021 WordPress revealed that
            over 600,000 sites were vulnerable to this threat because of a plugin. This is not something the financial
            sector is directly responsible for.

            Still, organizations need to establish relationships with the industry, government actors, tech companies,
            and financial authorities to share strategies, learn about global risks, and find already-applied solutions.



               4.  Social engineering

            Social  engineering  denotes  cyber  attacks  relying  on  behavioral  techniques  to  make  people  send
            confidential information or money. FI company representatives are often targeted for sensitive information
            used for extracting cash.

            Social  engineering  attacks  rely  on  someone’s  trust  and  goodwill,  and  people  need  the  training  to
            recognize:

               •  When they are urged into doing something without an apparent reason (check all the relevant
                   facts and resources before responding)
               •  Unusual URLs or attachments
               •  Messages asking for something unusual
               •  Unexpected messages




            Identity verification

            On the other hand, the finance sector can reinforce security by including verification steps that require
            customers to prove their identity. Identity verification solutions can be implemented to verify customer
            information as they have their data from official sources like government databases and credit bureaus.

            That  allows  companies  to  recognize  if  customers  are  providing  real  information.  At  the  same  time,
            screening software can be used for probing onboarding customers with various questions.




            Cyber Defense eMagazine – January 2023 Edition                                                                                                                                                                                                       130
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   125   126   127   128   129   130   131   132   133   134   135