Hacking used to be a small-time hobby often used for pranks. Now, hackers aren’t just hackers anymore. Today they’re sophisticated cyber criminals going where the money leads them – to the financial organizations that manage it. As cyber threats grow increasingly dangerous, the question remains —is your company ready?
Unlike healthcare organizations that are struggling to decide whether to invest in patient care or new security systems, the financial services industry is laser focused on cyber security. According to a research report from Raytheon and Websense, 2015 Industry Drill-Down Report—Financial Services, 80% of financial executives see cyber security as their top concern.
The finance industry may see cyber security as a top concern, but that doesn’t mean that they’re able to thwart all of the attack vectors aimed their way. In the first half of 2015 alone, there have been 30 confirmed data breaches in the finance industry. And don’t even get us started on the multi-year banking fiasco involving over 100 banks and losses in the hundreds of millions of dollars.
The finance industry is targeted by cyber attacks 300% more than any other industry. However, with so many potential attack vectors, it’s nearly impossible to figure out which one will be coming after you—or is it?
As it turns out, 33% of all global lure-stage attacks are found in the finance industry. It’s clear that these types of attacks are a favorite amongst finance hackers. They carefully survey their targets trying to score a large payoff.
Attackers have grown significantly more sophisticated than they used to be, learning to use social engineering to create professional-looking phishing emails regarding invoices or payments that prompt users to open them. Training your staff to look out for these suspicious emails is essential to the protection of your business. Everyone knows it, but attacks still happen.
Raytheon and Websense dug deeper into the lure-stage attacks that are so popular amongst finance hackers to discover what malware is actually stealing user credentials and sensitive data. These are the pieces of malware you should be especially wary of in the finance industry:
It’s tough to look at threat statistics in the finance industry – the sheer volume and potential danger is staggering. Any breach no matter how small can cost a company their reputation and consumer trust. And then of course there is the financial losses, notifications expenses, legal fees and other expenses tied to reparations.
Clearly, financial organization need to be vigilant. They need to ensure that all their security appliances can see 100% of the traffic coming in and out of the organization – that means using a network TAP to avoid losing packets during traffic spikes. At the same time, it is critical to know your baseline traffic and investigate any deviations from the norm. While technology is critical for identifying and repelling attacks, be sure to train each and every employee to be on the lookout for suspicious behavior. When the entire organization is on high-alert, you’ll be able to spot more issues and avoid getting lured by even the most sophisticated attackers. Concern is one thing – vigilance takes a security program to a higher level.
Looking to add inline or out-of-band security monitoring solutions, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do.
If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.
If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.
While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.
Some of you may have noticed a flaw in the logic behind this solution! You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.
Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.
Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.
Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.