Financial Services Cybersecurity Weekly Briefing 12-29-2017

Weekly FS Cybersecurity Blast

Weekly FS Cybersecurity Blast

Korea-linked Hackers are Attacking Banks WorldwideBanks and security researchers have previously identified four similar cyber-heists attempted on financial institutions in Bangladesh, Ecuador, the Philippines and Vietnam. But researchers at Kaspersky now say the same hacking operation — known as “Lazarus” — also attacked financial institutions in Costa Rica, Ethiopia, Gabon, India, Indonesia, Iraq, Kenya, Malaysia, Nigeria, Poland, Taiwan, Thailand, and Uruguay.


A Look into the Crystal Ball: Cybersecurity Predictions for 2018 
“We expect more exploitation of information as a weapon for financial, political and other gains. As we’ve seen numerous times, including with Equifax this year, these breaches can have a huge reputational and financial impact. Cybersecurity professionals must be prepared to stay ahead of malicious actors to ensure they are not gaining entry to sensitive files and email communications,” concludes Ferrante.


Rapid Growth in Security Market Raises Question: How to Pick a Startup
Before plunging into a contract to secure solutions or services from a cybersecurity startup, organizations should ask these five key questions:
·       When did your organization receive its last funding round and did it come from existing investors?
·       Who are your investors?
·       Can you tell me about your management team and their experience in this industry and running a startup?
·       How long has each of your management team members been with the company and did they replace someone?
·       Can you provide me a customer list and tell me the last time you signed up a customer?


Stay up to date on the Financial Services Information Security news that you need to know by signing up for our Financial Cybersecurity Briefing Here.


Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners.  © 2017 Critical Informatics, Inc. All rights reserved.