Always Client Focused

FinTech Trends Newsletter Week 3rd July – 7th June 2017

Education is the Key with IT Security: Preying on human weaknesses, not computer weaknesses

Employee education and training remain one of the core components to implementing an internal culture of security and to help alleviate human error, something we at Storm IT Financial advocate and can help financial firms with training seminars.

Where the exposures lie: – It’s late in the day on a Friday afternoon, and an urgent email hits a back-office employee’s inbox. As the employee clambers to get ready for the market-close and head off for the weekend, it looks like the portfolio manager for an important client needs him to wire $150,000USD to a bank in Grand Cayman.

His colleagues are all busy dealing with other matters, and, since he’s keen to be reactive to this key client’s request, he follows the wire instructions in the email to complete the transfer in good time.

Bad move.

Unfortunately, in the rush to complete the transaction request, the employ- ee neglected to see the carefully crafted and well-disguised typo in the do-main name of the email address. That message wasn’t from a portfolio man- ager. It was from a phishing hacker. Minutes later, after the theft was de- tected, the employee called the bank to reverse the wire, but the money was already two steps away, never to be seen again.

The reality is today, more often than not, these nightmare scenarios involve social engineering, that preys on human weaknesses, not computer weakness. That’s because, even with sophisticated perimeter security and vigilant monitoring in place, the greatest vulnerability, sadly, re- mains the people who use your IT systems to conduct transactions and access sensitive data.

This fictional investment firm didn’t need more firewalls, more passwords, or more encryption. What it did need was an internal culture of security – an ongoing, firm wide commitment to defining and adhering to careful, thoughtful policies that reduce or eliminate

“people vulnerabilities” through assessments, awareness, and above all education, something we at Storm IT Financial advocate highly and can help financial firms with training seminars.

To avoid becoming the victim of a phishing hack like in the scenario above, it is important to:

1) Slow down to ensure you are acting professionally 2) Check the sender email address as well as “to” and “cc” fields 3)  O nly click  on

 links and  at t achment s  t hat  you  are  exp ect ing  4) Be wary of generic greetings 5) Check for improper spelling 6) Be wary of urgent re- quests for personal information

What is an Internal Culture of Security? Sometimes all the firewalls in the world won’t stop the most damaging attacks as the breach is human error which can only be stopped by education. In many instances, employees are “holding the door open” to hackers.

Unintentional employee threats include weak or shared passwords, unsecure equipment, improper disposal of hard copy documentation, visitor access to networks, and feeling rushed. Some intentional or malicious employee threats include disgruntled employees and those in search of monetary gain.

So how do we strengthen these people-centric security vulnerabilities? Firms must create an internal culture of security. And, above all else, that needs to start from the very top of the firm (people who, ironically, due to the volume and sensitivity of the information they access and the distractions their fast-paced lives encounter, can sometimes represent the greatest source of vulnerabilities to infor- mation security). It’s essential that they visibly and fully commit their unwavering support to your efforts to improve security.

We hope that you now understand and are more aware the importance of security culture and what it means to have a culture of secu- rity in your firm. Education is the key.

For more information on Hedge Fund, Asset Management, Private Equity & Alternative Investment cyber security & firewall, data back- up, disaster recovery & failover advice, cloud & IT Services, feel free to contact Storm IT Financial.

Storm IT Financial FinTech News & Trends picks: Week 3rd July – 7th July 2017

How Azure Security detects attacks using cyber threat intelligence

Microsoft Azure goal to constantly improve security detection and alerting capabilities:

https://azure.microsoft.com/en-us/blog/how-azure-security-center-detects-ddos-attack-using-cyber-threat-intelligence/

Buy-side study released conducted by BNY Mellon & Pricewaterhouse- Coopers focused around liquidity and collateral concerns

Hedge funds are looking to add new prime brokers & service providers, according to buy side study…:

https://www.bnymellon.com/_global-assets/pdf/our-thinking/collateral-the-new-performance-driver.pdf

Is cloud the future for core banking?

In just three years from now, every new core banking system that goes live will do so in the cloud:

https://www.finextra.com/blogposting/14252/is-cloud-the-future-for-core-banking

Germany says cyber threat greater than expected, more firms affected

The threat posed to German firms by recent cyber attacks was greater than expected with some firms halting production…:

http://uk.reuters.com/article/us-cyber-attack-ukraine-germany- idUKKBN19S1EU

Financial services firms are automating certain jobs while hiring to fill digital skills gaps

It’s no secret that financial services firms on both the sell-side & buy-side are automating as many roles as they can:

http://news.efinancialcareers.com/uk-en/289167/financial-services-tech-automation-digital-skills-gaps/?_ga=2.100452953.656900686.1499424661-
1190592960.1495798911

Cyber attacks are prompting a boost in cybersecurity M&A, figures reveal

Both strategic buyers and private equity firms are showing a renewed interest in cybersecurity acquisitions…:

http://www.cityam.com/267995/cyber-attacks-prompting-boost-cybersecurity-ma-figures

MiFID II – Are we nearly there yet?

The Financial Conduct Authority’s (FCA) publication of its final policy statement on the implementation of MiFID II early this week…:

http://bit.ly/2tYTQrf

Application security in the cloud: Who is responsible?

We’ve all heard about the benefits of cloud infrastruc- ture that paint cloud as the be all, end all for IT:

http://bit.ly/2tPtffU

IT infrastructure spend is heading to the cloud

Spending on IT infrastructure for the cloud is climbing and may overtake traditional deployments by 2020:

http://bit.ly/2sTTkWF

Preqin: Emerging Hedge Funds Outperform Estab- lished Peers

New start up hedge funds outperform their more estab- lished peers in their first three years:

http://www.finalternatives.com/node/35453

Britain is a tech powerhouse leading the global revo- lution

Britain has seized the huge opportunities of the grow- ing tech industry:

http://bit.ly/2uxiXi3

Cybersecurity is a critical business issue for hedge funds and other investment management firms. The financial conse- quences of a cyber attack can be significant and could result in a serious impact to a firm’s reputation. That’s where Storm IT Financial can help. We can ease the burden of cost, expertise and knowledge to your alternative investment firm.