Cyber Threats How financial institutions can mitigate risk

Abstract: 

Cyber threats and attacks are becoming more common among devices in the cyber domain. These types of threats can be sent in various forms and for many different purposes. Examples of ways in which these threats can be employed include DOS attacks, computer viruses, and breaches of security. As many companies continue to rely much more on the internet and digital technology, financial institutions such as banks become prime targets for hackers. Though some organizations refuse to adopt the latest technologies available in order to ensure their safety, others choose to use technological innovations to their advantage, as they facilitate many aspects of online banking for customers, potentially leading to more clients and revenue. However, companies’ increasing reliance on technology and the internet only makes them much more vulnerable to cyber threats and attacks. In order for any type of institution to ensure its safety, certain cyber security practices can be utilized as a means of mitigating potential cyber threats. Though many risk mitigation measures exist, some of the most effective include: risk assessment, protective software, and monitoring network traffic. Risk assessment is among the most important steps for an organization as it shows potential vulnerabilities in an institutions’ security which can therefore help mitigate threat growth or possible cyberattacks. Protective programs such as antivirus software and firewalls increase protection within computers or even an entire network by either checking your devices for malware or adding another layer between an institution and the rest of the cyber world. Network traffic monitoring helps in keeping risk out of an institution’s network as security staff can track potentially-emerging cyber threats. Due to financial institutions’ growing dependence on the cyber-domain, it is highly important for these entities to consider certain cybersecurity practices within their physical and virtual networks. Possible security measures may be classified as components of prevention, detection, or remedy, and institutions must choose security measures according to what their network may benefit most from.

Author: 

Casey Harward

Domain: 

Dimension: 

Region: 

Data Type: