By Jorge Rommus
The increasing development of electronic threats requires a fundamental shift in the way the financial sector faces cybersecurity. It is no longer only related to data protection, but to ensure flexibility in light of increasingly complex and complex attacks. This commitment to safety on the basis of confidence that backed clients in financial institutions.
Cyberrataququque devices happen daily and emphasize the importance of protecting sensitive data. In the dynamic world of investment and encryption, where light movement and innovation is decisive, cybersecurity risks are more important. Theft of the last cryptocurrency of bybit, one of the greatest in history, is a clear example of the weakness that we can be exposed to. The complexity of digital environments in the financial sector is a real challenge. A recent global study of F5 networks
It indicates that on average, each financial sector company operates with 554 production requests and 601 applications of application programming. This is the spread of application programming facades, although it is necessary for innovation, also increases the surface of the attack and requires effective protection strategies.
In this context, the implementation of the digital operational flexibility law (DORA) and the direction of NIS2 is an essential step in promoting and flexibility of the financial sector. Dora, is the European regulation that creates uniform requirements for cybersecurity and digital stability of the entire financial sector in I and NIS2 (network and information security), and it is a directive regarding network security and information designed to ensure a common level of cybersecurity throughout the European Union. However, organizational compliance is only the starting point.
Cyber security approach should be based on three basic columns. The first consists of the adoption of the recommendations of the organizer, in our case Panto de Portugal and the guidelines developed by European regulations – with the implementation of security systems and regular tests that encourage the most effective new response protocols.
The second column focuses on continuous investment in advanced technologies to protect customer assets. MPC (MPC) works, for example, through tools such as Fireblocks, as a powerful platform in protecting special encryption keys, ensuring that access to these assets is only done by controlling multiple permissions, which greatly reduces the risk of unpopular access.
The third column depends on the recognition that technology is only part of the solution. In a growing digital world, financial literacy and cybersecurity have become necessary as knowing how to read and write. Knowledge should be about digital fraud – from email, SMS, phone, and even the most advanced technologies such as ransom and deception – part of regular vocabulary. It is important to invest in training and awareness programs for both the general population and sectors of the economy. The bet in preventing these social engineering attacks should be. Cyber security may seem a complex and frightening topic. However, the commitment is to simplify this process for customers, to ensure the protection of their assets and make all information come with the maximum degree of transparency and professional efficiency.
Cyber security is a continuous journey, not an arrival point. In the bank, it is necessary for institutions to remain at the forefront of best practices and technologies, in order to provide customers by calming the knowledge that their interests are protected.
Head of Information Technology and Operations, not Besson Bank
Source link