TTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques ranging from social-engineering to credential-stealing malware. This means the time for security professionals to boost cyber situational awareness has never been more fitting. These are the seven latest threats that have recently surfaced:
Digital West Blog
The Grid is a part of our every day lives, so innovative technology for industries in the business of energy and basic utilities must be extremely reliable and secure. While technology can be testable in some other industries, utility companies cannot afford that flexibility. Technologies that reduce costs, increase efficiency, allow for real-time decision-making and improve performance remain top priorities.
Utility Tech Trends
- Management Software for Distributed Energy Resources: These platforms enable better management and ensure quicker responses in grid performance. Utilities need robust software to manage microsecond decisions about the variability and demand for electricity sources, for example.
- Lower LiDAR Costs: “Light” and “Radar” equipment that captures and converts data into 3D imagery will enable utilities to capture 3D data of trees and other vegetation close to wires and lines. They can then plan ahead and trim vegetation and avoid unexpected outage costs.
There’s no question that the way legal services are delivered is rapidly changing. Law firms increasingly
rely on computer and data management systems to create, share and store information. Even when analog (or even paper) means are used to create documents, they are converted into some type of digital format for organization and management. Research, document review and communication between clients, other attorneys and courts have sped up because of digital technology. In fact, many law firms have gone entirely paperless.
Tech Trends in Law
- Digital Records & Data Retention in the Cloud: Although some law firms still use paper files and physically house them both on- and offsite, an estimated 90% now scan or convert their files to a digital format and store them in the cloud. There’s also data from email, PCs, cell phones, flash drives and Internet—based phone systems. And while regulations for data retention differ across industries, law firms have data retention requirements ranging from six to 10 years, depending upon the state. That’s a lot of data! Cloud technologies provide the means for attorneys to readily access information and communicate with clients. Some larger firms have their data stored on in-house servers or in a colocation facility, but smaller firms and individual attorneys tend to purchase cloud storage from an IT provider that has the facilities, expertise and hardware in place to securely host their data. This is a cost-effective approach that also eliminates the need to hire costly IT personnel. Cloud technologies can also aid in making daily logistics, such as billing, time tracking and contract management, more efficient.
As the world becomes more and more digital, banks, credit unions and other financial institutions recognize the need to meet consumer expectations in their increasingly real-time world. This shift in technology means that the financial world must rethink the “branch-centric” model and move toward a omni-channel, customer-centric digital model. It means moving toward tech solutions with a big emphasis on on data security, access control and compliance requirements. For consumers, the next few years mean a progressively integrated and synchronized banking experience.
Banking & Finance Tech Trends
- Connecting Digital and Branch Experience:
Financial institutions are expanding their mobile services and integrating their customers’ banking and mobile experiences from application processes to general transactions.
- Tablets, Self-Service Kiosks and Video ATMs: Tablets allow customer service representatives to meet with and help customers who don’t need window service. Self-service let customers do their banking inside a brand on their own; some customers may chat with a remote teller through video ATMs.
Franchises have grown up since the days of the first McDonald’s in 1955 and single-shop owners who could be their own boss right out of the box. Today, franchises are run by multi-unit owners and often they are multi-brand franchisees. Accordingly to FranData, multi-unit franchisees currently own 53% of the 450,000 franchise units in the U.S. and own 5 locations on the average. Franchising has become a lucrative and competitive business investment, and certain key technologies have the potential to help franchises gain advantage over the competition.
Technology is driving rapid change in health care. The growing adoption of cloud-based Electronic Health Records (EHR) is just one example. These records are more agile for health care practitioners and provide a more complete medical history. For consumers, they mean greater access to and portability of their health information. The number of EHR providers, such as AthenaHealth, Epic, AllScrips and GE Healthcare, has skyrocketed, in part, because these cloud-based platforms can be updated seamlessly and integrate well with other business systems.
SAN LUIS OBIPSO, CA – Digital West Networks, Inc., which provides commercial-grade Internet connectivity, colocation and cloud services to businesses, has successfully completed a Type II SOC 2 compliance examination. The exam, known as SSAE 16, which stands for Statement on Standards for Attestation Engagements (SSAE) No. 16, is the authoritative guide used by CPAs to review service controls at an organization. The auditors conducted an objective evaluation of the controls Digital West has in place to protect its clients’ security, availability, processing integrity, confidentiality, and privacy. The data center compliance examination was performed by an independent CPA firm, 360 Advanced, and focused specifically on Digital West’s data center and colocation services. Digital West provided data, detailed documentation, and even video evidence to 360 Advanced to prove that the security measures claimed to be in place are actually utilized.
Three words that incite fear and panic in all who hear them. Here's a run-down of different types of security threats that should help you navigate the intimidating IT security landscape.
A vulnerability is a weakness in a system that can be easily exploited if found by an attacker. Common vulnerabilities include devices brought from outside the network (laptops, tablets, etc.), tampered USB drives, unencrypted passwords and credit card numbers in emails, and poorly trained employees who may click on a malicious link or email.
Today’s IT security environment is continuously changing and becoming more complex. High profile hacks have caused many businesses to become concerned over the risk of security threats to their own organization. Many security companies are adjusting to these demands by creating updated antivirus, malware protection, and firewalls. But are firewalls and antivirus enough to secure your business? We would argue no, and here's why.
2014 brought some of the worst corporate security breaches in years, including attacks at Target, JP Morgan Chase, Home Depot and, of course, Sony. But attacks are not limited only to Fortune 500 companies – every business should be taking active measures to limit information security risks and protect their assets.
How Hackers Get Access
- Phishing attempts, which look like legitimate emails, often resulting in employees giving away personal data such as passwords, account numbers or SSNs
- Cracking weak employee passwords, such as pet names, common words found in a dictionary or the original default password