Retail banking includes traditional players such as brick-and-mortar banks that operate at community, national, or even international levels. It also includes many new players, such as challenger banks that only operate online, financial technology companies (FinTechs), and nonfinancial companies seeking to disrupt the status quo and compete for market share, such as Amazon, Apple, and Facebook. Unlike traditional banks, these new players are often digital natives that bring some strategic “big-tech” advantages to serving customers in an increasingly online world.
Related Category: Security Operations
Type of Content: Articles
Prior to 2020, the financial services industry had already seen drastic technology- led changes over the past few years. Thanks to their experiences in other industries adopting digital innovation, customers now expect better digital service options, seamless experiences regardless of channel, and more value for their money. The global COVID-19 pandemic has sharply accelerated these trends, as more people choose digital-only transactions not only out of convenience but also safety. Mobile banking use has surged by 50% over the first half of 2020.1 Over half (57%) of consumers now say they prefer internet banking (up from 49% pre-COVID-19), and 55% now prefer banking mobile apps (compared with 47% previously).2
Many traditional banks are now facing intense and immediate pressure to accelerate their digital innovation processes in order to meet customer needs during this period of extended crisis and even beyond. In a recent global survey, only 40% of respondents said they expect to return to physical bank branches post-COVID-19— indicating that the shift to online is likely to stay.3
While COVID-19 drives revolutionary demand for online banking services, cybercriminals will continue to look for any and every opportunity to take advantage. The financial sector remains a favorite target for attacks seeking financial gain, trade secrets, or service disruptions that bring publicity to social or political causes, as many recent, headline-grabbing breaches in the sector have demonstrated. Depending on the severity of the attack and the specific bank in question, a single successful breach can lead to serious damage to the brand. As digitization becomes an even greater necessity across the banking industry and security risks increase, executive teams, need to ensure the resiliency of their business operations, their compliance with government and industry regulations, and the effectiveness of their cybersecurity infrastructure to protect an expanding attack surface.
Even before the compounding effects of COVID-19, banks had several significant pain points that were delaying, impacting, or obstructing their digitization efforts. In a recent global report, a majority of bank executives cited cybersecurity and privacy concerns (80%), outdated data management (68%), and identifying the right partners (73%) as primary barriers to moving to an online banking platform.6
Banks have long been siloed organizations; different departments with their own goals using disparate systems. This inevitably leads to stunted growth, limited scalability, and decreased customer satisfaction. Information silos can also pose risks to security and compliance, due to a fundamental lack of cooperation and consistency in corporate policymaking.
Although cultural adaptation should be a first step in adopting digital innovation, many banks simply lack the agility needed to make far-reaching changes in their culture or their operations. Being agile not only means adopting a new method but also adopting the right mindset.
April 2020 saw a 200% jump in new mobile banking registrations worldwide, while mobile banking traffic rose 85%.4
Over the next five years, banks stand to lose $347 billion in revenue because of cybercrime.5
The COVID-19 pandemic has driven a massive 72% rise in the use of financial apps across Europe—as well as strong FinTech usage upticks in Asia and the Middle East.7
>> Download Article to continue reading.
FortiOS, the Fortinet network operating system, is the heart of the Fortinet Security Fabric. This operating system, or software, is at the core of the Security Fabric and ties all components together to ensure a tight integration across an organization’s entire Fabric deployment.
Ask a group of security analysts about the challenges of working in cybersecurity, and you’ll likely hear some common themes....
In order to stay competitive and reduce costs, smart enterprises are constantly on the hunt for disruptive ways to leverage technology. They’re moving towards hybrid IT environments because they recognize the benefits of faster implementations and high cost savings that come with moving from on-premises to cloud-based applications and infrastructure.
In the decades since “cloud computing” first achieved buzzword status, its benefits have been widely proven. And now that the shift to both dynamic work environments and digitized customer experiences has rapidly accelerated, migrating these applications to the cloud is more important than ever.
Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations.
There’s a lot of truth to the statement that all companies are technology companies. After all, the core focus of a technology company is to deliver software, whether internally to empower the workforce or externally to serve customers. Technology companies also maintain servers to create, collect, store, and access data—which is now the norm for organizations worldwide, whether public or private, commercial or enterprise.
The drawbacks of passwords are well known – simply put, they can be hard to remember, easy to hack and a general nuisance for both end users and security personnel. However, passwords remain a staple of many organizations’ security frameworks, despite the fact that the cybersecurity industry has been calling for the death of passwords for nearly 20 years now.
Device trust is the process of analyzing whether a device should be trusted and therefore is authorized to do something. It’s critical that the devices accessing company data are trustworthy. Determining which devices should be trusted is a unique decision made by each organization depending on their risk tolerance and compliance requirements.
The world of Identity and Access Management (IAM) is rarely controversial. But today, there is a battle brewing in how we-as an industry-talk about customer-facing use cases for IAM. The world of Identity and Access Management (IAM) is rarely controversial. But today, there is a battle brewing in how we-as an industry-talk about customer-facing use cases for IAM. Many are starting to refer to this as Customer IAM or Consumer IAM, both abbreviated as CIAM. CIAM does have some unique requirements. But that does not mean that you must use a product that only focuses on CIAM. Okta’s approach is to offer a broad IAM cloud service with a strong foundational platform and functionality that enables CIAM use cases—we believe ultimately a better long-term choice.
Vladimir Putin’s attack on Ukraine has led to a united response from NATO powers determined to stop Russia’s leader extending his western border. Whilst sanctions may take some time to impact the Russian invasion, another threat has arisen causing concern for Western governments and agencies. Bodies such as the National Cyber Security Centre (NCSC) and the US’s Cybersecurity and Infrastructure Security Agency (CISA) have warned organisations to be extra vigilant in the face of the increased threat of Russian-led cyber-attacks.