{"id":354,"date":"2006-06-25T00:00:00","date_gmt":"2006-06-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/25\/security-in-the-balance\/"},"modified":"2021-12-30T11:37:05","modified_gmt":"2021-12-30T11:37:05","slug":"security-in-the-balance","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/06\/25\/security-in-the-balance\/","title":{"rendered":"Security in the balance"},"content":{"rendered":"<p>Until recently, banks have considered information security as a cost of doing business.  Nowadays, new market trends are driving the financial sector&#8217;s IT security investments.  For one, the constant barrage of security attacks banks have suffered has resulted in declining customer confidence.  That imposes a huge challenge on financial organisations that are looking to add more customers, especially in the area of online banking where most Middle East banks have increased their focus.  As the consumers&#8217; level of awareness of data security and data confidentially increases, banks are starting to look at security from the perspective of their clients.  For instance, in the US, several major banks, such as Citigroup, have launched advertising campaigns heralding their recent investments in security, and makes these banks not only the better choice, but also the safer choice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;There is a growing concern about the damage to brand reputation and brand equity when a phishing attack is successful and gets media attention,&#8221; says Justin Doo, managing director of Trend Micro Middle East and North Africa.  &#8220;One of the biggest risks banks face here is negative customer perception of the banking operations,&#8221; agrees Maria Medvedeva, regional director for security management business unit, CA EMEA Eastern markets.  &#8220;In Dubai, we have read about different banks that have been subjected to fraud, such as phishing e-mails or physical damage to their ATMs.  People see it as lack of security control and this causes absolutely negative perception and customer dissatisfaction.&#8221;<\/p>\n<p>For a customer, a security fraud means that the bank has failed to implement systems or some type of security control to protect its customers.  Such concerns have led to the slow uptake of online banking, according to Doo.  &#8220;Most banks are spending more money gearing up for growth in online banking than they are spending gearing up for growth in physical location expansion,&#8221; he says.  Research has shown that the cost of a transaction where somebody visits a branch and does an over-the-counter transaction is nearly ten times the cost of the same transaction that is carried out online,&#8221; Doo continues.  &#8220;However, there is a global slowdown, at the moment, when it comes to internet banking uptake.<\/p>\n<p>To encourage people to adopt online banking, Ayman Majzoub, general manager of Pointsec Mobile Technologies Middle East and Africa, insists banks should put more emphasis on better security tools.  For instance, we go and secure one server or secure one desktop.  &#8220;Banks in the US are already on stage three and four because they are trying already to improve on alignment of business by introducing more and more reporting mechanisms.&#8221;  Majzoub believes that the lack of regulatory policies is the main reason why banks in the Middle East are not actively doing more to improve security.<\/p>\n<p>http:\/\/www.itp.net\/features\/details.php?id=4568&#038;category=<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-354","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=354"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/354\/revisions"}],"predecessor-version":[{"id":2841,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/354\/revisions\/2841"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}