Computerworld Australia - SYDNEY -- Recent data losses at financial institutions have increased industry concerns about unauthorized access, according to Deloitte's 2005 Global Security Survey.
The survey of global financial institutions found a 21% increase over last year in concerns about unauthorized access to personal information. It was rated an area of concern by 83% of all respondents.
Kevin Shaw, Deloitte security service Asia Pacific leader, said the high level of fear reflected the fact that breaches of customer privacy had the potential to undermine trust in financial institutions at a most fundamental level.
"There is a lot of focus now on addressing these issues, but storage of credit card numbers is a process of policy and procedure. The CardSystems breach was a result of failure by [the company] to follow its own policy and it was using the data in ways it should not have when it got hacked; there isn't a technical solution for this," Shaw said.
"The growth in external attacks has slowed because financial institutions have become far more effective at deploying technological defenses such as intrusion detection, antivirus solutions and content filtering and monitoring, which means criminals have shifted their focus from technology attacks to human behavior and gaps in policy enforcement and governance.
"They now prey on staff in financial institutions and their customers and any weakness they can find in human behavior."
Shaw said Australian banks are performing well by global standards, particularly with staff training and threat awareness.
However, financial institutions worldwide are struggling to keep pace with the changing nature of IT security attacks.
Shaw said the role of a chief privacy officer is integral to combating the security landscape.
"At a global level, only 49% of respondents had established the role of chief privacy officer, although 5% acknowledged that they would have one by the end of the year," Shaw said.
"In Australia, most of the large financial institutions indicate they have some form of a privacy officer function. However, it is becoming increasingly critical that they consider an investment in a chief privacy officer with appropriate funding and authority."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts