News

10:36 AM
Connect Directly
Facebook
Twitter
Google+
RSS
E-Mail
50%
50%

Looking for a Long Term Fix for Heartbleed

Banks need to start extending some of their customer-facing security solutions and protocols to their own internal networks.

Saying that there isn’t one quick fix or silver bullet solution for cyber security concerns has become common practice in financial services. The cyber fraud landscape is growing more complex and sophisticated, requiring a multi-layered approach to security that includes front end authentication and back-end monitoring and analytics.

Now that the Heartbleed vulnerability has been added to banks’ growing list of cyber security concerns, it’s time that banks start taking a similar multi-layered approach to their own networks, says Terry Austin CEO of Guardian Analytics, a fraud analytics solutions provider.

“As a security professional, you can’t trust authentication and malware protection anymore, because criminals can get into the network and look like legitimate users now with authentication credentials and access to your network,” Austin remarks.

[For More On Security and Data Breaches: Breaking Down the Impact of the Target Breach]

Looking for criminals simply isn’t enough anymore, and instead need to focus on analyzing user behavior and looking for anomalies in log-ins and actions, he advises. Many banks are already doing that with customer-facing offerings like online banking. But Austin believes that the Heartbleed vulnerability will drive banks to do the same thing with their own internal networks, analyzing the behavior of employees and partners and looking for odd behavior that could indicate a criminal has access to the network.

“We have yet to see all the breaches from the vulnerability and it’s full impact. I think this will definitely put pressure on the banks… We are already having discussions with banks on working to protect employees and partners working in their networks,” Austin shares.

Banks should first work to address the Heartbleed vulnerability by patching their internal hardware for the vulnerability and encourage their customers to change their passwords, Austin advises. They should then ensure that they have transaction monitoring and behavioral analytics in place on the back-end of their customer-facing applications. Finally, they need to investigate their internal IT security protocols to protect themselves from a compromise there. “No bank wants to have a mass Target-style breach,” Austin explains.

Jonathan Camhi has been an associate editor with Bank Systems & Technology since 2012. He previously worked as a freelance journalist in New York City covering politics, health and immigration, and has a master's degree from the City University of New York's Graduate School ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Jonathan_Camhi
50%
50%
Jonathan_Camhi,
User Rank: Author
4/28/2014 | 8:50:41 PM
re: Looking for a Long Term Fix for Heartbleed
I saw a list of sites that users should change their names and one of the major banks was on it. I think it's more of a precautionary though. Really you should probably be going through and changing all of your passwords, especially if you're using the same passwords for multiple sites.
KBurger
50%
50%
KBurger,
User Rank: Strategist
4/28/2014 | 8:20:24 PM
re: Looking for a Long Term Fix for Heartbleed
I'm intrigued that Terry says that, in the wake of Heartbleed, banks should advise their customers to change their passwords, as my understanding is that banks for the most part have said that their systems were safe from Heartbleed -- that it was more e-commerce sites that were affected.
Register for Bank Systems & Technology Newsletters
White Papers
Current Issue
Bank Systems & Technology - August 2014
Modern core systems are emerging as the foundations of effective channel integration and customer engagement initiatives.
Slideshows
Video
Bank Systems & Technology Radio