DriveLock in practise
Use case | Financial sector
Reports like these often shock and destabilise the financial world:
+++++++++ A new case of JACKPOTTING: Cybercrime on ATMs ++++++++++
This is what experts call attacks in which either malicious software has been installed on ATMs or criminals succeed in connecting their computer and inducing the ATM to dispense cash, e.g. through the Cutlet Maker malware.
++++ Banker TROJANS +++++++ PHISHING +++++++ Bank customer's data hacked +++++++++
Banker Trojans have infected 800,000 Android devices in the past four years. The people behind the group called Geost steal access data to bank accounts.
Using spear-phishing, criminals have succeeded in penetrating the IT system of an Eastern European bank using the IT system. For 2 months they spied out the system without being disturbed and collected information to carry out illegal transactions or take over ATM infrastructures.
More than 100 million bank customer's data were hacked in the USA: In July 2019, it became known that a hacker at US-Bank Capital One stole millions of sensitive customer data contained in credit card applications. The bank also announced that it expects additional costs of about USD 100 million to USD 150 million due to the cyber attack in 2019 alone.
IT security has been a high priority in the banking sector since its evolution into digitalisation. The requirements concerning cyber security include for example an appropriate IT strategy and management of information risks, information security and user authorisation. These are to be implemented in concrete terms with technical-organisational measures. In Europe, for example, the European Central Bank has announced the Cyber resilience oversight expectations (CROE), specifying the requirements for the resilience of the financial market infrastructure to cyber risks.
Also, financial institutions in some countries are also classified as critical infrastructures, for which security measures must be implemented and proven.
From this perspective, it does not matter which regulation or guideline you consult: as a financial institution you must give top priority to cyber and IT security.
The machine-learning whitelisting procedure, i.e. a positive list of approved programs that can be dynamically extended
Data medium control and data flow control (only authorised use of external media are allowed, such as USB sticks).
Optionally, DriveLock also supports encryption of data written to external media. DriveLock also supports full auditing of external media usage and logging of data flow, including shadow copies.
Encryption of hard disks, archives, directories and files, encryption of external removable media;
Management of Microsoft Bitlocker hard disk encryption.
Sensitisation of staff and employees through online lessons and interactive training e.g. to protect against fake emails or fishing attacks through social engineering.
Provision of a smartcard middleware for cost-effective use of smartcards (also for new versions). Thus, access/access control and multi-factor authentication can be realised cost-effectively.