Cybersecurity critical for digital banking success: SBI official

[ad_1]

Read More/Less


Digital banking is thriving on artificial intelligence and technical algorithm models which help to find out the customer’s ability to pay and also the intention to pay along with credit ratings of the customer.

(Subscribe to our Today’s Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)

Cybersecurity is critical for the success of digital banking and banks should create the infrastructure to win customers’ trust for all such transactions, a senior SBI official said on Wednesday.

Digital banking or Figital is here to stay and is the future but it is equally important to safeguard the interests of all stakeholders, State Bank of India (SBI) Deputy Managing Director and Chief Digital Officer Ravindra Pandey said at a webinar.

Also Read | European banking regulator EBA targeted in Microsoft hacking

“It is important to win the customers’ trust in any system. It is the objective of banks to create and win the customers’ trust, such that all transactions are routed through banks as is presently done by multiple payment apps,” Pandey was quoted as saying in a release issued by industry body PHD Chamber of Commerce & Industry.

The official said that fintech has bought about changes in the customer mindset and it is an era of techfins rather than fintech.

Digital banking has helped in enhancing customer relationship, engagement and satisfaction and reduced operating cost, processing cycle time, among others, he added.

Also Read | India’s cyber defenses breached and reported; govt. yet to fix it

Digital banking is thriving on artificial intelligence and technical algorithm models which help to find out the customer’s ability to pay and also the intention to pay along with credit ratings of the customer.

According to the official, conventional operating models have given way to new channels. There are three areas in fintech that needs to be intertwined to make it a success — payment and remittance; process improvement – compliance and risk management; and customer engagement –, he noted.

Also Read | SEBI mulls cybersecurity fusion centre for securities market

Sanjay Aggarwal, President of PHD Chamber of Commerce & Industry, said the banking industry is moving towards a more collaborative and open environment while focusing on data protection and minimising systemic risks.

Representatives from fintech companies, NBFCs and other financial sector also participated in the webinar.

You have reached your limit for free articles this month.

Subscription Benefits Include

Today’s Paper

Find mobile-friendly version of articles from the day’s newspaper in one easy-to-read list.

Unlimited Access

Enjoy reading as many articles as you wish without any limitations.

Personalised recommendations

A select list of articles that match your interests and tastes.

Faster pages

Move smoothly between articles as our pages load instantly.

Dashboard

A one-stop-shop for seeing the latest updates, and managing your preferences.

Briefing

We brief you on the latest and most important developments, three times a day.

Support Quality Journalism.

*Our Digital Subscription plans do not currently include the e-paper, crossword and print.

[ad_2]

READ FULL ARTICLE HERE

Microsoft Email Flaw Compromised More Than 20,000 Organisations

[ad_1]

Read More/Less


More than 20,000 US organisations have been compromised through a back door installed via recently patched flaws in Microsoft Corp’s email software, a person familiar with the US government’s response said on Friday. The hacking has already reached more places than all of the tainted code downloaded from SolarWinds Corp, the company at the heart of another massive hacking spree uncovered in December.

The latest hack has left channels for remote access spread among credit unions, town governments and small businesses, according to records from the US investigation. Tens of thousands of organisations in Asia and Europe are also affected, the records show. The hacks are continuing despite emergency patches issued by Microsoft on Tuesday.

Microsoft, which had initially said the hacks consisted of “limited and targeted attacks,” declined to comment on the scale of the problem on Friday but said it was working with government agencies and security companies to provide help to customers. It added, “impacted customers should contact our support teams for additional help and resources.”

One scan of connected devices showed only 10 percent of those vulnerable had installed the patches by Friday, though the number was rising. Because installing the patch does not get rid of the back doors, US officials are racing to figure out how to notify all the victims and guide them in their hunt.

All of those affected appear to run Web versions of email client Outlook and host them on their own machines, instead of relying on cloud providers. That may have spared many of the biggest companies and federal government agencies, the records suggest. The federal Cybersecurity and Infrastructure Security Agency did not respond to a request for comment.

Earlier on Friday, White House press secretary Jen Psaki told reporters that the vulnerabilities found in Microsoft’s widely used Exchange servers were “significant,” and “could have far-reaching impacts.” “We’re concerned that there are a large number of victims,” Psaki said.

Microsoft and the person working with the US response blamed the initial wave of attacks on a Chinese government-backed actor. A Chinese government spokesman said the country was not behind the intrusions. What started as a controlled attack late last year against a few classic espionage targets grew last month to a widespread campaign. Security officials said that implied that unless China had changed tactics, a second group may have become involved.

More attacks are expected from other hackers as the code used to take control of the mail servers spreads. The hackers have only used the back doors to re-enter and move around the infected networks in a small percentage of cases, probably less than 1 in 10, the person working with the government said. “A couple hundred guys are exploiting them as fast as they can,” stealing data and installing other ways to return later, he said.

The initial avenue of attack was discovered by prominent Taiwanese cyber researcher Cheng-Da Tsai, who said he reported the flaw to Microsoft in January. He said in a blog post that he was investigating whether the information leaked. He did not respond to requests for further comment.

[ad_2]

READ FULL ARTICLE HERE