Story image

573 days: Financial sector slow to fix vulnerabilities

28 Jan 2019

It’s a challenging time for the financial services sector as it refreshes itself for the modern age – legacy systems are still gripping businesses while they seek to modernise their systems without downtime or service disruption.

While that change slowly progresses, the sector is at risk of vulnerabilities. A recent Veracode State of Software Security report shows that the financial services sector is one of the slowest industries to keep IT systems safe.

The global report found financial services companies took 29 days to address a quarter of their vulnerabilities in coding, and 573 days to remediate all open vulnerabilities. It also ranked as second to last of all other sectors in terms of speed to complete flaw remediation. 

It also says 67% of the current applications that bank use are at risk from information leakage, which means they could be breaching GDPR laws.

Information leakage is when an application reveals sensitive data that can be used by an attacker to exploit a web application or its users. Veracode says this is worrying given the IT outages occurring within the global financial services industry.   

But it’s not all doom and gloom – financial organisations do have the most mature overall cybersecurity practices, they just struggle to stay on top of application security.

Additionally, the banking sector addresses the first half of its open flaws slowly, but it starts to pick up speed once it passes the halfway point.  
“Since financial institutions and banks hold highly valuable information and critical assets, they will continue to be a target of cybercriminals and malicious hacking,” says Veracode EMEA and APJ director Paul Farrington.

“Our data shows the financial services sector scanning a huge volume of applications and finding flaws that need fixing. While that is encouraging, the next frontier is achieving greater speed in fixing those flaws because speed matters.

"The speed at which organisations fix flaws they discover in their code directly mirrors the level of risk incurred by applications. The sector should consider all dimensions of risk to prioritise which flaws to fix first.”

Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.