⭐️

Learnings From The Cyber Attacks on Banking Industry

one of the best cyber security vapt companies

Table of Contents

Year 2018 was full of cyber-attacks and the most serious news was about well-orchestrated cyber-attacks on banking industry. No matter how much awareness is generated, unfortunately the banking industry seems to be waking up only upon hearing about an attack and becomes sluggish on cyber security.

While providing consultancy to many banks, in different geographical areas, different sizes etc, I talk to IT heads and CISO. It made me realise that they are in a great deal of confusion in getting the whole thought process together to approach cyber security implementation in their respective banking IT infrastructure. This article is an attempt to articulate various Do’s and Don’ts which might help everyone get a bigger picture and see what is being missed by them.

Please be advised that the last one above is extremely important. This is because usually it is forgotten by bank’s management that cyber-attack is about information leakage as a whole, and not just about IT server or desktop data leakage.

Prashant Phatak

Founder & CEO, Valency Networks

Prashant Phatak is an accomplished leader in the field of IT and Cyber Security. He is Founder and C-level executive of his own firm Valency Networks. Prashant specializes in Vulnerability assessment and penetration testing (VAPT) of Web, Networks, Mobile Apps, Cloud apps, IoT and OT networks. He is also a certified lead auditor for ISO27001 and ISO22301 compliance.As an proven problem solver, Prashant's expertise is in the field of end to end IT and Cyber security consultancy to various industry sectors.

Related Blogs

Difference Between Privilege Escalation Attack and IDOR Attack

⭐️

Wireshark Tutorial -10 | Creating Wireshark Profiles

⭐️

Wireshark Tutorial -9 | Exporting and Sharing PCAP Files

⭐️

Wireshark Tutorial -8 | Detecting ICMP Floods or DoS Attempts

⭐️

Wireshark Tutorial -7 | Expose passwords sent in plain text

⭐️

Wireshark Tutorial -6 | Analyze HTTP, HTTPS, and DNS traffic