I believe...
Monday, February 19, 2018
Tip of the iceberg?
Sunday, January 28, 2018
"Chanakyaneeti*" for Risk Managers
Friday, December 16, 2016
Are we fully geared up for this digital payment revolution?
Mobile Wallets, Digital Payments, UPI, have become a daily conversation now. I personally use digital payments regularly. We see posts on social media showing how the street vendors and auto rickshaws are now accepting payments digitally. This is definitely a good start and also the best way forward in my opnion..but as a risk professional it is my second nature to look at the possible pitfalls and perils.
“Are we fully geared up for this digital payment revolution?” Let me articulate some of the possible risks and then we can try to find solutions together..
Let’s look at the common man first, yes he has started using smart phones extensively..even the senior citizens and children have smart phones. But are they aware of the “secure” use of the mobile / digital payment methods? We are seeing a huge upswing in the cybercrimes which revolve around social engineering, phishing and vishing scams, debit / credit card and mobile wallet apps.
Possible solutions – User awareness is key. Security is a topic which should be taught in schools, public awareness must be drilled by government / regulators, banks and the payment service providers.
What happens if I lose my phone, or my phone battery runs out or the app malfunctions, or I don’t get the OTP?
Possible solutions – Don’t rely solely on mobile wallets. Keep a debit / credit card as backup. Net banking is another option. Develop Aadhar based easy payment systems which do not require the payer to carry a phone or card – “pay with your fingerprint”.
What about the apps themselves? Are the apps secure? One of the well-known and widely used app did not have a password till last week..even now the password is the same as the mobile unlock code / pattern. So if the phone is handed over for repair, one has to share the phone unlock code which can then be misused…
Possible solutions – We need a secure app standard, regulation and approval process by RBI and security audits immediately. Rogue apps and fraudsters must be dealt with swiftly by the government with help from the appstore / playstore providers.
What happens in emergencies or during disasters? As we saw during the recent cyclone in Chennai, there was no power to charge the phones or swipe machines. Internet connectivity was inconsistent. What is the plan B in such situations? We still have issues with connectivity and signals in rural areas and even in some parts of the towns and cities depending on the service provider.
Possible solutions – Offline payment options should be thought about..but in such situations cash exchange may be inevitable??
What happens if I make an error and make a mobile payment to the wrong person? What happens if I am a victim of a fraud? Where do I complain? How do I recover the money? What is the grievance redressal system? Can I lodge a police complaint? Will the overworked and already stressed law enforcement mechanism prioritize my complaint of a few thousands?
Possible solutions – Define a simple and standard framework and work flow to address such cases. Empower banks and create a “clearance house” to resolve orphan / failed payments and funds missing in transit. Government needs to strengthen the law enforcement mechanism to tackle frauds.
What happens if some unknown person accidently / intentionally transfers money to my wallet? Will I be caught in money laundering trap?
Possible solutions – Again, awareness is key. There should be a simple process to report money laundering which does not antagonize the person reporting the issue. Genuine mistakes should be addressed through the “Clearing house”. But intentional misuse must be tracked and dealt with swiftly.
Change is good..but every change brings some uncertainty and disruption which most humans are uncomfortable with. By nature we strive for equilibrium, so we need to find this equilibrium ASAP to get back the focus on the progress of our country.
Please feel free to share any solutions which you can think of..
Sunday, November 13, 2011
Beyond Network Security - Risks for Financial Services Companies
| "Endpoint protection suites that include anti-malware/spyware, personal firewall, and security policy enforcement for VPN connectivity are replacing the basic anti-virus software." Parag Deodhar, Chief Risk Officer, Bharti AXA General Insurance
With growing penetration of mobile computing (tablets/mobile phones) and increasing proliferation of Internet access across India, financial services companies are leveraging the online mode of business. However, online transactions are prone to various security threats. Organized crime is targeting this lucrative avenue to make a fast buck.
Application security is one of the most neglected areas, which results in various vulnerabilities, and hackers take advantage of the unprotected websites and transaction portals to introduce malware to unsuspecting users. The unsuspecting users give away their confidential information and fall prey to fraud.
More and more users now access Internet through wireless networks, freely available at Wi-Fi hotspots in airports and cafes, which are unencrypted and unprotected. These networks are highly susceptible to threats like sniffing and hacking.
Enterprises are under growing pressure to allow BYOD, i.e., bring your own device. This means that employees are allowed to use their personal laptops/tablets to connect to the enterprise network and work on it. While this may help reduce costs to a certain extent, the number of security issues rise manifold.
Most websites now have SSL encryption between the client's web browser and server. This makes it difficult for the perimeter security products such as content filtering, anti-malware to scan the encrypted data and payload exchanged between the endpoint and server. Hackers use SSL as one of the ways to mask malware like viruses, Trojans, and other exploits and target corporate networks. Organisations cannot block SSL encrypted traffic because most business-critical websites use it.
SSL encrypted traffic can also be misused to leak sensitive data through encrypted email and filesharing sites. Access to social networking sites also poses risks to the networks and can be exploited as a channel for data leakage.
Attacks like DNS poisoning and click jacking direct users to malicious websites which look genuine and entice users to part with their credentials, passwords, and other confidential information.
Solutions Implemented By Financial Services
Organisations are deploying sophisticated tools to minimize threats to the network security. Endpoint protection suites that include anti-malware/spyware, personal firewall, and security policy enforcement for VPN connectivity are replacing the basic anti-virus software. Anti-phishing software and toolbars are now being used to warn end-users about malicious and spoofed sites.
In addition to network firewalls, organisations are deploying web application firewalls to protect their websites and portals. Intrusion detection and prevention systems are now the minimum requirement to protect the networks. Apart from these, content filtering tools are also being implemented to allow selective access to Internet content. Wireless networks are being encrypted and sandboxing virtual terminals are implemented for secure access through personal devices.
Data leakage prevention (DLP) suites are being implemented by many organisations. This is implemented with a defence-in-depth architecture. The DLP suite includes endpoint agents, network - email, Internet gateways, and servers. Some of the DLP software and perimeter security products now allow SSL visibility and control. These minimize the risk of data leakage or malware creeping in through encrypted traffic.
To protect customers from fraudulent transactions and attacks, most financial services companies now use two factor authentication, one-time passwords, and virtual keyboards for their online transactions.
While financial services companies are trying to implement various security measures to minimize the risk, criminals seem to be one step ahead and manage to find and exploit new loopholes or vulnerabilities to defraud the financial services companies and their customers.
|
Tuesday, August 9, 2011
Changing rules of the game
In the information security realm, we generally get to hear the prefixes total, comprehensive, best in class, etc. I had never heard the prefix reasonable (in the context of security) before it was mentioned in the IT (Amendment) Act 2008. Even then, it has only come up for debate amongst the info-sec professionals.
- Commitment to privacy
- The information collected
- How and where information is stored and shared
- Commitment to data security
- How to access or correct your information
- Contact details
- A grievance redressal mechanism
If organizations want to transfer sensitive personal information to any other organization, e.g. outsourced data processing unit, call centre or data centre, then they would need to ensure that such a third party would also have the same level of security as maintained it. It will be imperative for organizations to mandate the level of security and also ensure that these standards are met with by partners through regular audits.
Data destruction
- Analyze if you collect any sensitive private information
- Draft a privacy policy and publicize it
- Take consent from information providers
- Implement reasonable security measures to protect information
- Ensure that your partners who access or use this information are equally secure
- Don’t forget to destroy the sensitive information once it is no longer required
- Get an annual audit done to ensure compliance with reasonable security measures
Friday, July 22, 2011
Child safety in cyberspace
“Mom, all my friends are on facebook, why is it that only I cannot have a facebook[1] account?” My 10 year old daughter was pleading her case in the Supreme Court. I could already see from the expressions on face of the Judge, the case was beginning to tilt in prosecution’s favour without even giving a chance to the defendant. But I was not going to give up this case so easily, I had my defence ready…
| <><><><> > |
| | <><><><> >
If your children have unsupervised access, consider installing “parental control” software. This will help prevent access inappropriate content as well as help you monitor the online activity of children. If your child has a cell phone, consider getting an itemised statement which can help identify any specific / unknown numbers which are calling / messaging frequently and at odd hours.
Wednesday, July 13, 2011
Security Metrics: Demonstrate the Business Value
Security Metrics: Demonstrate the Business Value
Our company, Bharti AXA General Insurance Company Ltd., is a general insurance joint venture started about three years ago, and right from the start, I’ve been interacting extensively with the business side of the company. We were late entrants into the insurance market, we were probably the 16th entrant, there were giants ahead of us, and shareholders wanted to get into the top five in the five-year time frame.
Every time I went to the management to get budget approvals for information security, the questions were very different from what I’d faced earlier. The management would say, ‘fine we’ll give you the money, but tell us how this will help us get into the top 5 slot in the insurance market?’ I would get stumped, thinking I’m talking about security and controls, but the management needs to know how that will help the company meet its objective.
Balanced Score Card: Such questions prompted us to attempt a balanced-score-card approach to demonstrate the value at risk, to our business colleagues. Our company’s mission is to become the preferred general insurance provider for our customers, partners, employees, and, shareholders. The balanced score card talks about finance, employees, learning and growth and customers, which put our mission statement in alignment with the score card quadrants. That’s how we got the idea to use the score card approach to show how information security is adding value and contributing to the company’s growth.
Every department had to come up with their goal sheets in line with the mission statement. The Information Security team also did the same. While not exactly following the score card methodology, we looked at how we can add value to shareholders, partners, and customers.
Metrics: What did we measure? Instead of the normal way of counting incidents, user IDs created or deleted, we tried to give them a business value number on what is at risk. How does one match the security metrics with the top line and the bottom line with every single security incident -- we presented this from a finance and business perspective.
For example, if the company’s website went down for a certain period, customers won’t be able to buy online policies, which would hit the top line. While this isn’t a fool-proof system, and has a lot of assumptions, it still yields a way to value risk to business. Therefore, tracking the number of customers who generated quotes using the site would be an indicator, as the ratio of the quotes generated to actual conversions to policies sold is known.
If we don’t have Log monitoring, firewalls, IPS, IDS and so on, what would be the value at risk. From a regulatory and compliance point of view, the auditors from the Insurance Regulatory Authority of India tend to look at the steps we’ve taken from the perspective of customer protection, which again plays into the idea of figuring out what’s the value at risk and how the score card will be affected by the absence of certain IS measures.
Business executives look for trends in the form ‘where were we six months ago and what is our position today and where do we want to be two quarters down the line.’ Finding a way to show in a measurable way, which way the risk to the business is moving before and after putting in place various controls, will help CIOs get the backing of their business colleagues.
Dear CIOs,
CTO Forum is happy to present this opinion piece by Parag Deodhar, Chief Risk Officer, Bharti AXA General Insurance Company Ltd., in continuing our efforts to bring you expert opinion of substance from peers and specialists. The top management doesn’t want to listen to a technology speech. Show them trends and measurably demonstrate the business value of the various controls put in place Click here for the full opinion. We value your feedback:editor@thectoforum.com. Happy reading, Team CTO Forum 9.9 Media | B - 118, Sector 2 | Noida - 201 301 | I N D I A |
| ||