Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security & Business ResilienceCybersecurity NewsBanking/Finance/InsuranceEnterprise Services

Mitigating digital banking security issues during the pandemic

By Ben Hartwig
financial security for banks
September 25, 2020

The banking industry was presented with numerous challenges as the pandemic spread across the nation and the world. Many banks learned just how capable their staff was to work from a location outside of the bank’s walls. When the right technology and safeguards are in place, telework can be a good compromise for many workers to be able to continue their important jobs while also having access to a safe work environment.

Digital banking provides faster processing of financial transactions, more convenience, and a model that allows for the continuation of a financial industry even in the face of a pandemic. However, digital banking makes banks vulnerable to cyberattacks. Banks are now facing fresh security challenges that were brought on or affected by COVID-19. Here is what you need to know about them and how to protect yourself.

Banks must learn how to properly train their staff on how to identify potential cybersecurity risks and how to respond to them. An emergency plan should also be in place at every financial institution that provides a blueprint to workers. First, however, security leaders must understand the potential threats:

The threats

Some of the most prolific cyberthreats banks are facing in light of the pandemic include identity theft, account takeover, malware automated threats and teleworking.

Identity theft

In 2018, there were 651,000 reports of identity theft. Identity theft is easier to commit online because there are fewer obstacles to this crime. For example, a person with a stolen credit card can often purchase products online that he or she would not be able to purchase in person because of EMV security (EMV is a set of international standards that defines interoperability of secure transactions across the international payments landscape). By being able to hack into a bank, a criminal may be able to steal the identities of several customers without ever coming into personal contact with the victim, making this a particularly attractive type of crime for a criminal during a pandemic.

Account takeovers

Account takeover occurs when a criminal accesses another person’s account and changes information about it, such as the address or email address associated with it. The real owner of the account does not receive updates about the account because the communication is rerouted to the criminal. Account takeover statistics show that this particular form of fraud has increased significantly over the last several years.

Malware automated threats

Another cybersecurity risk for banks is malware automated threats. These input malicious code through automated tools like internet bots. They complete many repetitive tasks and do not cost much to execute, making them particularly attractive to cybercriminals who can often reap significant financial benefits with a little associated cost.

Teleworking

Teleworking is another cybersecurity risk to banks. As more people must stay home to comply with government orders and to slow the spread of COVID-19, many bank workers are working remotely. If they do not have a secure network, criminals may be able to access sensitive data from these workers.

What can the banking industry do?

Have security procedures in place and communicate that to your customers. Before customers ever have to reset their password, be sure that you have communicated security procedures in place for customers to educate themselves.

Encourage customers to:

  1. Verify they are using the correct app or website before signing in.
  2. Educate themselves on spotting and preventing phishing scams.
  3. Avoid using public Wi-Fi to access online or mobile banking
  4. Use of multi-factor authentication.
  5. Regularly update passwords and avoid using one password for all banking sites and sign ins. 
KEYWORDS: bank security Financial Cyber Security financial service security mobile banking

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ben Hartwig is chief security officer and web operations director at InfoTracer. He authors guides on the entire cybersecurity posture and enjoys sharing best practices. You can contact him via LinkedIn.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1020-Business-Feat-slide1_900px

    Mitigating the risks of business travel during the pandemic

    See More
  • investigation

    Investigations and privacy issues during the pandemic

    See More
  • airport1-900px.jpg

    ACI World Issues Guidance for Security Screening During COVID-19 Pandemic

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 150 things.jpg

    The Handbook for School Safety and Security

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing