Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Why cybersecurity frameworks are crucial for the future of open banking

By Rodrigo Tumaián
finance security freepik
July 12, 2021

Open banking is set to take the financial world by storm. When consumers allow third parties to access their banking data, financial companies and institutions can create more tailored products and services and drive innovation, convenience, and value. However, inherent in the handling of sensitive financial information are cybersecurity risks, and they’re not going unnoticed: 53% of people surveyed in this report see open banking as a “dangerous” use of data sharing. It’s no secret that the financial services industry is a prime target for cybercrime, and with a cyber attack in the banking industry costing $18.3 million on average, could open banking raise this cost even further?

Rather than see these risks as a reason to step back from open banking, however, financial institutions should be proactive in mitigating potential threats and embrace all that open banking has to offer. There are risks inherent in using almost all financial services, but that doesn’t stop the majority of the global population from enjoying their benefits in one way or another.

In this article, we’ll look at what the existing cybersecurity threats are around open banking, and how individuals, companies, institutions, and regulators can proactively address those risks.

But first...

 

What Exactly is Open Banking?

With the consent of the user, open banking allows third-party financial services to access their data on banking, transactions, and other financial activities. This data on consumer activity can come from banks and other financial institutions and is shared through application programming interfaces (APIs).

As it allows for data sharing, open banking is poised to drive serious innovation in the banking industry, allowing third-party providers to create tailored products and services that best suit their customers’ needs. Many argue that open banking promises to reshape the competitive landscape as it supports exceptional customer experience.

With valuable data, third-party financial services will be able to use the customer’s banking activity to better target them with financial service options, analyze aggregated data to create separate marketing segments, help facilitate a customer’s switch from one bank’s checking account to another, and much more.

However, with so much consumer data flowing between different actors, it’s vital that those banks, financial institutions, and third-parties that adopt open banking do so with cybersecurity in mind from day one.

What Are the Risks of Open Banking?

Some of the primary risks associated with open banking are data breaches as well as human error. If the third-party providers’ APIs do not meet security requirements, data breaches could occur, affecting the consumer and the bank that has shared that data. 

Vulnerabilities in a third-party company’s web or mobile application could open doors for hackers to enter and engage in fraudulent activity, such as requesting fake payments or posing as an individual user.

On the individual level, too many people lack the awareness of how their personal choices affect their data security. Most cyber-attacks are aimed at individuals, and 81% of them have targeted users with weak or repeated passwords. With 61% of users using the same passwords for all of their accounts, it becomes significantly easier for attackers to access data that’s strewn across multiple digital locations.

 

Prioritizing Cybersecurity Within Open Banking

There will always be risks in sharing sensitive information with a digital product, whether that’s entering your credit card information online or logging into a digital banking platform. However, most people don’t allow these risks to stop them from using those products, as they have a level of trust in the security of the platform.

The same must become true for open banking. It’s vital that both consumers and financial actors don’t shy away from open banking as a whole, but rather educate themselves and create the necessary frameworks to promote security and safety while sharing data.

Users should also be educated on how responsibly handle their data and ensure its protection in the digital realm. This means creating strong passwords and never sharing them, while any digital financial service should always implement multi-factor authentication (MFA) to add additional security. This is a no-brainer, as MFA blocks 99.9% of account takeover attacks. Encryption technology is also essential to protect data while it’s being shared or stored.

Going further, financial institutions and third parties can enhance their monitoring of suspicious activity by using machine learning (ML) algorithms. ML systems can learn from past data on instances of fraud, flag anything unusual, and suggest the appropriate action. Unlike previous manual monitoring methods, automated threat response systems can keep up with the rate of attempted attacks.

All of these measures must be embedded proactively into cybersecurity policies from the outset, rather than used to patch up issues after-the-fact.

 

The Role of Regulators

All third parties must comply with basic data protection rules, such as GDPR regulation in Europe. On the governmental level, regulators must step up and advance mechanisms that establish strong cybersecurity standards while ensuring not to cull the growth of open banking. 

This is already in action in the UK—the birthplace of open banking—as regulatory authorities like the Financial Conduct Authority (FCA) verify that the apps or services requesting data are trustworthy, while the Open Banking Implementation Entity (OBIE) is responsible for API standardization, central infrastructure, and governance. Communication between all parties, from banks to fintechs, to regulators, will be vital to develop coherent, strong frameworks and best practices.

These bodies also play a vital role in ensuring that consumer concerns are reassured, providing authenticity to the services that are collecting their data.

Open banking is not going away, in fact, it’s already poised to rewrite the rules of the financial sector. Promising to provide better value, experience, and convenience for customers and allow banks and third-party companies to drive innovation in their products and services, open banking is too big an opportunity to ignore.

To build a secure ecosystem that keeps all parties’ financial information safe, there must be a commitment to cybersecurity on all sides—from governments and regulators, all the way down to the individual user. Only then will open banking gain the support it deserves and help build the financial world of the future.

KEYWORDS: bank security cyber security data protection risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rodrigo Tumaián is CEO of Prometeo.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • enterprise wide cybersecurity training

    The first line of defense: Why employees are the key to stronger cybersecurity

    See More
  • cameras surveillance

    Cloud-based solutions playing crucial role in current and future of commercial security space

    See More
  • security guard freepik

    Why now is a crucial time to protect the mental health of security workers

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!