Connect with us

Business

Is your business ready for the inevitable cyberattack?

Ishwar Fernandes, Head of Technical Architects, CSI Ltd

Today, it’s not a matter of if your business will be hacked, but when. The 2024 UK Government Cybersecurity Breaches Survey revealed a startling statistic: 50% of UK businesses suffered a cyberattack or security breach in the previous 12 months, up from 39% in 2022. The average cost of a data breach in 2023 was $4.45 million. For small companies, the impact can be devastating, with an estimated 60 percent going out of business within six months of a cyberattack or data breach.

The alarming state of cyber resilience

The UK National Cybersecurity Centre (NCSC) has highlighted the significant and enduring cyber threats facing the UK in its latest annual review. The report points to the increasing frequency and sophistication of cyber threats, emphasising the need for enhanced cyber resilience across all sectors. This assessment aligns with the UK’s science secretary’s recent warnings about the UK’s urgent need to bolster its cyber defences​.

Lessons from recent cyber incidents

The vulnerability of the UK’s cyber infrastructure is not theoretical. The Crowdstrike outage that took down millions of computers reveals how IT and security lapses can have far-reaching consequences.

The rise and rise of ransomware attacks also means that backup and recovery best practices are more important than ever. Service downtime, customer upsets, and corrupted data are just some of the common consequences that arise after a ransomware attack leaves a business offline.

Preparing for the inevitable

Cybersecurity threats are inevitable, making it essential for businesses to prepare for the worst. The critical question is: if your business is hacked, is your data protected, and can you recover it in hours rather than days or weeks? If not, you are leaving your business vulnerable to severe disruptions.

While everyone emphasises the importance of backups, the real challenge lies in ensuring their integrity and recoverability. Are your backups clean? Can you quickly restore data without prolonged downtime? The total cost of ownership (TCO) of your data protection strategy over time is a crucial consideration. Traditional methods, such as relying on Iron Mountain for physical backups, are cumbersome and time-bound, requiring significant effort to locate and restore data.

Right data, right place, right time

The story of data storage, much like the shift to cloud computing, revolves around strategically placing the right parts of your business operations in the most suitable locations at the right times. Data protection follows the same principle. Resilience is still a topic of frequent discussion, yet its broad nature makes it challenging to establish a clear set of best practices. As headlines frequently highlight new victims of cyberattacks, it raises the question: has data protection become more critical than traditional security measures in safeguarding a business’ core assets?

Best practices for building robust data protection

  1. Adopt zero trust principles

Implement zero trust principles to silo parts of your technology stack. This approach limits access to only those who need it and continually verifies each user and device. By segmenting your network and enforcing strict access controls, you can blunt the spread of infections and slow down the lateral movement of ransomware. This means that even if one part of your network is compromised, the rest remains secure, reducing the potential impact of an attack.

2. Use smart data backups

Use data backups strategically to secure your business’s critical workloads. Regularly back up your data and store copies in multiple locations, including off-site and in the cloud. Ensure that these backups are encrypted and protected by strong access controls. By having reliable backups, you can quickly restore data in the event of a cyberattack or other disaster, minimising downtime and loss.

3. Implement immutable data solutions

Immutable data backups can be leveraged as a defence mechanism. Immutable data ensures that once a backup is created, it cannot be altered or deleted. This provides a safeguard against ransomware attacks and human error, ensuring that you always have a clean copy of your data to restore from. Implementing immutability can significantly enhance your data protection strategy and ensure rapid recovery during a crisis.

4. Conduct regular security tests

Identify critical data, duplicate it, and store it securely. If you have seen this routine backup equation before, you might be missing one of the most important steps. Testing your backups, and ensuring copies are ‘clean’ and recoverable, makes the difference between a rapid recovery and one that’s halted by infected data. Businesses should conduct regular drills and simulations. This helps identify weaknesses and ensures that your team is prepared to respond effectively to real-world threats. Drills should cover various scenarios, including ransomware attacks, data breaches, and other common cyber incidents.

5. Prepare for advanced threats

As cybercriminals increasingly target backup systems, it is essential to secure these systems with the same rigor as your primary data. Strengthen traditional backup and recovery systems against targeted attacks by using advanced malware protection and regular security audits to identify and mitigate vulnerabilities in your backup infrastructure. This proactive approach helps protect your safety net from being breached by attackers.

6. Increase your cyber hygiene

Focus on policies that promote good cyber hygiene and clean data practices. Educate employees about the importance of cybersecurity and best practices for protecting data. Regular training sessions can help reinforce the need for strong passwords, phishing awareness, and secure handling of sensitive information. A culture of cybersecurity awareness is essential for maintaining robust data protection.

7. Plan for business continuity

Integrate data protection into your business continuity and disaster recovery plans to outline how your business will maintain operations during and after a cyberattack. These plans should include detailed procedures for data recovery, communication strategies, and roles and responsibilities. Again, regularly update and test your plans to ensure they remain effective and relevant.

8. Integrate data protection with emerging technologies

Data protection has become the backbone of other technologies, such as public cloud, storage, and AI. As businesses increasingly rely on these technologies, robust data protection becomes even more critical. Ensuring that data protection measures are integrated with these technologies will enhance resilience and minimise downtime.

Invest in data protection to save the cost of a data breach

Investment in robust data protection measures is minimal compared to the potential cost of data loss. The average cost of a data breach is significant, but the long-term impact on a business’ reputation and customer trust can be even more damaging. Investing in data protection not only safeguards against financial loss but also enhances business continuity and resilience.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Business

Technology’s Role in Transforming Insurance: From AI to Cyber Risk 

Source: Finance Derivative

Authored by Samiul Chowdhury, Principal Actuarial Consultant, RNA Analytics 

The insurance industry is undergoing a significant transformation, driven by rapid advancements in technology. From property and casualty to life insurance, the role of digital solutions has never been more important. Today, it’s almost impossible to imagine a successful, compliant insurance business without technology at its core. 

But how exactly is technology reshaping the insurance landscape? And what does it mean for the future of actuarial work, AI, and cyber risk? Let’s explore. 

The Essential Role of Technology in Modern Insurance 

Technology is the cornerstone of the successful modern insurance business – whether property, casualty or life. It’s no longer optional—it’s essential! Operating a successful and compliant insurance company today without the help of software solutions would be a real challenge. Whether it’s managing customer data, meeting regulatory demands, or assessing risk, technology is at the heart of everything modern insurers do.  

In recent years, regulatory compliance has been a top priority for (re)insurers across the globe, with IFRS 17 probably the number one focus. The new accounting standards are highly complex, and their implementation has forced many insurers to rethink and redesign their entire approach to financial reporting and infrastructure. However, this challenge has also been a catalyst for technological innovation.  

One of the most significant changes brought about by IFRS 17 is the integration of traditionally siloed such as functions such as actuarial, finance and accounting functions. This alignment gives insurers unprecedented insight into opportunities and risks, enabling them to make more informed decisions. Beyond compliance, accuracy and extensive flexibility, this integration offers insurers a chance to enhance accuracy, achieve greater flexibility, and gain a deeper understanding of their financial landscape. 

How AI is Changing the Actuarial World 

Much has been said aboutArtificial Intelligence (AI) and its potential to disrupt industries. In insurance, AI is already proving to be a game-changer, especially in actuarial work. With the right approach, AI holds great promise of making processes smoother and bringing faster, more accurate decision-making into play. 

However, AI is not here to replace actuaries. Instead, it enhances actuaries’ roles by automating their routine tasks such as data pre-processing, model fitting, and report generation. This automation allows actuaries to focus on more strategic tasks, giving them a more central role within the organizations. 

Meanwhile, AI modelling introduces new sources of uncertainty. Actuaries must understand the limitations and assumptions behind the AI models they are using. It’s important to ensure that these are fair, unbiased, and ethical —particularly when it comes to pricing and underwriting. This means actuaries will need to pick up new skills, especially in data science and programming languages like Python and R.  

In other words, AI offers actuaries the chance to work more efficiently and strategically, but only if they are prepared to navigate the complexities it brings. 

The Growing Challenge of Cyber Risk. How Do Insurers Keep Up?  

Cyber risk has emerged as one of the most significant threats insurers face today. Cyber insurance is not the same as it was twenty years ago. The policies were relatively simpler, and insurers didn’t have as much data or experience to rely on. Today, they are more complex, reflecting the increased scale and sophistication of cyber threats. 

As cyberattacks have increased, so has our ability to model and understand them. Insurers have gained more data over time, which has allowed them to get a better grip on the risks involved. However, here is the thing: technology evolves, and so do the threats. Whether it’s a data breach, ransomware attack, or even non-malicious technical failures like the recent CrowdStrike outage, the risks are more systemic and far-reaching than ever.  

Looking ahead, as we enter the Web3 era where information becomes ever more interconnected and managed by semantic metadata, we’ll have a complete set of new vulnerabilities. Business models will shift, and with that, the risks insurers will need to cover. By 2044, cyber insurance policies will probably look quite different from what we see today. 

Conclusion 

The insurance industry is at a turning point, driven by the rapid adoption of technology and the increasing complexity of risks like cyber threats. To stay ahead of the curve, insurers need to embrace AI, data-driven decision-making processes, and advanced risk models. 

Continue Reading

Business

The EPC’s Verification of Payee rulebook: Five things banks need to consider

Source: Finance Derivative

Pratiksha Pathak, Head of Payments Services at RedCompass Labs, shares her insights on the Verification of Payee’s (VoP) impact and what it means for European payment service provers (PSPs).

Fraud is an ever-present threat in the payments landscape, and with the rise of instant payments, the risk has never been greater. While these rapid transactions offer unmatched convenience, they also pave the way for instant fraud, leaving financial institutions with minimal time to intercept suspicious activity.

In October, the European Payments Council (EPC) published the long-awaited Verification of Payee rulebook, which marked a major milestone in the SEPA Instant Payment Regulations (IPR) and a key effort to combat payments fraud.

In 2022 alone, fraudulent credit transfers, direct debits, card payments, cash withdrawals, and e-money transactions across the EEA reached a staggering €4.3 billion, with an additional €2.0 billion lost in just the first half of 2023.

The VoP rulebook aims to standardise how banks confirm payee account details, protecting consumers from fraudulent transactions.  However, while the intentions are solid, the new regulations present several challenges that banks must address swiftly and efficiently.

  • Tight deadlines leave no room for error

The deadlines are tight. Banks must have a VoP solution in place across all payment channels by 5th October 2025, which is just four days before the IPR comes into effect. Unfortunately, it doesn’t matter if a bank uses an existing domestic verification service since the rulebook standardises how account information is verified in payments across Europe.

This means that every bank will need to adapt or overhaul its systems to meet pan-European standards. Given the verification process will apply to both SEPA and SEPA Instant payments across all payment channels, it will be a big lift for banks.

The challenges are compounded by the rollout of the EPC Directory Service (EDS), which is the centralised database that underpins the scheme. The EDS won’t be ready for testing until late June 2025. This leaves only three months for banks to complete end-to-end testing and fully deploy their solutions.

Some aspects of VoP, such as APIs and channel infrastructure, can be built in advance, but banks won’t be able to conduct end-to-end testing until after the EDS is ready. For institutions grappling with legacy systems or more complex architectures, the timeline is daunting and leaves little to no room for error.

  • The 5-second rule is a small change with a big impact

Another key change is the extended verification window. Banks now have five seconds, rather than three, to confirm payee account details across all channels.

Whilst this may seem generous, it is still a tight squeeze given the intricacies involved. This means that both the payment engine and all customer-facing channels—whether online, mobile, phone, or paper-based—must be highly available, fast, and scalable. 

Ensuring a smooth customer experience, especially for non-digital transactions, will test banks’ technological limits. While mobile and online platforms might be better equipped, accommodating phone and bulk transactions introduces layers of complexity.

It may be more time than before, but the five-second verification window leaves little margin for error – never mind the one-second timeframe the EPC would prefer. 

  • Bulk payments are a logistical headache

One of the most complex aspects is VoP’s application to bulk-payment files, such as salary payouts. The rulebook demands that each individual payment in a file undergo verification, potentially creating a logistical nightmare.

Imagine a scenario where thousands of payments trigger a mix of ‘match’, ‘close match’, and ‘no match’ results. As a bank, how do you relay this information to your client within 5 seconds? Do you provide the notifications in a file? Through an app? A checklist? 

Handling a flood of verification requests within seconds requires not only a robust infrastructure but also meticulous planning. Banks must devise sophisticated mechanisms to process and deliver results without disrupting the broader payment workflow to prevent operational chaos.

  • Legacy systems will feel the pain

For many banks, the biggest challenge lies in integrating VoP into long-established SEPA payment systems because it requires modifications to processes that are already running smoothly. 

Banks need to ensure that all their payment channels can incorporate VoP functionality without disrupting the current flow. Banks may need to upgrade or completely rework several parts, making the process complicated and costly.

Verifying payees at the beginning of a transaction requires changes to how these systems interact and handle data. Banks will also need to ensure that existing transactions continue without delays and errors, which will prove to be a big challenge for those with multiple existing payment channels.

  • Navigating routing and verification is complex

The new EPC/European Directory Service (EDS) may bring operational challenges. Whilst the EDS serves as a directory, it doesn’t handle the actual routing or verification of VoP requests and responses. Most banks now need to develop their own routing and verification mechanisms (RVMs).

These RVMs will act as connection points for participants and banks must either integrate directly with the EDS or use an RVM to route VoP requests. However, using an RVM doesn’t absolve the responding PSP of its responsibilities under the scheme’s rules.

Banks face a significant challenge in setting up or partnering with an RVM to manage this new process, but finding an RVM supplier will be a good place to start. 

The bottom line

The EPC’s VoP rulebook is a decisive step forward in improving payment security across Europe, but it also introduces significant challenges for banks. 

As banks start to prepare for this overhaul, balancing compliance with operational efficiency will be key to protecting customers whilst maintaining a seamless payment experience.

European banks have their work cut out for them. The demands of implementing VoP are high, and the timeline is short. But with the right expertise and strategic planning, it can be done.

Continue Reading

Business

How eCash and digital wallets will diversify the payments landscape in 2025

Source: Finance Derivative

Written by Fernando Costa-Cabral, SVP Branded Payments, and Ishan Vaid, VP Core Features, at Paysafe.

Throughout 2025, we’ll see two seemingly opposing payment methods – eCash and digital wallets – further reshaping how consumers manage their money. While cash – and future access to it – is still critically important for consumers, digital payments are undergoing a huge transformation.

eCash will continue to bridge the digital divide by ensuring consumers can use physical currency to buy goods and services online. As a result, businesses will leverage it as a democratizing force to promote financial inclusion and serve diverse consumer segments.

Digital wallets also have a major role to play in the evolving payments landscape, with 32% of consumers reporting to have increased their use of wallets in 2024. A notable development is the rise of brand-owned wallets, as businesses outside the financial services sector seek to establish closed-loop ecosystems to control and enhance the customer experience.
 

With a view to the year ahead, here is how eCash and digital wallets will evolve throughout 2025.

Bridging the digital divide with eCash


Even in today’s digital world, cash plays a vital role in consumer finances. Recent research from Paysafe has revealed that 63% of consumers harbor concerns about losing access to cash, while 44% want the option to buy items online and pay in cash at a brick-and-mortar store.

This preference stems from the unique advantages of cash: it provides tangible financial security, enables precise spending control, and helps users avoid the often-hidden costs commonly associated with credit-based payments. Across geographies, cash remains essential for reducing financial anxiety and ensuring reliable transactions.

Despite its enduring importance, cash has largely remained on the sidelines of the recent payment revolution. Traditional cash-based operations continue to be cumbersome and time-consuming – whether it’s depositing physical money into a bank account, coordinating international cash transfers, or attempting to set up installment payments. Furthermore, the retail sector has generally overlooked cash users when developing modern consumer incentives such as cashback programs, buy-now-pay-later (BNPL) schemes, or subscription-based services, creating a noticeable gap in the market.

That is all now changing. This year, eCash will solidify its position as the right solution to bridge this divide between physical currency and our increasingly digital economy – making cash more relevant and accessible in the modern world. In the year ahead, eCash’s progression will materialize through three main developments: enhanced security measures, value-added features, and a significantly improved user experience. With these improvements, eCash can transform traditional cash into a simple and secure payment method with the same core benefits that make cash valuable to many people.

Digital wallets will diversify the payments landscape


In a similar vein to eCash, digital wallets are diversifying the payments landscape, with non-financial brands increasingly venturing into the territory once dominated by incumbent financial service providers. By acquiring their own digital wallet solutions, these brands are reducing their dependence on external financial institutions and enhancing the payment experience.

The trend toward brand-owned wallets has already gained traction in Asian markets, with e-wallets now being offered by ride-hailing apps and e-commerce platforms – and we anticipate a significant uptake in markets like the UK over the coming year. Specifically, retail chains, gaming platforms, and logistics companies are all exploring how digital wallets can streamline their payment processes, strengthen customer loyalty, and deliver greater control over the user experience.

There’s particularly strong momentum building around white-label wallet solutions, which provide businesses with a sophisticated approach to payment integration. These solutions enable brands to incorporate advanced wallet functionalities directly into their existing platforms while maintaining complete control over their user interface and experience. This development aligns with a broader strategic shift we’ve observed across various sectors – from gaming and retail to mobility services – where brands increasingly want a closed-loop ecosystem that they manage.

In 2025, we can anticipate four key evolutionary trends in the digital wallet space. First, we will see even more seamless integration of wallet functionality into non-financial platforms, allowing users to complete transactions without leaving their preferred brand’s ecosystem. Second, there will be significant advances in real-time currency conversion capabilities and multi-currency wallet features, catering to the growing demands of global commerce and international travel. Third, we can expect enhanced instant settlement capabilities, supported by faster payment rails that align with contemporary consumer expectations for immediate transaction processing and gratification. Finally, there will be an increased emphasis on sustainability, with digital wallets incorporating eco-friendly features such as carbon footprint tracking to meet the growing consumer demand for environmentally responsible financial services.

While these two technologies and their respective journeys aren’t necessarily joined at the hip, as 2025 unfolds both eCash and digital wallets will help to create a more accessible and customer-centric financial system. This evolution isn’t about choosing between cash and digital – it’s about seamlessly bridging both worlds, giving consumers and brands greater control over how they pay and get paid.

Continue Reading

Copyright © 2021 Futures Parity.