Vulnerabilities / Threats

10/4/2017
10:07 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Finance Industry Faces Major Security Risks from Outdated Vendor Systems

Analysis finds critical vendors lack same security standards that finance organizations hold for themselves, leaving finance industry at risk.

CAMBRIDGE, MA—September 28, 2017—BitSight, the Standard in Security Ratings, today released a new report titled, “The Buck Stops Where? Assessing The Cybersecurity Performance of the Finance Supply Chain.” The report analyzes the finance industry, a leading industry in managing third-party cyber risk, to assess the security of its supply chain. BitSight data scientists found that in most cases, companies in the finance industry supply chain are not meeting the same security standards that finance companies hold for their own organizations.

“While finance organizations tend to have more sophisticated vendor risk management programs, there is a lot of work to be done to close the performance gap between their own organizations and their immediate business ecosystem,” said Stephen Boyer, co-founder and CTO of BitSight. “The findings of this report are not only relevant for the finance sector, but for companies across all industries who share data with and rely upon external business services. Organizations should scrutinize the security culture and controls of their third and fourth parties. Ensuring that your vendor’s systems are up-to-date and that their employees are not engaging in risky peer-to-peer file sharing is one way to reduce immediate third party cyber risk.”

As part of the study, BitSight researchers evaluated the security posture of more than 5,200 legal, technology (information technology and software providers), and business services (accounting, human resources, management consulting and outsourcing) organizations across the globe, whose security ratings are tracked and monitored by hundreds of finance firms using the BitSight Security Rating platform. These industries represent a set of critical vendors and business partners for any organization and the findings are designed to help security and risk professionals shape the way they monitor vendors in order to identify immediate risks that may impact their organization.

Key Findings

  • A significant security performance gap exists between the Finance firms and companies in their supply chains
  • The mean rating for Finance companies was at least 30 points higher than the mean of companies in their supply chain.
  • Companies in the finance industry supply chain with a combined Desktop Software Grade of “B” or lower were more than twice as likely to have had a machine compromise in the past year. (Desktop Software is graded on the frequency and severity of outdated browsers and operating systems on a company’s network.)
  • Previous BitSight research found that companies with more than 50 percent of their Desktop operating system or Internet browsers out of date were two to three times more likely to experience a publicly disclosed data breach.
  • One in five business services organizations in the finance supply chain had an instance of Windows XP on their network.
  • Windows XP is no longer supported by Microsoft and generally does not have patches against new cyber risks.
  • Nearly one in five technology and business services firms in the finance supply chain ran unsupported Windows IIS or Apache on servers.
  • Certain versions of Windows IIS 6 are vulnerable to exploits including “ExplodingCan”.
  • Peer-to-peer file sharing occurs in less than one percent of finance organizations, but it occurs in over 20 percent of Technology and Business Services firms in the Finance industry supply chain.
  • High torrent activity correlates to a higher rate of system compromise as previous BitSight research found that over 40 percent of torrented applications contained malicious software.

Using evidence of security incidents from networks around the world, the BitSight Security Ratings Platform applies sophisticated algorithms to produce daily security ratings for organizations, ranging from 250 to 900, where higher ratings equate to lower risk. Previous studies from BitSight, independently verified by third parties, show that companies with a Security Rating of 500 or lower are almost five times more likely to experience a publicly disclosed breach than companies with a Security Rating of 700 or higher. Studies also show that organizations with a higher frequency of botnet infections, actual system compromises, experience a higher likelihood of breach.

To download a full copy of the BitSight Insights report, including recommendations based on the findings, visit http://bitsig.ht/2ypzRkJ.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Cybersecurity's 'Broken' Hiring Process
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/11/2017
Ransomware Grabs Headlines but BEC May Be a Bigger Threat
Marc Wilczek, Digital Strategist & CIO Advisor,  10/12/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Search Cybersecuruty and you will get unicorn.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.