SlideShare a Scribd company logo
1 of 2
Download to read offline
Cyber Security threats to watch out for in
2023 - Bahaa Abdul Hussein
Manual banking has lost its popularity to online banking. A huge percentage of
people now use internet-based transactions to conduct business. But the downside
is that there is also a large number of cyber-security threats in the banking and
financial sector. These threats are also becoming very complex in nature and have
the capability of affecting the economy to a huge extent.
Financial institutions such as banks store a large number of private data and
personal information on their servers. Therefore, they must develop and apply all
means to protect their system from the most complex cyber security threats. It is
important to be aware of the most recently developed styles of attacks developed by
cyber criminals.
Data breaches have become extremely common and Bahaa Abdul Hussein feels it is
very important to watch out for these cybersecurity threats in 2023:
Ransomware
Businesses attacked by ransomware have increased exponentially since 2018.
Unfortunately, even to this date, there doesn’t seem to be a definite fix to this huge
problem. Ransomware is a cybersecurity threat that locks out users from their
systems and encrypts their files. Hackers then blackmail to release the access.
Risks arising out of remote work
As a result of the Covid-19 pandemic, there is an increase in remote and hybrid work.
There is also more use of cloud-based software platforms. As such employees of
financial institutions are not using their office servers or networks, and there is a
greater possibility of cyber attacks on the data. Thereby, strict surveillance should be
implemented.
Cloud-based security attacks
Cybercriminals are able to easily target data and software systems stored in the
cloud. Businesses in the financial sector must appropriately configure their cloud
infrastructure to protect from security breaches and cloud-based attacks.
Forms of social engineering
The biggest threat that banking and finance can face is social engineering. This kind
of threat makes consumers share confidential information like credentials. Even the
staff members can be tricked into sharing secret information. Phishing campaigns
and generating fake invoices which look authentic are forms of social engineering
attacks.
Targeting supply chain
When targeting a software manufacturer, cybercriminals are spreading malware by
sending dubious code to people in the supply chain, especially to customers. They
access the customer network by compromising the distribution systems.
Final thoughts
To protect yourself from possible cyber security threats in 2023, you must be aware
of the different and new kinds of threats. Plan ahead on protecting your data and
also steps to take if faced with a security breach. Thank you for your interest in
Bahaa Abdul Hussein blogs. For more information, please stay tuned to
www.bahaaabdulhussein.com

More Related Content

Similar to Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdf

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
Krishna N
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014
Truong Minh Yen
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 

Similar to Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdf (20)

7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
Cybersecurity Trends For 2023 | Cyberroot Risk Advisory
Cybersecurity Trends For 2023 | Cyberroot Risk AdvisoryCybersecurity Trends For 2023 | Cyberroot Risk Advisory
Cybersecurity Trends For 2023 | Cyberroot Risk Advisory
 
Best Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docxBest Cyber Security Courses In Bangladesh.docx
Best Cyber Security Courses In Bangladesh.docx
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx8Cyber security courses in Bangladesh.docx
8Cyber security courses in Bangladesh.docx
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Improve Your Cyber Security Techniques in 2023
Improve Your Cyber Security Techniques in 2023Improve Your Cyber Security Techniques in 2023
Improve Your Cyber Security Techniques in 2023
 
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
Top Cybersecurity Threats For 2023 And How To Protect Your Organization With ...
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
The Growth of Cybersecurity and Online Privacy Concerns.pdf
The Growth of Cybersecurity and Online Privacy Concerns.pdfThe Growth of Cybersecurity and Online Privacy Concerns.pdf
The Growth of Cybersecurity and Online Privacy Concerns.pdf
 
Cyber Crime is Wreaking Havoc
Cyber Crime is Wreaking HavocCyber Crime is Wreaking Havoc
Cyber Crime is Wreaking Havoc
 
Security_prediction_2014
Security_prediction_2014Security_prediction_2014
Security_prediction_2014
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 

More from Bahaa Abdul Hussein

More from Bahaa Abdul Hussein (20)

The Role of AI in Neobank Advancement.pdf
The Role of AI in Neobank Advancement.pdfThe Role of AI in Neobank Advancement.pdf
The Role of AI in Neobank Advancement.pdf
 
Neobanks & Sustainable Finance.pdf
Neobanks & Sustainable Finance.pdfNeobanks & Sustainable Finance.pdf
Neobanks & Sustainable Finance.pdf
 
Neobanks & Open Banking Innovation.pdf
Neobanks & Open Banking Innovation.pdfNeobanks & Open Banking Innovation.pdf
Neobanks & Open Banking Innovation.pdf
 
Neobanks and the Legal Landscape.pdf
Neobanks and the Legal Landscape.pdfNeobanks and the Legal Landscape.pdf
Neobanks and the Legal Landscape.pdf
 
Ensuring Safety of Digital Financials.pdf
Ensuring Safety of Digital Financials.pdfEnsuring Safety of Digital Financials.pdf
Ensuring Safety of Digital Financials.pdf
 
Neobanks & Financial Inclusion.pdf
Neobanks & Financial Inclusion.pdfNeobanks & Financial Inclusion.pdf
Neobanks & Financial Inclusion.pdf
 
How You Can Leverage Neobanks.pdf
How You Can Leverage Neobanks.pdfHow You Can Leverage Neobanks.pdf
How You Can Leverage Neobanks.pdf
 
Impact of Climate Change on Insurance.pdf
Impact of Climate Change on Insurance.pdfImpact of Climate Change on Insurance.pdf
Impact of Climate Change on Insurance.pdf
 
Democratization of Insurance with Tech.pdf
Democratization of Insurance with Tech.pdfDemocratization of Insurance with Tech.pdf
Democratization of Insurance with Tech.pdf
 
الحوسبة السرية – مستقبل مكافحة الاحتيال المالي.pdf
الحوسبة السرية – مستقبل مكافحة الاحتيال المالي.pdfالحوسبة السرية – مستقبل مكافحة الاحتيال المالي.pdf
الحوسبة السرية – مستقبل مكافحة الاحتيال المالي.pdf
 
تطور البيانات في قطاع التكنولوجيا المالية.pdf
تطور البيانات في قطاع التكنولوجيا المالية.pdfتطور البيانات في قطاع التكنولوجيا المالية.pdf
تطور البيانات في قطاع التكنولوجيا المالية.pdf
 
ما هي مركزية العملاء ؟.pdf
ما هي مركزية العملاء ؟.pdfما هي مركزية العملاء ؟.pdf
ما هي مركزية العملاء ؟.pdf
 
الاستثمار في تكنولوجيا الامتثال.pdf
الاستثمار في تكنولوجيا الامتثال.pdfالاستثمار في تكنولوجيا الامتثال.pdf
الاستثمار في تكنولوجيا الامتثال.pdf
 
فهم الخدمات المصرفية التقليدية.pdf
فهم الخدمات المصرفية التقليدية.pdfفهم الخدمات المصرفية التقليدية.pdf
فهم الخدمات المصرفية التقليدية.pdf
 
أهمية جودة البيانات.pdf
أهمية جودة البيانات.pdfأهمية جودة البيانات.pdf
أهمية جودة البيانات.pdf
 
قطاع التكنولوجيا المالية في خضم العاصفة التنافسية.pdf
قطاع التكنولوجيا المالية في خضم العاصفة التنافسية.pdfقطاع التكنولوجيا المالية في خضم العاصفة التنافسية.pdf
قطاع التكنولوجيا المالية في خضم العاصفة التنافسية.pdf
 
تطبيق الأمن السيبراني للتمويل الرقمي.pdf
تطبيق الأمن السيبراني للتمويل الرقمي.pdfتطبيق الأمن السيبراني للتمويل الرقمي.pdf
تطبيق الأمن السيبراني للتمويل الرقمي.pdf
 
كيف يمكن للسحابة تعزيز الشمول المالي؟.pdf
كيف يمكن للسحابة تعزيز الشمول المالي؟.pdfكيف يمكن للسحابة تعزيز الشمول المالي؟.pdf
كيف يمكن للسحابة تعزيز الشمول المالي؟.pdf
 
كيف تعمل الثورة الرقمية على تحويل قطاع صناعة الخدمات المصرفية والتأمين BFSI .pdf
كيف تعمل الثورة الرقمية على تحويل قطاع صناعة الخدمات المصرفية والتأمين BFSI .pdfكيف تعمل الثورة الرقمية على تحويل قطاع صناعة الخدمات المصرفية والتأمين BFSI .pdf
كيف تعمل الثورة الرقمية على تحويل قطاع صناعة الخدمات المصرفية والتأمين BFSI .pdf
 
قطاع التكنولوجيا المالية في خضم العاصفة التنافسية.pdf
قطاع التكنولوجيا المالية في خضم العاصفة التنافسية.pdfقطاع التكنولوجيا المالية في خضم العاصفة التنافسية.pdf
قطاع التكنولوجيا المالية في خضم العاصفة التنافسية.pdf
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 

Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdf

  • 1. Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein Manual banking has lost its popularity to online banking. A huge percentage of people now use internet-based transactions to conduct business. But the downside is that there is also a large number of cyber-security threats in the banking and financial sector. These threats are also becoming very complex in nature and have the capability of affecting the economy to a huge extent. Financial institutions such as banks store a large number of private data and personal information on their servers. Therefore, they must develop and apply all means to protect their system from the most complex cyber security threats. It is important to be aware of the most recently developed styles of attacks developed by cyber criminals. Data breaches have become extremely common and Bahaa Abdul Hussein feels it is very important to watch out for these cybersecurity threats in 2023: Ransomware Businesses attacked by ransomware have increased exponentially since 2018. Unfortunately, even to this date, there doesn’t seem to be a definite fix to this huge problem. Ransomware is a cybersecurity threat that locks out users from their systems and encrypts their files. Hackers then blackmail to release the access. Risks arising out of remote work As a result of the Covid-19 pandemic, there is an increase in remote and hybrid work. There is also more use of cloud-based software platforms. As such employees of financial institutions are not using their office servers or networks, and there is a greater possibility of cyber attacks on the data. Thereby, strict surveillance should be implemented. Cloud-based security attacks Cybercriminals are able to easily target data and software systems stored in the cloud. Businesses in the financial sector must appropriately configure their cloud infrastructure to protect from security breaches and cloud-based attacks. Forms of social engineering The biggest threat that banking and finance can face is social engineering. This kind of threat makes consumers share confidential information like credentials. Even the
  • 2. staff members can be tricked into sharing secret information. Phishing campaigns and generating fake invoices which look authentic are forms of social engineering attacks. Targeting supply chain When targeting a software manufacturer, cybercriminals are spreading malware by sending dubious code to people in the supply chain, especially to customers. They access the customer network by compromising the distribution systems. Final thoughts To protect yourself from possible cyber security threats in 2023, you must be aware of the different and new kinds of threats. Plan ahead on protecting your data and also steps to take if faced with a security breach. Thank you for your interest in Bahaa Abdul Hussein blogs. For more information, please stay tuned to www.bahaaabdulhussein.com