{"id":9265,"date":"2016-04-27T09:20:40","date_gmt":"2016-04-26T23:20:40","guid":{"rendered":"http:\/\/www.macquarietelecom.com\/?p=9265"},"modified":"2023-03-01T16:38:36","modified_gmt":"2023-03-01T05:38:36","slug":"banking-hack-lessons","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/","title":{"rendered":"Bangladesh Banking Hack Graphic Lesson in Cyber Security Weakest Link Risk"},"content":{"rendered":"
Reports hackers have compromised the highly sophisticated international central banking security systems graphically demonstrated a lesson all businesses and governments needed to take to heart \u2013 you are only as secure as your weakest link, Macquarie Telecom said today.<\/p>\n
It has been reported overnight that $US81 million had been stolen by hackers who were able to breach the SWIFT trading systems used by banks to send orders for the transfer of money around the world.<\/p>\n
The hackers reportedly succeeded in breaking into the international network that links thousands of financial institutions by gaining access to the Bangladesh central bank, which had no firewall and a network using second hand $10 switches.<\/p>\n
\u201cThe banks and the banking system have been leaders in building cyber defences, and provide great examples for the rest of the community,\u201d Macquarie Telecom managing director of hosting and government, Aidan Tudehope said.<\/p>\n
\u201cYet this shocking breach shows that even that system is vulnerable if one nodes in the network is not up to standard, either through lack of resources or lack of knowledge and skill,\u201d he said.<\/p>\n
\u201cThe Cyber Security Strategy released by the Prime Minister last week provides a roadmap for Australian businesses and government agencies to lift their own cyber security stance.<\/p>\n
\u201cBut in the interconnected economy, the risk of backdoor entry is ever present, and all the good work done by an individual enterprise can come unstuck through one partner who has got the cyber security message.<\/p>\n
\u201cUnfortunately, that message is sometimes still not being received, and sometimes still not being acted on quickly enough, especially by medium sized businesses and Government entities.<\/p>\n
\u201cThey do not have the resources to keep up with the bad actors in the cyber security arms race alone, so must rely on partners and trusted advisers.<\/p>\n
\u201cIt remains an on-going challenge for some smaller Government agencies to implement security measures the basic Top 4 \u2018hygiene\u2019 measures urged on them by the government\u2019s own experts.<\/p>\n
\u201cIn the private sector, the situation is still more uneven among medium sized businesses.\u201d<\/p>\n
\u201cIt is crucial that the nation\u2019s managers take the time to read the strategy to understand where tey can find this help, so we can bring focus and improvement to the weakest links in the cyber security chain,\u201d Mr Tudehope said<\/p>\n