radial gradient
mx-logo

< Back to Blog

Hackers Know Your Organization. Do You Know Theirs?

November 5, 2020 | 0 min read

thumbnail

At the Money Experience Summit 2020, Dan Jones, Head of Cybersecurity at MX, dove into the topic of hackers knowing your organization and how you can adapt and stay up to date with security practices.

Jones believes the most effective way to stay secure is by knowing what’s out there. He says, “The approach that we take that I think is the most effective for any organization is to know the threat that's out there and build a security program out there that addresses the threat and the concerns you're seeing.” 

As the cybersecurity space continues to evolve, Jones believes that “there’s an interesting opportunity that exists. I think that there's some value here as it's actually forcing a lot of the security practices to go back to the identity of their employees, the identity of their systems and assets, and really try and make some intelligent decisions. As more SAS products are used by large organizations, they've been forced to think through what we often call zero trust, where you're relying on this walled garden that you build. And once everybody's inside of it, you can trust everybody.”

With so many partnerships, Jones further dives into what financial institutions should be looking for from a security perspective. He says, “As you’re evaluating providers, figure out how they’re adapting. Unfortunately, cybersecurity oftentimes is like an arms race. When we do things better, miscreants change their tactics. Figure out how an organization is doing their cybersecurity practices that leaves them to be nimble and agile and not stuck with it, hoping that their perimeter will always be safe.”

When it comes to strategies used by hackers, Jones explains that “there are five different tiers. At that bottom level, you have the very novice, and maybe they have decided that they want to go and do some nefarious things, but they're not very skilled or organized yet. As we go all the way up the spectrum and get to the top of that pyramid, you have organized, very methodical miscreants, willing to spend years for one single attack. But where we tend to see most of our activity is that middle tier, the third tier of hackers. These people are organized, they're part of a group, and they have a specific mission and objective.”

So how do organizations stay safe? Jones says, “We’re taking a trust-but-verify approach at every authentication measure. For example, if you’re here in Utah and are magically authenticated an hour later in Boston, that velocity is too aggressive. And it's not based on one single attribute. It’s the entire context of the connection. The entire context of the transactions being done on your network is really vital to address a lot of these concerns that are coming up.” Jones believes that “the more we can come together as an industry, the more we'll be able to innovate and build more secure systems out of the gate, instead of having to be reactive.”



Related Blog Posts
thumbnail

Harnessing the Power of AI for Fintech Innovation

March 10, 2023 | 1 min read

Among the disruptions 2023 so far, ChatGPT has made impressive headlines. AI is disruptive because it introduces a new process.
thumbnail

What’s Your Why? Defining Product Development Success

December 13, 2022 | 1 min read

It’s crucial for product teams to define and remember the reason behind building the product in the first place.
thumbnail

How Open Finance Fuels Innovation and the Democratization of Data

May 3, 2022 | 2 min read

Daniel Haisley, Apiture EVP, Innovation, and Lauren Flickinger, Truebill Product Director, share benefits of open financial data at our MX Product Forum.

Sign up to receive the latest news, announcements, and event info from MX.

envelope with airplane