Dan’s Ten Scariest Technology Trends in Banks
I’m preempting all of the top ten lists, by coming out early! It’s coming up to that time of year when everybody is counting the major things that happened in the past year. My list this year isn’t going to be the hottest technologies. It won’t recount something that’s happened in the last year. My list is about what’s going on RIGHT NOW.
This year is going to be full of top ten lists . . . it’s also the end of the decade, so next week we should be seeing lots of top 10 lists about the entire decade. I mean, Time Magazine has already declared this the “decade from hell” and they named Ben Bernanke “Person of the Year.”
It’s great that a banker made the person of the year list.
Still, we’ve yet to see lists of the top ten hottest technologies, the top ten information technology persons, the most influential zombie botnet, and the worst ten spammers.
So I’m beating everybody’s list by putting mine out BEFORE CHRISTMAS. I know, that’s not fair. But if I put it out now, I’ll be able to take a few days off next week! Plus we’ve been so busy it’s been a while since we’ve posted anything on our blog.
It’s a list of the ten scariest technology trends in banks:
(in reverse order, like David Letterman of course)
10 Pandemic: (okay, but what if H1N1 does explode, and it wasn’t on my list?)
9 E-Discovery and Electronic Production Requests in Litigation
8 E-mail Archival
7 Disguised Miniature Storage Devices (USB drives in pens, keys, etc.)
6 Spear Phishing
5 Remote Access (and our desire to implement it without regard to risk)
4 Smart Phones (and our desire to implement them without regard to risk)
3 “In-the-Cloud” services and the resulting vendor due diligence concerns.
2 Targeted, more sophisticated, coordinated attacks by organized crime (Zeus)
1 Social Media Usage (by banks and employees)
I realize there is more cool, more gee-whiz, stuff out there. But banks are typically “laggards” in the Diffusion Theory of Innovation, meaning that they are slow to adopt new technologies. That’s a good thing in my book, because we’ve got a lot of work to do in just the top five listed above.
Dan Hadaway CISA, CISM
Leave a comment
Voice assistants can be helpful, but their “always on” functionality can leave you vu Read more
Previously thought to be designed to deliver a DDoS attack, VPNFilter can alter data Read more
Getting a message to the user is one thing, having them see it is another… An article Read more
US Cyber Command joins with the FS-ISAC to share threat intelligence… An article revi Read more