Dan’s Ten Scariest Technology Trends in Banks
I’m preempting all of the top ten lists, by coming out early! It’s coming up to that time of year when everybody is counting the major things that happened in the past year. My list this year isn’t going to be the hottest technologies. It won’t recount something that’s happened in the last year. My list is about what’s going on RIGHT NOW.
This year is going to be full of top ten lists . . . it’s also the end of the decade, so next week we should be seeing lots of top 10 lists about the entire decade. I mean, Time Magazine has already declared this the “decade from hell” and they named Ben Bernanke “Person of the Year.”
It’s great that a banker made the person of the year list.
Still, we’ve yet to see lists of the top ten hottest technologies, the top ten information technology persons, the most influential zombie botnet, and the worst ten spammers.
So I’m beating everybody’s list by putting mine out BEFORE CHRISTMAS. I know, that’s not fair. But if I put it out now, I’ll be able to take a few days off next week! Plus we’ve been so busy it’s been a while since we’ve posted anything on our blog.
It’s a list of the ten scariest technology trends in banks:
(in reverse order, like David Letterman of course)
10 Pandemic: (okay, but what if H1N1 does explode, and it wasn’t on my list?)
9 E-Discovery and Electronic Production Requests in Litigation
8 E-mail Archival
7 Disguised Miniature Storage Devices (USB drives in pens, keys, etc.)
6 Spear Phishing
5 Remote Access (and our desire to implement it without regard to risk)
4 Smart Phones (and our desire to implement them without regard to risk)
3 “In-the-Cloud” services and the resulting vendor due diligence concerns.
2 Targeted, more sophisticated, coordinated attacks by organized crime (Zeus)
1 Social Media Usage (by banks and employees)
I realize there is more cool, more gee-whiz, stuff out there. But banks are typically “laggards” in the Diffusion Theory of Innovation, meaning that they are slow to adopt new technologies. That’s a good thing in my book, because we’ve got a lot of work to do in just the top five listed above.
Dan Hadaway CISA, CISM
Leave a comment
Attacks on AMD Trusted Platform Modules raise security questions. An article review. Read more
New research reveals issues with these commonly overlooked devices… An article review Read more
Known to be vulnerable since 2005, the algorithm will be phased out over the next sev Read more
Hackers are getting unusually creative in their attacks… An article review. One drawb Read more