Financial services consistently leads all industries in malware attacks, most often from Gozi (Ursnif) or Zeus threats. The costs can be enormous and, in the case of SMB financial firms, possibly disastrous. According to the Ponemon Institute, the cost per lost or stolen record in the financial services industry averaged $245 in 2017, more than a hundred dollars above the average cost for all other industries.
Regulatory compliance also factors heavily into data security. In a complex landscape of international regulatory standards such as SEC 17a-4, European Directive MiFID II and General Data Protection Regulation (GDPR), data security is not just an IT problem; it's a mission-critical competitive differentiation.
Endpoint devices can be exposed gateways into customer financial data and your IT infrastructure. Provide end users hardened devices built to combat cyber attacks with built-in security features and services:
User authentication: Biometric fingerprint or IR (infrared) cameras improve security and enhance the user experience.
Encryption: Enable full-drive encryption at the factory to save IT time when deploying devices. Alternatively, manually enable Microsoft Bitlocker on devices equipped with a Trusted Platform Module (TPM) to encrypt data.
Lenovo Online Data Backup (OLDB): This next-gen data management solution allows enterprises to securely store customer financial information in the cloud with a simple, automatic backup process. It’s quick to set up, requires no additional administrative overhead, offers military-grade security, and is much more affordable and reliable than on-premises solutions. Access multiple, point-in-time versions of data, ensuring you can recover from any form of cyber attack or accidental data loss.
Remote Secure Erase: Using Intel® Active Management Technology, an IT administrator can remotely erase all data on a system even if it is asleep or shut down, or the OS image is corrupt. This feature also integrates with many common IT management consoles.
Containerization: Isolated virtual containers protect against malware gaining access to devices and data. They're typically deployed on smartphones and tablets through mobile device management (MDM) or mobile application management (MAM).
Protection against snooping: Privacy filters fit to new and legacy device screens help prevent others from seeing confidential information.
Port protection: Port security features help protect against physical theft of data via USB and other access ports by disabling or otherwise requiring authentication for their use, while still allowing accessories like mice to work.
Keep your drive: Typically, under the terms of manufacturer device warranties, when a defective part is replaced, the old component becomes the property of the vendor. A "keep your drive" service allows you to keep your drive(s) and dispose of business data on your terms, improving data security and ensuring compliance with data privacy and retention requirements, as well as mitigating civil liability risks associated with data breaches.