Topics In Demand
Notification
New

No notification found.

5 Tips for Protecting Your FinTech Data Assets
5 Tips for Protecting Your FinTech Data Assets

36

0

The latest disruptive fintech innovation, cryptocurrency, is gaining popularity with consumers, businesses and governmental bodies. Large corporations and governments are particularly interested in the underlying technology of cryptocurrency called blockchain. In fact, many organizations have launched initiatives to test the feasibility of using blockchain to facilitate accurate, fast and secure transactions.

The Latest Disruptive Technology in Fintech

While the future of cryptocurrency is ambiguous, past performance indicates that the high-tech financial instrument has a bright future. For instance, the value of one Bitcoin rose from $280 in 2015 to $1,000 in two short years, and by the end of 2017, the value surged to a phenomenal $17,000 per Bitcoin coin.

However, the currency also is attracting the attention of cybercriminals, who see a burgeoning market with widespread security flaws. The following excerpts provide 5 helpful tips to help cryptocurrency owners protect their fintech and data assets.

Tip 1: Don’t Provide Your Private Information in Public Forums

Phone porting is a technique commonly executed by cyberthieves. For this kind of attack, hackers lurk on social media platforms where cryptocurrency investors might leave sensitive information, such as phone numbers and email addresses, to connect with other investors. After acquiring a target, the hacker calls the unwitting investor’s phone service provider, poses as a victim and has the number ported to a mobile device in their possession. Now the hacker can enter the victim’s cryptocurrency exchange account, reset the password and abscond with funds as desired. Using this method, hackers can steal thousands of dollars in minutes.

Tip 2: Make It Harder for Hackers to Hijack Your Account

Coinbase cryptocurrency VP of Operations Dan Romero recommends disabling SMS account recovery as an additional defense against phone porting attacks. He also recommends using a coin vault and enabling two-factor authentication for sending funds off of the exchange. When it comes to discussing cryptocurrencies in public, Romero recommends against it, especially online where anyone can target an investor for theft. It’s also a good idea to implement all available security options with your cell phone service provider, such as adding an account passcode and requesting a “do not port” order for your phone. Finally, warns the operations VP, while cryptocurrency exchanges take security seriously, they are not banks and should not be treated as such.

Tip 3: Don’t Put All of Your Crypto Eggs in One Basket

For optimal protection of your fintech assets, Internet security specialist Sanjay Beri recommends diversifying digital financial holdings among several exchanges to limit investor exposure in the event of a cyberattack. Also, suggests the security expert, investors should keep their cryptocurrency stored offline in what’s called a cold wallet. This limits the access that hackers have to investors’ currency. For daily transactions, Beri recommends a separate hot wallet. In essence, remarks the security expert, a hot wallet is like a checking account, and a cold wallet is like a savings account.

Tip 4: Exchange Your Currency With Caution

Chief Technology Officer and founder of 0x (zero-x), Amir Bandeali, recommends that cryptocurrency investors use centralized exchanges only if they make frequent transactions, and when trading tokens on platforms such as Ethereum, he suggests sticking with decentralized exchanges. The primary difference between the two, he explains, is that decentralized exchanges don’t hold users’ cryptocurrency. Unless a hacker somehow manages to acquire to a user’s private key, there’s no way for them to gain access investors’ funds.

Tip 5: Don’t Forget the Basics

While making use of the most basic security measures seems like a no-brainer, many investors fall prey to hackers because they neglected to follow basic security measures. For instance, cryptocurrency investors should set up a separate account for each exchange. This way, if a hacker does gain access to the account, they won’t be able to poke around and access other sensitive assets. Also, investors should use strong passwords for their accounts, and keep them stored securely as a hardcopy, and only the account holder should have access to the hardcopy password list.

The most aggressive hackers will search relentlessly for cryptocurrency exploits. To ensure the safety of this new and powerful financial instrument, the cryptocurrency market needs highly qualified specialists who can help investors prevent unauthorized access to their accounts. As the popularity of cryptocurrency rises, so will the need for cyber security experts who can thwart the attacks of persistent cyber thieves.

Sources:

University of North Dakota – Master of Science in Cyber Security

Northeastern University – Guide to the Rise of Cryptocurrency, Digital Currency and Bitcoin

The New York Times – The Evolution of Financial Tech

Original Author: Ryan Ayers


That the contents of third-party articles/blogs published here on the website, and the interpretation of all information in the article/blogs such as data, maps, numbers, opinions etc. displayed in the article/blogs and views or the opinions expressed within the content are solely of the author's; and do not reflect the opinions and beliefs of NASSCOM or its affiliates in any manner. NASSCOM does not take any liability w.r.t. content in any manner and will not be liable in any manner whatsoever for any kind of liability arising out of any act, error or omission. The contents of third-party article/blogs published, are provided solely as convenience; and the presence of these articles/blogs should not, under any circumstances, be considered as an endorsement of the contents by NASSCOM in any manner; and if you chose to access these articles/blogs , you do so at your own risk.


images
Nishant Kumar
Technology Enthusiast

© Copyright nasscom. All Rights Reserved.