Core defenses every bank needs
The fundamentals of bank cybersecurity are designed to address the most common attack vectors, including credential theft, exploitation of unpatched vulnerabilities, weak perimeter security controls, and unprotected endpoints and identities. These pillars include:
MFA everywhere
Repositories of leaked credentials and credential-stuffing bots have made passwords alone insufficient. Multi-factor authentication (MFA) is the first line of defense in identity protection. Microsoft estimates that MFA prevents 99.9% of phishing-based account takeovers. Banks must enforce MFA across online banking portals, internal tools, and administrative interfaces. Regulators such as the New York Department of Financial Services (NYDFS) require MFA to consist of at least two of three factors: knowledge (e.g., a PIN), possession (e.g., a hardware key or mobile authenticator app), and inherence (e.g., FaceID).
Patch and update discipline
Financial institutions often manage a complex web of legacy infrastructure, including ATM networks and teller systems that run on specialized or outdated operating systems. These systems are prime targets for "jackpotting" attacks, where malware (such as Cobalt) is used to force an ATM to dispense its entire cash reserve at a specific time. Beyond these, teller desktops and internal servers must be kept up to date to close off known vulnerabilities.
The Federal Financial Institutions Examination Council (FFIEC) emphasizes that patch management is a core risk management function. Institutions must maintain an inventory of all hardware and software to ensure that when a vulnerability is announced (such as the recent "Citrix Bleed" or "Log4j" vulnerabilities), they can respond instantly. Patches should be prioritized by risk, mirrored in disaster recovery (DR) environments, and tested in non-production environments.
Strong endpoint security
From teller desktops to admin laptops, every bank endpoint is a bullseye for attackers. Using 'living off the land' tactics, hackers hijack legit tools like PowerShell and WMI to slip past antivirus defenses unnoticed.
Endpoint detection and response (EDR) provides device-level protection, going beyond signature-based detection to monitor behaviors. If unusual activity is detected, such as PowerShell trying to impair antivirus tools, EDR can respond to contain the attack.
Securing identities
With the shift toward cloud-first infrastructure, identity has replaced the traditional network perimeter as the primary initial attack vector. Identity threat detection and response (ITDR) monitors logins, permissions, and behaviors across both cloud and on-premises environments to catch intruders before they can do damage. ITDR can flag anomalous behavior such as "impossible travel" (logging in from two distant locations within a short period) and automatically revoke the user’s session token or force a password reset.
Cloud security
Cloud adoption (like cloud services and SaaS) has also magnified risks around user error, particularly with misconfigurations. According to Gartner, most cloud-related breaches are caused by customer error, for example, leaving cloud storage buckets publicly accessible. Misconfigurations like this expose organizations to compliance violations and massive financial fraud. In banking environments, a single improperly configured storage bucket, exposed API, or overly permissive identity role can leak sensitive customer data and trigger regulatory penalties. Without continuous configuration monitoring and strict identity and access management (IAM) controls, small cloud errors can quickly escalate into large-scale breaches.
Banks must adopt a shared responsibility model. While cloud providers secure the infrastructure, the customer is responsible for the data, applications, and IAM settings within that infrastructure.