ADGM’s Regulatory and Advisory on Cybercrime Prevention
HLB HAMT Management Consultancy (HHMC) Team
In our digital era, our online identities are crucial, represented by a collection of data stored in various databases controlled by companies and government agencies. Therefore, it is vital to understand the different types of cybercrime and to adopt effective prevention measures in our increasingly connected world.
The Role of ADGM and FSRA
In this era, cyber threats are becoming more advanced, reports indicate that around 3.4 billion phishing emails are dispatched each day, totaling over a trillion annually. These emails are crafted to simulate trusted sources, misleading recipients into sharing sensitive information. Therefore, the Financial Services Regulatory Authority (FSRA) of the UAE Global Market (ADGM) advises all authorized persons and recognized bodies to stay alert and exercise extra caution when handling unsolicited communications, particularly those that ask for confidential information, initiate financial transactions, or request login details.
ADGM recently issued notices in response to the ongoing and evolving threat of cybercrime, particularly phishing, which poses a serious risk to financial stability, enables other criminal activities, and diminishes public trust. Here is a small excerpt from the document that educates organizations about the types of cybercrimes they need to be aware of.
Types of Cyber Crimes
- Phishing Attacks
- Malware
- Hacking
- Ransomware
- Cyberstalking
- Data Breaches
- Identity Theft
Social engineering methods, particularly phishing, have emerged as a major cyber threat to organizations, often acting as the initial method for unauthorized access to sensitive information. A typical phishing attack involves sending fake emails or social media messages that request personal data. ADGM notice mainly focuses on the importance of phishing and how to mitigate these issues, it includes:
Prevention method for avoiding Phishing
Establish awareness and training programs.
Organizations need to implement a comprehensive cybersecurity awareness program across the entire organization. Employees can pose a significant cybersecurity threat, as simple mistakes like clicking on a phishing email link can result in major security breaches. To prevent this risk, companies need to conduct regular training sessions that educate staff on how to identify and respond to phishing attempts. Human error often represents the most vulnerable aspect of an organization’s cybersecurity strategy, as attackers frequently use social engineering tactics to manipulate employees into making poor decisions. Therefore, enhancing employee awareness and providing ongoing training are vital steps in defending against phishing attacks.
Recognizing red flags; tips to identify possible phishing scams.
To identify potential phishing scams, start by examining how the email is addressed. If it uses generic terms like “valued partner,” “friend,” or “colleague” instead of a personalized greeting, it could be a red flag. Additionally, look for any misspellings in the sender’s email domain, as this can indicate a fraudulent source. Be wary of messages that create a sense of urgency, especially those demanding immediate action within a tight deadline. Emails that seem to come from high-ranking officials in your organization, particularly those requesting payments to specific bank accounts, should also raise suspicion.
Encourage internal reporting
Employees should report any suspected phishing emails internally and seek assistance. If there is a belief that an attack has occurred, it is crucial to take immediate steps, such as conducting malware scans and changing passwords.
Review your digital footprint
It is important to limit the sharing of sensitive information on your organization’s website and social media platforms. Cyber attackers often take advantage of publicly accessible details about your organization and its employees, which can be found online. Be cautious about the information you post, as it may be used by cybercriminals to create more convincing phishing schemes.
Reinforce Standard Operating Procedures
Employees should be well acquainted with the standard operating procedures for communication and transactions, both within the organization and with external partners. This familiarity includes understanding common communication channels, verifying requests through reliable methods, such as making phone calls for financial transactions, and being aware of typical response times. By promoting this knowledge, employees can better recognize suspicious or unusual requests.
Implement Two Factor Authentication (2FA)
Companies are strongly advised to implement two-factor authentication (2FA) to improve account security. This process requires users to provide an additional verification method, such as a one-time code sent to their mobile device or generated by an authentication app, alongside their password. By adding this extra layer of security, the risk of unauthorized access is significantly diminished, even if login details are compromised.
Adopt the principle of ‘least privilege’ in account configuration
Organizations should set up user accounts based on the principle of least privilege, ensuring that employees receive only the access necessary for their specific roles. By restricting access rights, companies can minimize the potential damage from phishing attacks and enhance their overall security measures.
Back up data
All businesses, no matter what their size, should regularly back up essential data. These backups need to be up-to-date, securely stored away from the main network, and easily accessible for quick renewal in case of data loss or security breaches. It is crucial to incorporate backup procedures into daily operations and to routinely test both backup and recovery processes to ensure they work effectively when needed.
How HLB HAMT Management Consultancy (HHMC) Can Help
At HLB HAMT Management Consultancy (HHMC), our experienced cybersecurity team focuses on a proactive and multi-layered strategy to safeguard organizations’ data and systems. Our team offers various services, including 24/7 support from a Security Operations Center (SOC) for continuous monitoring and real-time threat defense, as well as Security Information and Event Management (SIEM) to analyze security logs for potential threats.
Additionally, we provide fraud investigations, forensic accounting, in-depth data analysis, fraud risk management, and customized training programs to raise awareness. We understand the unique cybersecurity challenges faced by financial institutions in ADGM, and we provide tailored cyber risk assessments that align with FSRA standards, Phishing simulation programs to boost user awareness, and the creation of policy and governance frameworks that adhere to ADGM regulations.
We assist with incident response planning and provide advisory services for regulatory compliance, ensuring your organization meets FSRA’s cybersecurity requirements.
