The Bank of England has recently instructed all UK banks to conduct compliance checks to ensure they’re abiding by best security practices following the $81 million cyber robbery of the Bangladesh Bank.

These checks are designed to ensure that the banks are following the advice of the inter-bank messaging system supplier, Swift, which has been at the forefront of the recent Bangladeshi cyber heist.

User entitlement reviews will be conducted to ensure that only legitimate employees have access to the Swift network as well as Indicators of Compromise checks. All banks have also been instructed to upgrade their key Swift Alliance Software by mid-May.

This incident is not limited to the Bangladesh Bank either. In fact, Vietnamese lender, Tien Phong Bank, recently admitted to having identified and stopped an attempted theft of over $1 million through a third party provider that manages its connection to the Swift network. Coincidently, Swift issued a notice urging banks to review their security controls around the same time.

Bangladeshi employees claim Swift is solely to blame, as technicians left several security holes while connecting the banks real time gross settlement system to the Swift Network. Swift, however, has consistently maintained that the banks themselves are always to blame.

At NNT, we understand the importance of achieving, proving and remaining compliant, no matter what compliance standard you must abide by. We cover several mandates including CESG, PCI DSS, SOX, and much more. 

Our intuitive Closed Loop Intelligent Change Control massively reduces the once overwhelming number of false positives associated with change control, making the spotting of potentially harmful changes vastly easier. This unique featured for assisting changes within the IT estate allows you to classify to change as a healthy intended change or a potentially harmful change. In addition, our integrated threat intelligence allows you to query changes against known and trusted whitelists to provide further reassurance of ongoing cyber security and compliance.

NNT is a certified member of the Center for Internet Security and we provide real-time vulnerability monitoring for all systems. This means our customers are always reassured that the information relating to their compliant state is of the best quality and is available in real time rather than on a planned basis.


Read this article on InfoSecurity Magazine


NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
1175 Peachtree St NE
Atlanta, Georgia, 30361.
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.