Skip to content

Why is cybersecurity compliance challenging for financial institutions?

Have you ever thought about what it would be like to open a bank? 

Arguably, today it’s easier than ever to start a new bank. The popularization of internet banks and online banking means you no longer need ATMs, hard currency, vaults, physical branches, tellers, or security guards.

So why isn’t everybody just doing it?

It’s the regulations.

To run a bank, you’ll need to navigate a multifaceted, regularly shifting environment where regulations, laws, and standards are complex, demanding, and sometimes contradictory. Right off the bat, this requires a non-trivial effort to understand the legal intricacies, nuances, and ramifications of compliance.

Then, you’ll need to spend time and money ensuring the right tools and processes are put in place to ensure compliance with all requirements.

Let’s examine the many cybersecurity compliance hurdles financial institutions face.

Stringent cybersecurity regulations #

Imagine Huxley Credit Union is coming to a web browser near you. Here’s what you must comply with for cybersecurity if you start a local credit union doing business only in the United States:

This cornerstone regulation mandates financial institutions, including credit unions, to implement security measures to protect non-public personal information (NPPI) of members. The Federal Trade Commission (FTC) Safeguards Rule under GLBA sets specific security standards and incident reporting requirements.

This anti-money laundering (AML) and cybercrime prevention law requires credit unions to establish AML programs, conduct customer due diligence, and monitor transactions for suspicious activity. Robust cybersecurity measures are vital for effective AML compliance.

(Not to be confused with CISA, the DHS agency.) This law encourages the sharing of cybersecurity threat information between private sector entities and the federal government. While not a direct compliance requirement, credit unions may participate in information-sharing initiatives to enhance their cybersecurity posture.

The NCUA issues regulations and guidance related to information security and cybersecurity for credit unions. Credit unions must follow NCUA guidelines to ensure the security of member information and avoid regulatory enforcement actions.

Credit unions may be subject to state-specific data breach notification laws, which require prompt disclosure of security incidents involving personal information. Examples include Massachusetts’s 201 CMR 17.00 or New York’s 23 NYCRR 500. Failure to comply with these laws can lead to penalties imposed by state regulators.

Industry standards and frameworks #

There are other frameworks for the industry that apply as well:

If a credit union processes credit or debit card transactions, it must comply with PCI DSS requirements to secure cardholder data and payment systems. Non-compliance can lead to fines imposed by payment card networks.

While not a regulation, the FFIEC CAT provides a framework for self-assessing cybersecurity preparedness. Credit unions using the CAT demonstrate proactive adherence to best practices.

This is a voluntary framework for managing cybersecurity risks. Implementing relevant parts of the framework can improve a credit union’s overall cybersecurity posture.

To recap, all the above are just for cybersecurity. There will be other regulations to consider for the rest of the business — each with their own requirements and standards to meet.

Compliance is ongoing — and regulations change #

Setting up tools and systems to ensure compliance isn’t a one-and-done event either.

Compliance is a continuous process. And to make matters worse, regulations change — with the updated versions imposing new or altered requirements. For example:

  • 2021: Clarifications on multi-factor authentication (MFA) and risk assessments.
  • 2020: Updates on incident response, encryption, and vendor management.

  • 2020: Version 4.0 released with updated requirements for encryption, logging, and vulnerability management.
  • 2019: Updates in version 3.2.1 on incident response and service provider controls.

Ongoing amendments and interpretations focusing on cybercrime prevention and suspicious activity monitoring.

The cost of falling behind #

Failing to keep up with regulatory changes can have substantial material impacts, alongside the reputational damage.

In 2023, OneMain Financial Group paid a $4.25 million fine pursuant to a consent order to settle alleged violations of NYDFS’s Cybersecurity Regulation (23 NYCRR Part 500). These included improperly storing passwords and not sufficiently managing risk from third-party data storage. Even though the regulation became effective in 2017, the consent order cited violation as late as 2021, indicating a significant failure to keep up with regulatory changes.

Regulatory language is open to interpretation #

Different interpretations of the language used in regulations can lead to additional costs or unexpected penalties.

Real-life example: Interpreting requirements

In 2003–2004, I led numerous secured email projects to help bring institutions into compliance with a new regulation. In particular, we had to ensure that all email communication between the company and its customer was secured.

All but one of my customers interpreted the regulation to mean they had to authenticate the recipients. It took additional cost and effort to maintain a database of email addresses and passwords, and support the forgotten password and password reset functionalities, but was deemed necessary.

There was one exception among my customers who interpreted the regulation more minimally. This company believed that the payload had to be encrypted in transit, but no more. Hence, we implemented a one-click, passwordless envelope.

I’m not aware of what’s happened since then. If it turned out that they were never in violation due to this interpretation, then many other institutions spent more time, effort, and cost than necessary for compliance.

How to define ‘material’? #

More recently, the Security and Exchange Commission (SEC) released an update stating:

“The new rules will require registrants to disclose on the new Item 1.05 of Form 8-K any cybersecurity incident they determine to be material and to describe the material aspects of the incident’s nature, scope, and timing, as well as its material impact or reasonably likely material impact on the registrant. An Item 1.05 Form 8-K will generally be due four business days after a registrant determines that a cybersecurity incident is material.”

How an institution interprets ‘material’ can materially impact cost and effort (pun intended).

A bank may expose itself to fines or penalties with a stricter interpretation of ‘material’. While with a looser interpretation, it may end up doing unnecessary work.

Unfortunately, regulatory deadlines typically apply to large swathes of institutions simultaneously. So you can’t wait to see how the agency judges your peers and then act accordingly.

Customer expectations shape what’s viable #

Even when — or especially when — financial institutions are expending significant effort on compliance, they mustn’t lose sight of the fact that their primary purpose is to service customers.

Borrowers and depositors come from all walks of life, with varying levels of tech-savviness and tolerance for hurdles to accessing and moving their money.

Compliance could be easier if banks could put more onus on customers. But if a bank required a retinal scan for each online banking login, customers would offboard in droves.

Following regulations would be less complicated if banks could spend a longer period undertaking certain processes. But if a bank took three weeks to vet a digital transfer, they would lose out to their speedier competitors.

Even the data doesn’t make it easy to comply #

Complying with these various regulations and requirements would be challenging enough if each bank had just a single database. But that is not remotely the case.

Financial institutions deal with millions, even billions of records, typically spread across several databases and systems: countless customers, accounts, transactions, financial instruments, and internal operations.

Transaction data, in particular, stands out as a data type with extremely high velocity. This makes it difficult to conduct any sort of real-time monitoring that regulations may require. Monitoring is made even harder given that the data is often unstructured (e.g. email messages) or binary (e.g. uploaded screenshots or Microsoft Word documents).

Compounding the problem, financial data often comes from legacy systems. Compliance when working with legacy data from legacy systems becomes drastically more difficult.

Real-life example: Making sense of Kafkaesque legacy data and systems

Several years ago, I was building a secured messaging system for a bank. They had three different types of global unique identifiers (GUIDs). (Yes, I realize that those aren’t truly GUIDs, but that’s what they called them.)

Even further back in time, the three different types of GUIDs had been pulled into a single denormalized table. A customer could have one, two, or three of these GUIDs, in any combination!

My code had to painstakingly examine other fields to see which GUID to use for which purpose, and to extract data from other systems. To make things more Kafkaesque, the GUIDs were called TBP, CIF, and UWN, and no one could tell me what the acronyms stood for.

Exchanging data with (many) third parties #

Let’s not forget that it’s not just the data stored in-house that needs managing in a compliant way. Banks are also responsible for ensuring data security and compliance when data is shared with or handled by third parties.

Here is a non-exhaustive list of third parties that banks typically interoperate with:


ACH Network, Zelle, Fedwire, Real Time Payments (RTP), Visa Direct, Mastercard Send, SWIFT, SEPA, CHIPS, TARGET2, Visa, Mastercard, American Express, Discover


The Clearing House Payments Company (CHIPS), Depository Trust & Clearing Corporation (DTCC), National Clearing House (NCH)


Fiserv Cardholder Verification Value (CVP), Early Warning Services (EWS), Riskified, Accertify


Moody’s Analytics, S&P Global Market Intelligence, LexisNexis, Dun & Bradstreet


Experian, Thomson Reuters, Finastra, Regulatory Reporting Services (RRS)


Bolero International, Marco Polo Trade Finance Network, Traxys


Microsoft Azure, Amazon Web Services (AWS), Google Cloud Platform (GCP), Core banking platforms (e.g., FIS, Jack Henry)


Coinbase, Gemini, Circle

Ensuring cybersecurity compliance #

From keeping up with changing regulatory requirements to meeting customer expectations, and from deciphering ambiguous meanings to unpacking legacy data, cybersecurity compliance is a complex challenge for financial institutions.

They face a huge array of complicated and continually evolving regulations, laws, and standards on cybersecurity. Ensuring compliance with these requires a comprehensive and robust security program, including tools and processes to generate periodic reports or disclosures, processes to remediate any violations, and the staff to make it all happen.

And while all of this costs time and money, the costs of non-compliance — either through fines or cybercrime — are considerably heftier.

All of this is why you won’t, after all, see Huxley Bank in a web browser near you any time soon.

Try runZero for free

Find out what’s connected to your network in less than 20 minutes.

Start trial

Join our team

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Scale Computing Announces VMware Rip & Replace Promotion in Wake of Broadcom Acquisition

Easy Migration for VMware Customers Made Easier with 25% Software and Services Discount

INDIANAPOLIS – January 30, 2024 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced its VMware Rip & Replace Promotion for partners transitioning their business from VMware. Scale Computing partners bringing customers looking to migrate from VMware to Scale Computing Platform (SC//Platform) will receive a 25% discount on Scale Computing software and services, as well as free migration tool access and complimentary Scale Computing Advanced Training Certification, and a free registration pass to the Scale Computing customer and partner event, Platform 2024.

With the Broadcom acquisition of VMware complete, early this month Broadcom made the significant move of terminating the VMware Partner Program. Beginning February 5, Broadcom plans to move select VMware partners to its new invitation-only channel program and take approximately 2000 of VMware’s top customers direct. These changes have led to palpable frustration among partners as well as customers, many of whom face a painful transition from working with partners who will lose their status in Broadcom’s new channel program. Broadcom also announced the move to software licenses, meaning customers will soon see all VMware products sold on subscriptions and offered only in product bundles, potentially raising costs and forcing them to acquire software they do not need.

“Scale Computing is and always has been a channel-first company, and we stand ready to offer partners a superior solution and a transformative experience with SC//Platform, our hyperconverged virtualization platform,” stated Jeff Ready, CEO and cofounder of Scale Computing. “Scale Computing’s user-friendly interface eliminates the need for specialized virtualization knowledge. It can be set up in minutes, is self-healing, and features like automated backups, resource allocation, and scaling enable simplified ongoing management — reducing the burden on IT staff and making it ideal for organizations of all sizes to manage a complex virtualization environment. With our exclusive VMware Rip & Replace promotional discount, we’re offering partners and their customers a strategic advantage in navigating the current industry upheaval.”

Scale Computing replaces existing infrastructure and enables enterprises to run applications and process data outside centralized data centers, at the edge of their networks, closest to where data is created and utilized. Combining simplicity and ease of use with an ability to scale, Scale Computing takes a hyperconverged approach that provides a streamlined path to virtualization that is simple, secure, and reliable. Virtualization software and appliances are based on patented technologies designed from the ground up to minimize infrastructure complexity and cost. With SC//Fleet Manager, the industry’s first cloud-hosted monitoring and management tool built for hyperconverged edge computing infrastructure at scale, customers can quickly identify areas of concern using a single pane of glass, scaling from 1 to over 50,000 clusters. Zero-touch provisioning allows administrators to centrally monitor and manage hundreds or thousands of distributed edge infrastructure deployments with few or no on-site IT personnel, and Secure Link provides cloud-like simplicity for administrators.

“Today’s landscape is changing rapidly and businesses are increasingly looking for alternatives that offer enhanced features, cost-effectiveness, and simplicity rather than the time-consuming management, recurring downtime, and pricey licensing agreements they’ve come to find with VMware,” said Scale Computing’s Scott Mann, global channel chief and vice president, sales. “With Scale Computing, customers of all sizes get robust virtualization and hyperconverged infrastructure without breaking the bank. Our predictable and transparent pricing model simplifies budgeting and reduces the risk of unexpected expenses associated with complex licensing structures like those many VMware customers are grappling with. Scale Computing enables customers to reduce Total Cost of Ownership by 40%, reduce downtime by up to 90%, and manage an entire infrastructure from a single pane of glass. Our Rip & Replace promotion makes it easier than ever to make the switch.”

With Scale Computing’s limited-time VMware Rip & Replace promotion, partners bringing customers looking to migrate from VMware to SC//Platform will receive a 25% discount on Scale Computing software and services, free access to Scale Computing’s migration tool, and a free Scale Computing Advanced Training Certification. To learn more about the promotion, click here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Demystifying RDP part 3: Understanding Microsoft RDS and VDI licensing

When the Parallels Secure Workspace team and I talk with partners and customers, we frequently hear the same question about Microsoft RDS and VDI licensing. 

How much does Microsoft RDS and VDI licensing cost?

The technology and architecture basis below RDS and VDI is complex, and the rules of the game are constantly evolving.

There is a vast matrix of possibilities!

When buying RDP-related licenses, you must work with a good advisor and thoroughly examine the Microsoft Product terms.

Before continuing with this blog post, read our blog post on the options and components of RDP. You should also check out part 2 on accessing and visualizing RDP environments.

Ready to start your journey with Parallels Secure Workspace? Download your free trial now.

The basics of RDS licensing

What is a CAL?

CAL stands for Client Access License in the context of Microsoft Remote Desktop Services (RDS) licensing.

A CAL is a software license granting a user or device the right to access and use Microsoft RDS features and services on a Windows Server. Microsoft defines a CAL as a Client Access License or a license that gives a user permission to access the services of the server. You probably depend on the network server software to perform file and print-sharing functions if your workstations are networked. Therefore, a CAL or client access license may be necessary to access this software legally.

When do you need a Microsoft RDS (Remote Desktop Services) CAL?

You need a CAL when you use Remote Desktop Services (RDS). According to Microsoft, each user and device that connects to a Remote Desktop Session host needs a client access license (CAL).

What about an RDP connection to a VDI (without using RDS)?

An RDS CAL is unnecessary for an RDP connection to a VDI (without RDS).

That said, you will need a Windows VDA (Virtual Desktop Access) license if you have an RDP connection to a VDI (not using RDS).

This requirement is covered with Windows E3 and E5 licenses and can also be purchased on top of Windows if you do not have the E3 or E5 versions.

Windows E3 or E5 is the evolution of the former Windows SA (Software Assurance). The former is typically user-based, while the latter is device-based licensing.

As Microsoft mentions, Windows Virtual Desktop Access (VDA) is an authorization strategy that requires each device seeking access to a Windows virtual desktop in a virtual desktop infrastructure (VDI) to be licensed.

VDA is a feature of Windows E3 and E5 subscriptions, meaning that primary users of devices with such a license can access their virtual desktops at no extra charge.

In a special case where you need to access a Windows client (and thus a VDI scenario) by using an RDS platform, you would require both the Windows VDA license (as part of Windows E3 or E5 or a standalone license) as well as an RDS CAL.

The picture below illustrates this on a high level:

Demystifying RDP

RDS and VDI licensing options at a glance.

RDS CAL licensing options

Now that we have the basics covered, let’s go one level deeper into RDS CAL licensing.

The RD license server

This role is mandatory for Microsoft to be set up in your RDS environment. The RD license server can be deployed on the RD Session Host for small deployments.

For larger deployments, a separate virtual machine (VM) is advised. CALs must be uploaded to the license server.

If an appropriate RDS CAL is available from a license server, the client can connect to the RD Session Host server, provided the RDS CAL is also issued to the client. From there, they can connect to the desktop or apps they want to use.

There are typically grace periods during which the license server will accept connections.

What types of RDS CAL exist?

You must choose between a user CAL and a device CAL when using RDS.

In Microsoft RDS, there are two main types of CALs:

Device CAL (Per device ER DEVICE)

Each specific device has a device CAL assigned to it, allowing any user who logs in to that device to access RDS services. It is a device-based licensing model, meaning one Device CAL is required for each device that needs access, regardless of the number of users who use that device.

  • CALs are physically assigned to each device
  • CALs are tracked by the license server
  • CALs can be tracked regardless of AD membership
  • Up to 20% of CALs can be revoked
  • CALs cannot be over-allocated

User CAL (Per user)

User CAL is assigned to a specific user, allowing that user to access RDS services from any device. It is a user-based licensing model, meaning one User CAL is required for each user who needs access, regardless of how many devices they use to connect.

  • CALs are assigned to a user in AD
  • CALs are tracked by the license server
  • CALs cannot be tracked within a workgroup
  • You cannot revoke any CALs
  • CALs can be over-allocated (breach w/ agreement)

Organizations typically choose between User CALs and Device CALs based on their specific needs and the licensing model that aligns with their usage patterns. It’s important to note that CALs are separate from the Windows Server licenses themselves.

In addition to the server license, they are required to ensure compliance with Microsoft’s licensing terms. Failure to have the appropriate CALs can result in licensing violations and potential legal consequences.

Comparison of RDS CALs (for Windows Server 2016)

Demystifying RDP 3

Not upward compatible.

As I explained in our RDP introduction blog, RDS is tied to a Windows Server version; i.e., the RDS versions of Windows Server 2008R2 and 2016 are hardwired into each platform and are pretty different from each other in terms of functionalities and performance. Now comes the tricky part: the CALs you bought for a Windows Server 2012 deployment will not be accepted on a Windows Server 2016 platform if you didn’t purchase the Software Assurance. However, the 2016 RDS CAL is downwards compatible with RDS 2012.

According to Microsoft, any RDS license server can host licenses from all previous versions of Remote Desktop Services plus the current version of Remote Desktop Services.

However, upward compatibility is possible if Software Assurance has been purchased for the RDS CAL licenses. In that case, you can upgrade to the latest available version.

If Software Assurance was not purchased, new RDS CALs must be purchased.

The following table puts the theory into practice (in case of no Software Assurance):

Demystifying RDP 3

Microsoft RDS CAL version compatibility.

Ready to explore what Parallels Secure Workspace can do for you? Get your trial download here, and check out Part 1 and Part 2 of our series explaining RDP.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×