sb-as logo
Story image

MAS cybersecurity chief positions trust as critical to success of e-payments

21 May 2018

The Monetary Authority of Singapore’s chief cybersecurity officer says the nation must put significant effort into making e-payments trustworthy.

At the Visa Security Summit last week, Tan Yeow Seng spoke about how modern technology has shaped many aspects of Singapore’s evolution, including how it stores and moves money.

The speech notes how centralised cheque clearing was first introduced in the 1900s. Now, storefronts are in the palms of consumers’ hands when they need them – all made possible through e-payments.

The number of card payments in Singapore from debit and credit cards has increased 35% between 2015 and 2017.  The volume of card-not-present payments – for example, using payment cards for online purchases - has nearly doubled during this period.

Because trust is essential to the success of e-payments, Tan Yeow Seng says it is important to maintain trust and resilience in e-payments.

Tan Yeow Seng believes Singapore is an ageing society, and many seniors prefer to use cash rather than e-payments. Safeguarding e-payments is significantly more difficult.

“These fears are even more pronounced for mobile payments; mobile phones can be hacked, passwords phished, and accounts drained.  These concerns are not unjustified, and points towards a lack of trust in e-payments."

The Monetary Authority of Singapore (MAS) has already opened public consultation about how to protect users of e-payments, and is the process of addressing feedback.

Those guidelines aren’t the only way the e-payments system must be made safe.

“It is important to stress that trust is not simply making financial institutions liable for every loss suffered by a reckless user.  It is about being a responsible participant in the payment ecosystem and that includes consumers, financial institutions, and fintech firms,” Tan Yeow Seng says.

“It is unrealistic to expect every e-payments user to be a cybersecurity expert, or to keep up to date with the latest reports on malware or zero-day attacks.”

However, users should also take responsibility for maintaining their own safety by keeping their mobile operating systems up-to-date, keeping passwords safe; and informing their financial institutions if their card is lost, or if there is a suspicious transaction. Organisations can also educate consumers on the benefits of e-payments and e-wallets compared to cash.

“Communicate clearly the circumstances under which you will protect your customer, and the circumstances under which your customer will be considered to have been reckless. Give all your customers the peace of mind that they are able to leave home without carrying a stash of cash, and that if they were to lose their payment cards or mobile phones, they can simply revoke these payment instruments by calling their financial institution.”

MAS says it plans to help Singapore’s financial sector through its Cyber Security Advisory Panel, which advises MAS on strategies to enhance the financial sector’s cyber resilience.

MAS is also continuing to collaborate and share cyber threat information; working with stakeholders in the financial ecosystem to build solidarity; requiring strong cyber hygiene in financial institutions; and refreshing the MAS Technology Risk Management Guidelines.

Story image
ABB and Nozomi Networks extend collaboration, deliver improved OT security solutions
"With Nozomi Networks solutions added to our cybersecurity portfolio, our customers gain proven network monitoring and threat detection technology."More
Story image
AvePoint brings Salesforce Cloud Backup to channel partners
The product adds to the AvePoint suite of trusted Cloud Backup for Microsoft 365 and Dynamics 365 to provide managed service providers with backup and restore capabilities across multiple, popular SaaS providers.More
Story image
Infrastructure-as-code, and how it can secure the cloud
Bridgecrew recognised IaC early on as one of the best ways for modern teams to delegate security ownership to individual contributors while distributing it across existing frameworks within CI/CD pipelines. This attribute meant that IaC was invaluable in securing cloud-native environments.More
Story image
Hybrid IAM solutions are the way of the future, study states
“As this first-of-its-kind research shows, while IT leaders are faced with unique criteria and conditions that shape their IT strategy, hybrid IAM has emerged as a necessity."More
Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More
Story image
ESET reveals APT groups exploiting Microsoft Exchange vulnerabilities
A number of advanced persistent threat (APT) groups are exploiting the latest Microsoft Exchange vulnerabilities, according to new ESET research.More