The Bank of America 2024 Data Breach and Third-Party Risk (2024)

On February 13th, Bank of America announced a data breach exposing the personally identifiable information (PII) of 57,028 customers. The data breach targeted and exposed the social security numbers, names and dates of birth of deferred compensation plans managed by third-party provider Infosys McCamish.

These types of data breaches – many of which originate from third parties – cost an average of $4.45 million. They’ve also increased by 15% over the past three years. It also wasn’t the first time Bank of America’s customers have been exposed. The data of 57,028 customer accounts were also exposed in the MOVEit digital supply chain attack in 2023.

Last year we saw frequent reports of high-profile third-party data breaches and supply chain attacks such as Okta and Citrix Netscaler. As a result, CISOs are under increased pressure to strengthen their supply chain risk management. Almost three quarters (73%) of CISOs at large organizations are very concerned about third-party threats. More than half (65%) have increased their budgets related to third-party cyber risk management.

The Third-Party Opportunity in the Bank of America Hack

With 69 million customers in more than 35 countries, Bank of America is an attractive target for cybercriminals. But experienced cybercriminals, such as the high-profile cybergang LockBit, who took responsibility for the attack, don’t target these types of financial institutions directly. They know that banks of this size and reputation have multiple cybersecurity solutions to keep their internal networks, systems and infrastructure safe from the hands of cybercriminals.

Third parties don’t always have these same resources, however. In addition, they may not yet have a culture of cybersecurity in place, with employees educated on the best cybersecurity practices. Or they may be shifting to strengthen their security posture, leaving them vulnerable in the meantime. As a result, cybercriminals often focus their efforts on third parties that share data with leading institutions, looking for vulnerabilities and risks they can exploit to infiltrate their desired target.

The Importance of Supply Chain Management

In the case of the Bank of America data breach, LockBit found Infosys McCamish Systems (IMS), a Indian tech services giant, to serve this purpose. The first sign of the breach was the “unavailability of certain applications and systems in IMS.” LockBit claims that over 2,000 systems were encrypted during the breach.

While data breaches can be part of a ransomware attack, encrypting systems and gathering PII data may also be a move that sets cybercriminals up for future ransomware attacks. LockBit ransomware attacks have already been responsible for an $80 million ransom demand to CDW, the third largest ransomware attack to date. Ransomware attacks are expected to cost victims $265 million by 2031.

Identifying these threats early is the most optimal way to defend against these and other types of cybersecurity attacks. At the same time, it helps to minimize penalties and fees related to compliance and builds customer trust in your brand. One of the most important methods organizations have in place to identify these threats ahead of time is effective digital supply chain management.

How Panorays Helps Manage Third-Party Risk

The vast majority (98%) of organizations rely on third parties for their software and services. Many however, don’t have the technology in place to determine exactly how many third parties they have, or how to protect the data and information they share with those third parties. In addition, evaluating third party risk before onboarding is often a fractured and manual approach that is difficult to scale.

Panorays delivers a third-party cyber risk management (TPCRM) solution that addresses this need, creating a customized, scalable approach for onboarding third parties. It also helps to monitor these risks throughout the third-party lifecycle.

This approach includes:

  • Supply chain discovering and mapping. Map and analyze third parties in the supply chain and define the relationship between your organization’s relationship and the third party. This digital supply chain landscape mapping allows for accurate third-party risk profiling.
  • Risk DNA assessment. Combine internal and external assessments to deliver evolving customized risk-based ratings for comprehensive and accurate Cyber Postures assessment. Internal assessments include dynamic and customized questionnaires according to your risk tolerance and vendor profiling. External assessments include mapping and identifying third party digital assets for vulnerabilities, control failures, human risk, AI dependencies and past breaches.
  • Continuous threat detection. Get early indications of breaches and vulnerabilities, prioritized according to the criticality of your third party. With a contextualized view of your supply chain, you’ll discover critical findings that deliver risk insights and alerts to prioritize threats and prevent them from escalating.
  • Remediation and collaboration. Close security gaps according to the highest level of priority to reduce risk and proactively defend against the next breach or security incident from impacting your business. These steps include both an automated and collaborative approach between your organization and third parties.

Want to learn more about how Panorays can help your organization manage third-party risks? Get a demo today.

FAQs

The Bank of America 2024 Data Breach and Third-Party Risk (2024)
Top Articles
Y.A. Tittle | Pro Football Hall of Fame
Hall of Fame QB Y.A. Tittle dead at 90
Cintas Pay Bill
Cottonwood Vet Ottawa Ks
Repentance (2 Corinthians 7:10) – West Palm Beach church of Christ
T Mobile Rival Crossword Clue
Exam With A Social Studies Section Crossword
Delectable Birthday Dyes
2021 Tesla Model 3 Standard Range Pl electric for sale - Portland, OR - craigslist
Day Octopus | Hawaii Marine Life
Call Follower Osrs
Truck Toppers For Sale Craigslist
Radio Aleluya Dialogo Pastoral
Shannon Dacombe
Kvta Ventura News
Missed Connections Dayton Ohio
10-Day Weather Forecast for Florence, AL - The Weather Channel | weather.com
Canvas Nthurston
Boston Gang Map
Craigslist Red Wing Mn
How To Level Up Roc Rlcraft
Moving Sales Craigslist
Busted Newspaper Fauquier County Va
Lakers Game Summary
Pearson Correlation Coefficient
Boston Dynamics’ new humanoid moves like no robot you’ve ever seen
Wnem Tv5 Obituaries
Craigslist Pennsylvania Poconos
Kimoriiii Fansly
Ewg Eucerin
Kelley Fliehler Wikipedia
Mia Malkova Bio, Net Worth, Age & More - Magzica
Bus Dublin : guide complet, tarifs et infos pratiques en 2024 !
Senior Houses For Sale Near Me
John F Slater Funeral Home Brentwood
2024 Ford Bronco Sport for sale - McDonough, GA - craigslist
Best Restaurants In Blacksburg
Finland’s Satanic Warmaster’s Werwolf Discusses His Projects
Albertville Memorial Funeral Home Obituaries
Express Employment Sign In
Lonely Wife Dating Club בקורות וחוות דעת משתמשים 2021
Locate phone number
Post A Bid Monticello Mn
Amc.santa Anita
Toomics - Die unendliche Welt der Comics online
Avance Primary Care Morrisville
Alba Baptista Bikini, Ethnicity, Marriage, Wedding, Father, Shower, Nazi
Rescare Training Online
Sc Pick 3 Past 30 Days Midday
Mikayla Campinos Alive Or Dead
60 Second Burger Run Unblocked
Rocket Bot Royale Unblocked Games 66
Latest Posts
Article information

Author: Dan Stracke

Last Updated:

Views: 5911

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Dan Stracke

Birthday: 1992-08-25

Address: 2253 Brown Springs, East Alla, OH 38634-0309

Phone: +398735162064

Job: Investor Government Associate

Hobby: Shopping, LARPing, Scrapbooking, Surfing, Slacklining, Dance, Glassblowing

Introduction: My name is Dan Stracke, I am a homely, gleaming, glamorous, inquisitive, homely, gorgeous, light person who loves writing and wants to share my knowledge and understanding with you.