cross-posted from: https://feddit.org/post/4262252

A combination of good high-speed internet coverage, high digital literacy rates, large rural populations and fast-growing fintech industries had put the Nordic neighbours on a fast track to a future without cash.

[…]

But Russia’s invasion of Ukraine in 2022 and a subsequent rise in cross-border hybrid warfare and cyber-attacks blamed on pro-Russia groups have prompted a rethink.

[…]

The Swedish government has since completely overhauled its defence and preparedness strategy, joining Nato, starting a new form of national service and reactivating its psychological defence agency to combat disinformation from Russia and other adversaries. Norway has tightened controls on its previously porous border with Russia.

[…]

[Norway’s] justice and public security ministry said it “recommends everyone keep some cash on hand due to the vulnerabilities of digital payment solutions to cyber-attacks”. It said the government took preparedness seriously “given the increasing global instability with war, digital threats, and climate change. As a result, they’ve ensured that the right to pay with cash is strengthened”.

[…]

  • That’s not entirely true. In order to be allowed to keep processing transactions you have to adhere to strict rules which do get regularly audited. And then there’s the whole “customers will switch to another more reliable party in case of outages or security problems”. And trust me, I’ve seen first-hand that they do.

    • irotsoma@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      18 days ago

      You have to put on a show that you are sticking to those processes, on paper. But the fines for data breaches are generally way less than they save on not having a fully funded IT department and using security products that someone got a kickback for rather than the best product.

      “Hacking” isn’t some magical, intensely creative process for geniuses loke on TV. For the most part, it’s usually just finding the really common things that IT departments don’t do because they are underfunded and treat IT people like replaceable cogs. There is software out there to exploit those deficiencies. So they are forced to do things like use default or obvious admin passwords because who knows who is going to be there tomorrow to fix something and without the proper tools to store credentials, there’s no way to properly secure things.

      And when a security vulnerability is found, there’s a reason why many don’t bother informing the company before going to the media. Those companies pour tons of money into lawyers to avoid admitting the fault, often getting the innocent person who found the problem arrested, and never fix the actual issue. Just ask any pro whitehat security researcher not hired by the company all the things they have to do to protect themselves from being sued or arrested for “hacking” when they notice a problem.

      And government technical auditors are a rarity because the regulators are underfunded. So they might go through some small list of things during regular audits, but they don’t know to check if a DBMS system that contains backups and is stored “in the cloud” is using a default password or other common hacking targets. Hackers don’t go after the primary infrastructure most of the time. It’s not necessary because there are so many sloppy processes or left over insecure projects that “the last guy” was working on or that got defunded before it was completed, but only the primary infrastructure gets audited usually because that’s all there is time and money for.

      As for going somewhere else, there often aren’t other places to go and when there are they usually have the same problem because there’s very little reason for any of them to compete with each other. Most industries have consolidated so much that there are only a handful of parent companies left so it’s easy to collude just because their leaders are often all in the same room at conferences and such.

      • I think you’re being too pessimistic about IT security, particularly in the Financial sector. A lot of the security rules and audits aren’t even government-run, it’s the sector regulating itself. And trust me, they are pretty thorough and quite nitpicky about stuff.

        The cost of failing an audit also often isn’t even a fine, it’s direct exclusion from a payment scheme. Basically, do it right or don’t do it at all. Given that that is a strict requirement for staying in business, most of these companies will have sufficiently invested in IT security.

        Of course it’s not airtight, no system really is. But particularly in the financial sector most companies really do have their IT security in order.

    • uis@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      17 days ago

      And then there’s the whole “customers will switch to another more reliable party in case of outages or security problems”.

      Outages? Yes. Security problems? LMAO!