Close Close
Popular Financial Topics Discover relevant content from across the suite of ALM legal publications From the Industry More content from ThinkAdvisor and select sponsors Investment Advisor Issue Gallery Read digital editions of Investment Advisor Magazine Tax Facts Get clear, current, and reliable answers to pressing tax questions
Luminaries Awards
ThinkAdvisor

Regulation and Compliance > Cybersecurity

Defending Your Digital Data: Part 1

X
Your article was successfully shared with the contacts you provided.

Cybersecurity is becoming less esoteric for advisors – something that’s avoided or relegated to IT personnel to handle. Increasingly, it has become front-page news.

Regulators recognize the threat and have implemented standards for advisors to follow. In light of the new Department of Labor fiduciary rule, the traditional standards recommended by FINRA and the Securities and Exchange Commission, and the recent surge in cyberattacks, advisors should take inventory of their digital assets to determine where hackers might exploit points of entry or how data may be lost to system errors.

(Related: Clock Ticking on New York Cyber Regs)

Many clients have also picked up on the concern, and have begun asking their advisors questions like: Where is their data being stored? Who has access? How are communications being secured? What happens to their data if their relationship ends?

At the same time, many advisors are not yet 100% confident in their ability to meet the challenge. Only four in 10 say they fully understand the issues and risks surrounding cybersecurity, and only 29% feel fully prepared to mitigate those risks, according to a 2016 Cybersecurity Assessment by the Financial Planning Association. The same study revealed just 26% of respondents “completely agree” that they’re aware of all the Office of Compliance Inspections and Examinations (OCIE) requirements.

Before clients and regulators show up asking questions, you may want to review your business’ protections and preparedness for potential data breaches.

How to Evaluate Your Current Cybersecurity Preparedness

During the first few months of 2017, ransomware rose more than 250%, according to a report by the security firm Kaspersky. However, ransomware is just one form of an outside attack. Threats to financial data also include natural disasters and power failures, employees stealing information and other hacker tactics, like phishing.

The first step in measuring your cybersecurity preparedness is to track your metrics. Track your history of cyberattacks or attempts (distributed denial of service, network intrusions and data theft), procedures in place (encryption for all devices and email, Adobe Patch Coverage, Microsoft Patch Coverage and anti-virus coverage) and security awareness among employees.

There is a checklist from FINRA and a Cybersecurity Assessment Tool  from the Federal Financial Institutions Examination Council (FFIEC) available to help advisors organize their data and determine risk levels. You can also take advantage of free web server encryption tests, which probe and analyze communication security.

Of course, the complicated layers of technology connection types, delivery channels, online products and services, and organizational structures within each practice make every advisor’s risk unique. Consider hiring an outside IT advisor with credentials in cybersecurity and financial services to make the most of these assessments. Smaller operations where one person may be responsible for compliance, legal functions and the cybersecurity program are particularly advised to hire extra help.

As you evaluate how you’ll protect client information and your own system operations, be sure to evaluate how your insurance will protect your business. Some firms and independent advisors leave it up to a cyber-coverage rider attached to their traditional errors-and-omissions coverage. These policies may not cover regulatory fines or all claims, therefore you may want to consider a standalone policy.

Preparing for Potential Cyber-Threats

Once you’ve understood your digital strengths and weaknesses, it’s time to document detailed policies and procedures for all areas of your business.

Consider these six key cybersecurity areas, which are also the focus of OCIE examinations:

  1. Governance and risk assessments. These appraisals should be conducted no less than once a year. Conduct network and server vulnerability scans, maintain the latest antivirus protections in all devices and be proactive in managing patches. Software patching means updating systems and applications such as browsers, plugins, desktop apps, etc. If a system is unable to be updated, it’s left vulnerable to hacking exploits. Server message block (SMB) protocols, widely used for file sharing between devices in Windows-based systems, have been attacked when not patched. The recent WannaCry ransomware attack wreaked havoc in more than 200,000 computers in businesses and institutions around the world this way.
  2. Access rights and controls. Encrypting software and hardware, and backing up data is common practice for businesses that handle sensitive information. Password protection and tracking log-in failures are also critical to security. Mandated password updates every 90 days could refresh your access-controlled front. Efficient use of data and tools is important to serving clients. However, limiting employee access to a “need to know” basis could prevent unnecessary human error or data mismanagement in the event of a personnel or system change.
  3. Data loss prevention. The Securities Exchange Act requires firms to preserve electronically stored records. Today, some advisors recently have turned to cloud-based data backup services. There are risks, however, in using a cloud for sharing data internally and externally – your control over the technology may be weakened or complicated. Data loss protection solutions include content scanning and inspection technologies to monitor and sometimes block data movement at three levels: client level (in operation), network level (in transit) and storage level (at rest). You should create policies well-defined for each level, so when data moves in and out of your network, a scan can assess the sensitivity of material and the appropriateness of the data location.
  4. Vendor management. Find out about your vendors’ technical safeguards, such as limits on data access, virus protection, idle browser session timeouts, strong password requirements and encryption of data at rest or in transit. They should have regularly updated software and firewalls, as well as accredited audits. Ask about their physical and administrative safety; for example, data backups and shredding and disposal procedures. You’ll want to complete this due diligence with each vendor on a regular basis, requesting verifying information for your records.
  5. Incident response. Here’s where that insurance policy comes into effect. Documenting a business continuity plan, as required by FINRA, and internal or external distributions of sensitive information will help in making claims. Incident response was rated lowest in how challenging it was to implement in a cybersecurity plan, according to a 2016 FPA cybersecurity survey. Still, fewer than half of respondents indicated they had formally documented policies.
  6. Cybersecurity awareness training. About two-thirds of advisors spend just two hours or less annually on cybersecurity training, according to a 2016 Financial Planning Association assessment. You can always ask IT staff or vendors to see what can be done to bolster technical safeguards, but don’t leave it there. It’s imperative to educate yourself, employees and clients about potential threats.

— Read 6 Cyber-Threats for Financial Firms in 2017: Cisco on ThinkAdvisor. 


NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.