When a client hires you as their advisor, they are making a remarkable gesture of trust. They are saying that they believe you are capable of navigating the world of risk and return in such a way that their personal wealth and goals will likely be met.
Central to this relationship, of course are your efforts to protect them from the risk of loss. While our industry has a rich history of well-documented practices that mitigate financial loss, the more contemporary risk of cyber fraud is just now beginning to enter the fiduciary’s lexicon and take root in the day-to-day practices of RIA firms.
We hear from RIAs (either explicitly or implicitly) three common misperceptions about cybersecurity that hamper their efforts to mitigate these risks.
#1: Cyber threats against RIA firms are rare.
Cybersecurity risk among advisory firms is very real. Almost 10% of our RIA clients have some kind of attempted cybersecurity breach in the past 12 months.
#2: Cybersecurity is a “big firm” problem.
Large or small–every advisory firm has points of vulnerability. Likewise, the risk of loss from the client’s perspective is equally significant whether they’re working with a large or small advisory firm. To drive this point home. regulators have explicitly stated that small firms will not get a pass on properly addressing this risk.
#3: Cybersecurity is an IT issue.
Cybersecurity requires a multi-pronged approach. Effective cybersecurity goes way beyond information technology. Effective cybersecurity risk management is a cross-functional challenge that must also address operational processes, vendor management, regulatory requirements and human resources.
What can RIA firms do to protect clients from cyber threats?
Institute Sound Policies & Procedures
Sound risk management begins with policies and procedures that are written, communicated and enforced by leadership. RIA firms should have a written set of policies and procedures that include:
Cybersecurity risk inventory
- Assessment of points of vulnerability (both operational and technological)
- Methods to detect suspicious activities
- Procedures to protect the firm’s networks and information
- Written supervisory procedures to reflect the Identity Theft Red Flags Rules
Some common best practices that RIAs should consider include:
- Complex passwords (eg 10 characters using caps, symbols) that are changed every 90 days
- Avoid use of public wifi when accessing confidential client data
- Email encryption
- Use (and update!) anti virus software on ALL devices
Policies and procedures, while critical can often foster a false sense of security if they are not continuously regularly reviewed, tested and improved. Your firm should appoint one individual (chief compliance officer would be an obvious choice) that is held accountable for the continuous assessment and enforcement of the procedures that protect your firm.
The same can also be said of your IT infrastructure as a whole. Viruses and malware evolve swiftly so the security of your systems will quickly wane if it is not continuously challenged.
If you are like most RIAs today, you probably rely heavily on third-party vendors for your IT infrastructure. Yet in doing so, you are not absolving yourself from the responsibility. As a fiduciary, you can only outsource responsibility, not accountability.
To monitor internal systems effectively requires specific knowledge and an ongoing commitment. This can be accomplished by hiring someone internally or engaging one of the IT outsourcing firms that specialize in our industry and understand your firm’s regulatory regime.
Most of the fraud attempts made against our RIA clients originated from their clients. The most common scenario is a client’s email account getting hacked by someone that ultimately seeks to misappropriate advisory assets overseen by the RIA. By reading through email history, the fraudster formulates a plan to contact the RIA to request a fraudulent wire transfer by mimicking the client in a way that makes their request appear legitimate (a practice known as “social engineering”).
RIA firms should address this topic directly with clients, encouraging them to adopt robust password practices in their personal email accounts. Imagine the relationship capital that could be built by helping a client mitigate risk beyond the financial risk in their portfolios!
Every person within the firm has a role in preventing cyber threats. This includes the founder that decides which cloud service to use, the chief compliance officer that implements risk management procedures, or the operations staff that handles client inquiries.
A properly crafted set of policies and procedures always includes a commitment to educate staff on the nature of the risks and what they can do to protect clients from fraud. These messages must come from the highest levels of leadership. If staff does not believe leadership is taking this seriously, they won’t either. A culture of risk management starts at the top.
Regulators and clients (whether they have explicitly said so or not) expect that the guardian of their assets will implement measures to protect client assets from cyber attacks.
Cyber attacks pose a very real risk for your clients. A proactive approach to cybersecurity will go a long way in strengthening client trust, remaining competitive and relevant, and ensuring that your firm is satisfying the expectations of its regulators.
The Economics of Happiness
Top 5 Elements of a Great Daily Game Plan
Why Inside Sales Has Grown Faster Than Outside Sales
The Importance of Branding When It Comes to Marketing to Women
6 Tips to Simplify Your Workflow
Explaining Predictive Analytics
Is Now the Time to Retire?
The Upfront Agreement Tied to Future Communication
How to Transform Tipping Points in Your Favor
Why Regulated Industries are Falling Behind with Social Media
Equities13 hours ago
The Economics of Happiness
Development23 hours ago
The 5 Top Reasons Advisors Should Pick a Niche
Research24 hours ago
What Americans Really Think About Cryptocurrency
Advisor3 days ago
Financial Planning Needs to Be Ongoing Instead of Episodic
Research3 days ago
What the Fed Said to Spook the Markets
Advisor3 days ago
My Three Financial Guilty Pleasures
Advisor4 days ago
Cybersecurity and Privacy: Tips for People with Substantial Wealth
Brand Strategy4 days ago
A Different Way To Think About Leverage