Cybersecurity under Strain in a Post-Covid World

Why Cybersecurity Has Become a Major Concern


In recent months it has become quite clear that the work-from-home model, in the wake of Covid, is here to stay. Most organizations have moved to this model, either totally or partially.

Never before have banks, broker-dealers, RIAs, insurance companies and hedge funds allowed such large numbers of employees to work off-site. This sudden shift has produced not only an environment ripe for fraud and nefarious behavior, but it has increased the likelihood of cybersecurity or compliance risks.

As a result, many firms are now scrambling to enhance their policies and procedures for dealing with these challenges. To play catch up, they should focus on the three most common weaknesses — device security, software vulnerabilities and data privacy.



Common Weaknesses in a Firm’s Cybersecurity

 Device Security

During the pandemic, firms have largely adopted a bring-your-own-device (BYOD) policy for workers. This approach undoubtedly saves money and solves many of the logistical hassles associated with getting company-purchased laptops and smartphones to everyone who needs them. But it becomes a problem when those devices are used to connect to corporate servers without being encrypted, backed up or armed with malware detection. One misstep by a single user and it’s possible to give bad actors an access point to company assets.

Company-owned laptops and devices acquired specifically for in-office usage may also lack sufficient remote work controls. These include the ability for company administrators to wipe devices instantly and remotely, block them from accessing servers, and track both the locations of all remote devices and the times when users access servers. All these features are deemed necessary for fear a worker decides to go rogue or a device goes missing.


Software vulnerabilities

The main software-related cybersecurity risks stem from storing work files on unprotected drives, connecting to corporate servers from unsecured home Wi-Fi networks, or using unapproved collaboration and messaging applications. The best way to prevent these problems is to develop explicit usage policies that address which devices and applications are approved and which are not. As an extra step, install software that automatically limits access. This way, users cannot violate cybersecurity protocols, either intentionally or unintentionally.

A remote work environment calls for cybersecurity platforms that test system vulnerabilities, detect server intrusions, remediate and update software, generate audit logs and enable administrators to implement hierarchical access rights. Operating without these tools all but invites trouble. In their absence, client data may fall into the wrong hands without financial firms learning about a breach until after it’s too late. This is precisely why regulators such as the Financial Industry Regulatory Authority Inc. and the Securities and Exchange Commission are scrutinizing firms’ cybersecurity posture.


Data Privacy

The typical confidentiality-related cybersecurity risks come from workers sharing devices with their children or spouses, exposing sensitive or confidential information to guests in their homes, responding to email scams or posting confidential data on the web or social channels. Good cybersecurity platforms conduct awareness training sessions for workers about these issues. The best ones automatically create playbooks in response to violations. 

Of course, some worker violations will go undetected. For example, there may be no way to know for sure if someone is reviewing personal information about clients while a guest walks over and looks at the screen. That’s why detailed, clear and, importantly, enforced policies and procedures are essential. This is the key to establishing cybersecurity best practices that become intertwined with a firm’s culture.



A Cybersecurity Plan

To avoid these common weaknesses companies should think of developing a cybersecurity plan. Cybercriminals are becoming bolder and more sophisticated in their efforts to hack into networks in search of personal information and ultimately, large sums of money. At the same time, technology has developed in a way that can enhance the capabilities of these bad actors. That’s why now more than ever, it’s important to have a comprehensive cybersecurity plan for your firm. There are certain tips for developing such a plan.

More and more companies specializing in different fields, including advisory firms, are making major investments in technology related to cybersecurity nowadays.

One of the primary focuses is to consolidate client data into a single internal system. When this data is already under the company’s ownership, the management focuses on extending all of those ones and zeros into a data warehouse, creating direct feeds of information from different sources. A data warehouse creates an automated means of receiving data, rather than having it manually entered into a system.





None of these processes would be successful without proper planning, putting a multilayered cybersecurity plan in place to ensure all of this confidential data is protected. Companies need to put the following safety measures in place in order to give their clients peace of mind:

  • Encryption: Whether data is being transferred or is at rest, make sure it’s being encrypted, or coded, to prevent unauthorized access. In addition, make sure the portals between your firm’s systems and the systems of your outside partners are encrypted, as well.
  • Multifactor authentication: This measure can become the biggest line of defense when it comes to combating cyberattacks. Any system that has personal information cannot be accessed without the MFA, single sign-on approach. In essence, this removes virtually any ability for those outside of our network to access any of our portals.
  • Employee awareness training: Companies require their employees to undergo periodic digital awareness training to make sure they learn the best cybersecurity practices for protecting their data. The most common way for a cybercriminal to access a digital system is through a phishing attempt, or sending an email claiming to be from a reputable company in an effort to get an employee to click a link and submit personal information. The company’s goal should be to keep its team fully up to speed on the latest tactics and tricks cybercriminals are using, so they test the system and users with authentic-looking emails and false phishing attempts. They train users to check for identifiers, such as the full email address at the top of a message, to be sure the note they’re receiving is legitimate.
  • Network monitoring: Similar to the way companies monitor their staff’s interactions with fake phishing emails, their technology teams constantly track all of their systems, including physical computers and virtual desktops. Team members are also able to follow the movement of employees’ files, keeping a log to monitor activity. If they notice a bad practice, like saving an email attachment locally to a computer, they ask the employee to remove the file and be sure they know how to save it properly.





Work with the Right Partners

It would be difficult to manage a complex network of technological systems without outside partners. Such partners can be consulting firms, which can advise the company through the development and the action phases of its comprehensive technology plan. Companies also need to cooperate with providers of an IT support system that serves as host cloud for their data. While choosing the right partners, you should make sure that they hold the same high standards for data protection and safety as you do.


Continue Training and Learning

Companies try to do the most they can to stay ahead of the game when it comes to cybersecurity. It’s important for any firm that’s serious about investing and protecting their technology and data to continue training and educating their staff on best practices. Too often, someone can get into a bad habit that could result in their firm being vulnerable to a bad actor. Continued education and training is the best way to promote data safety and security, which are in the best interests of your firm and your clients.

Improve your Cybersecurity

Financial firms that have fallen behind on cybersecurity can struggle with getting started on the road to improvement. Fortunately, solutions exist to help organizations monitor and address their cybersecurity risk posture across multiple threat vectors.

The era of remote work is apparently here to stay. Firms that delay ramping up cybersecurity protections do so at their own risk.


Cybersecurity is a lot to worry about already, so take the stress out of marketing, at least, with Larkspur Executive – Book a Free Demo Today.






Related Posts

Effective Email Marketing Strategies for Financial Advisors
Bridging the Communication Gap: Effective Strategies for Financial Advisors
Overcoming Prospecting Challenges: Leveraging Technology to 10X Your Efforts

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.