This post was originally posted on Investment News.

 

Every new digital tool a financial adviser adopts increases the firm’s vulnerability to a cybersecurity attack, and many advisers aren’t doing enough to ensure the third-party vendors they work with meet the highest security standards.

About 63% of data breaches begin from a third-party vendor’s vulnerability, according to Bart McDonough, founder and CEO of cybersecurity firm Agio. For example, Redtail Technology’s recent data leak exposed the personal information of potentially thousands of clients, and LPL’s breach in November traced back to a third-party file sharing system.

Yet only 52% of firms have formal security standards for third-party vendors, Mr. McDonough said.

“An adviser may work with dozens of different vendors — all of which have varying degrees of cyber-hygiene and present different degrees of risk, depending on what data they have access to,” Mr. McDonough said.

What exactly should advisers be looking for with technology vendors?

A good first step is making sure every piece of software the firm licenses has a mechanism for alerting relevant parties of any strange behavior, something cybersecurity experts call “indications of compromise.” For instance, an IOC that can shut down a system and alert the adviser if there are too many failed logins to a client portal.

Advisers also should be making security standards and certifications a requirement of any technology they use, said Josh Moats, chief information officer of TIAA-owned adviser fintech firm MyVest.

Adopting the NIST framework and looking for SOC certifications will help build a good foundation of security, but Mr. Moats added some other key areas that advisers should bring up with each vendor.

“I have a core set of security topics that I hold us to, that I ask our partners, and that I expect wealth management buyers to ask us,” Mr. Moats said.

He recommends advisers ensure technology vendors maintain fully separate hosted environments across multiple data centers, employ strong encryption and data masking, and can demonstrate that they regularly test and audit against security best practices.

Advisers should ask about the physical security controls of a tech company’s offices or data centers. Is there 24/7 security and video surveillance? Are there backup power generators? Are data centers complying with standards like Tier IV, SOC 2 or ISO 27001?

“No matter the level of confidence in your data security, always plan for the worst,” Mr. Moats said. “Taking network security to the next level means going beyond standard firewalls.”

Mr. Moats also recommended asking how fintech companies are developing new products and features. Firms should be using a segregated environment for testing where no customer data is at risk of being made public, which has caused problems at firms like Voya and Blackrock.

For Mr. McDonough, this security due diligence of technology vendors is important not just for protecting client data, but also for shielding advisers from liability.

“In work with clients in the financial services sector, we’ve seen vendors try to pass the buck back to the client more times than I can count,” Mr. McDonough said. “Considering the pronounced risk they present, it’s critical that advisers categorize vendors accurately based on their risk profile and, in turn, apply an appropriate level of scrutiny to each merchant.”