{"id":5343,"date":"2019-02-07T11:59:41","date_gmt":"2019-02-07T16:59:41","guid":{"rendered":"https:\/\/www.figmarketing.com\/blog\/?p=5343"},"modified":"2024-10-14T13:43:52","modified_gmt":"2024-10-14T18:43:52","slug":"cybersecurity-tips-protecting-client-data","status":"publish","type":"post","link":"https:\/\/www.figmarketing.com\/blog\/cybersecurity-tips-protecting-client-data\/","title":{"rendered":"Cybersecurity: Tips for Protecting Client Data"},"content":{"rendered":"<p><em>Updated October 14, 2024, at 3:01 PM<\/em><\/p>\n<h4>Cybersecurity is more about your risk tolerance.<\/h4>\n<p>Your clients\u2019 personal information is the currency of the digital world. Everything runs on data. Companies like <span style=\"color: #000000;\">Amazon, Facebook, and Google <\/span>thrive because of the data you allow them to collect, both by consent and unknowingly through your interactions. That&#8217;s why it&#8217;s important to follow these cybersecurity tips for protecting client data.<\/p>\n<p><!--more--><\/p>\n<h4><strong>Related: <span style=\"color: #2596be;\"><a style=\"color: #2596be;\" href=\"https:\/\/www.figmarketing.com\/blog\/10-cybersecurity-tips-for-small-business-owners\/\" target=\"_blank\" rel=\"noopener noreferrer\">10 Cybersecurity Tips for Small Business Owners<\/a><\/span><\/strong><\/h4>\n<p>Clients understand that advisors need information to provide them with excellent planning solutions. This information ranges from personal information to medical and financial data.<\/p>\n<p>Clients are right to assume financial professionals will prevent their sensitive information from falling into the wrong hands. If you\u2019re transferring client information to a third party for any reason, the burden is on you to keep it safe.<\/p>\n<p>In fact, if your firm accepts client data over the Internet, you\u2019re responsible for protecting it from the moment the client hits &#8220;send,&#8221; while it\u2019s saved on your network, and until you delete it.<\/p>\n<h2>Protecting Client Data is Smart Business<\/h2>\n<p>People lose trust in companies that don\u2019t protect their personal data, and untrustworthy companies lose business. Also, businesses are required by state and federal laws to provide certain privacy protections; think <span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.usa.gov\/federal-agencies\/consumer-financial-protection-bureau\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>CFPB <\/strong><\/a><\/span>and <span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>HIPAA <\/strong><\/a><\/span>to name a few.<\/p>\n<p>If data is lost through a security breach, companies are subject to penalties and hefty fines. Failing to protect client information could devastate a small business like yours.<\/p>\n<h4><strong>Related: <span style=\"color: #2596be;\"><a style=\"color: #2596be;\" href=\"https:\/\/www.figmarketing.com\/blog\/the-rise-of-insurtech-arming-advisors-with-a-new-edge\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Rise of Insurtech: Arming Advisors With a New Edge<\/a><\/span><\/strong><\/h4>\n<h2>Cybersecurity Tips for Protecting Client Data<\/h2>\n<p>There\u2019s no such thing as too much protection, so the best course of action is to develop a multi-layered approach to your business\u2019 security systems.<\/p>\n<p>This would include a comprehensive system of behavioral, software, and hardware solutions. Using this type of system makes accessing client information more difficult, so hackers quickly move on to an easier target. You can take the following steps to safeguard client data and minimize risk to your firm.<\/p>\n<h4>1. Awareness and Training<\/h4>\n<p>Of course, all of these security measures are only as effective as the employees who use them. All employees <span style=\"color: #000000;\">must be trained <\/span>on security procedures and how to correctly use the technologies to protect client data. Everyone should understand how important it is to protect clients\u2019 personal information.<\/p>\n<h4>2. No Phishing!<\/h4>\n<p><a href=\"http:\/\/www.phishing.org\/what-is-phishing\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><span style=\"color: #754545;\">Phishing\u00a0<\/span><\/strong><\/a>is a fraudulent attempt to obtain\u00a0your sensitive information by disguising as a known or trustworthy entity in any form of electronic communication. Phishing and malicious email attachments are the primary\u00a0<em>cause<\/em>\u00a0of\u00a0<em>data breaches<\/em>. Educate employees on the warning signs of phishing attempts. If you\u2019re not sure, a simple Google search will reveal the most common \u201ctells\u201d.<\/p>\n<h4>3. Update Software to Surf Safely<\/h4>\n<p>Phishing attacks will attempt to exploit software vulnerabilities. Keeping all software, including your web browser, up-to-date is the most effective way to combat phishing. Consider running a browser extension called<span style=\"color: #2596be;\"><strong> <a style=\"color: #2596be;\" href=\"https:\/\/www.websecurity.symantec.com\/security-topics\/https-everywhere\" target=\"_blank\" rel=\"noopener noreferrer\">HTTPS Everywhere<\/a> <\/strong><\/span>that verifies the correct URL and security features for every web page. The \u201cs\u201d in \u201chttps\u201d indicates it\u2019s secure.<\/p>\n<p><strong>Note:<\/strong> A majority of advisors&#8217; web sites I&#8217;ve visited are unsecured. Ask your web hosting service how to fix this!<\/p>\n<h4>4. Install Robust Anti-Virus Software<\/h4>\n<p>Most anti-virus software\u00a0has\u00a0the ability to keep your internet experience, email accounts, and other sensitive information safe. Many anti-virus software can also detect malware, phishing emails and websites.<\/p>\n<h4>5. Password Management is Essential<\/h4>\n<p>With so many online tools and platforms to use for your business, some may decide to use one password for all logins, but that&#8217;s a huge mistake. Also, never use a hardware\u2019s default password like \u201cadmin\u201d. It\u2019s a pain, but best practice is to change your passwords every 90 days. For added security, change your user IDs every year. You may find it easier to use a password manager, like <span style=\"color: #000000;\"><strong>LastPass<\/strong><\/span>, to create randomized and complex passwords that help protect against phishing attacks.<\/p>\n<h4>6. Use Two-Factor Identification<\/h4>\n<p>Even with complex passwords, good hackers can still find ways to attack networks and foil account security. For this reason, most large companies, such as Apple, Google, and your bank, offe<span style=\"color: #000000;\">r\u00a0<strong>two-factor authentication (2FA)<\/strong>.<\/span><\/p>\n<p>2FA works when you sign in with a password and then a code is sent to your phone to verify the login attempt. Turning on 2FA adds an additional layer of security and helps protect your accounts from phishing attacks.<\/p>\n<h4>7. Secure Wireless Networks<\/h4>\n<p>Since Wi-Fi signals extend outside the office walls, your wireless network is vulnerable to attack. Avoid the older <span style=\"color: #2596be;\"><a style=\"color: #2596be;\" href=\"https:\/\/searchsecurity.techtarget.com\/definition\/Wired-Equivalent-Privacy\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Wired Equivalent Privacy (WEP)<\/strong><\/a><\/span> protocol because it\u2019s relatively weak and easily defeated.<\/p>\n<p>Make sure your office wireless network is protected by the <span style=\"color: #2596be;\"><a style=\"color: #2596be;\" href=\"https:\/\/us.norton.com\/internetsecurity-emerging-threats-what-to-do-about-krack-vulnerability.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Wi-Fi Protected Access II (WPA2)<\/strong><\/a><\/span> protocol and a strong complex password. \u00a0For added security, <strong>give your Wi-Fi network an obscure name <\/strong>that doesn\u2019t identify the business. For instance, don&#8217;t call the network &#8220;Smith Financial Services\u201d. Instead, call it something random, such as &#8220;Blue Suede Shoes&#8221;.<\/p>\n<h4>8. Use a Firewall to Restrict Incoming Connections<\/h4>\n<p><span style=\"color: #000000;\">A<strong> firewall<\/strong><\/span> is either a software-based or hardware-based network security tool that is used to protect against a variety of threats. Most routers come out of the box with a software firewall, but a stand-alone appliance offers greater protection.<\/p>\n<p>A <a href=\"https:\/\/www.webopedia.com\/TERM\/U\/Unified_Threat_Management.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><span style=\"color: #754545;\"><span style=\"color: #2596be;\">unified threat management appliance (UTM)<\/span><\/span><\/strong><\/a> will handle intrusion detection and prevention, manage the internet gateway, and provide network anti-virus protection. A UTM for a small business starts at around $300. You&#8217;ll likely need an IT professional to properly install and configure the device.<\/p>\n<h2>Bottom Line<\/h2>\n<p>These cybersecurity tips for protecting client data are vital for you to follow. Advisors have an obligation to adequately protect the client data they collect. And it\u2019s a safe bet that security requirements are going to get more stringent over time.<\/p>\n<p>Doing it right will not only protect the data, it will help protect your business. Providing data security has now become part of the cost of doing business.<\/p>\n<hr \/>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/engage.figmarketing.com\/acton\/fs\/blocks\/showLandingPage\/a\/39120\/p\/p-0140\/t\/page\/fm\/0\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"366\" src=\"https:\/\/www.figmarketing.com\/blog\/wp-content\/uploads\/2023\/10\/FIGBP-Cybersecurity-CTA.png\" alt=\"\" class=\"wp-image-13284\" style=\"width:512px\" srcset=\"https:\/\/www.figmarketing.com\/blog\/wp-content\/uploads\/2023\/10\/FIGBP-Cybersecurity-CTA.png 1024w, https:\/\/www.figmarketing.com\/blog\/wp-content\/uploads\/2023\/10\/FIGBP-Cybersecurity-CTA-300x107.png 300w, https:\/\/www.figmarketing.com\/blog\/wp-content\/uploads\/2023\/10\/FIGBP-Cybersecurity-CTA-768x275.png 768w, https:\/\/www.figmarketing.com\/blog\/wp-content\/uploads\/2023\/10\/FIGBP-Cybersecurity-CTA-585x209.png 585w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/www.figmarketing.com\/#!\/Landing\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" width=\"250\" height=\"100\" src=\"https:\/\/www.figmarketing.com\/blog\/wp-content\/uploads\/2024\/03\/blog-fig-logo-250-100.png\" alt=\"\" class=\"wp-image-13664\"\/><\/a><\/figure><\/div>","protected":false},"excerpt":{"rendered":"<p>Updated October 14, 2024, at 3:01 PM Cybersecurity is more about your risk tolerance. Your clients\u2019 personal information is the currency of the digital world. Everything runs on data. Companies like Amazon,&hellip;<\/p>\n","protected":false},"author":59,"featured_media":13217,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[364],"tags":[374,375,325,47,117],"acf":[],"_links":{"self":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/5343"}],"collection":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/comments?post=5343"}],"version-history":[{"count":20,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/5343\/revisions"}],"predecessor-version":[{"id":14153,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/posts\/5343\/revisions\/14153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/media\/13217"}],"wp:attachment":[{"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/media?parent=5343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/categories?post=5343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.figmarketing.com\/blog\/wp-json\/wp\/v2\/tags?post=5343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}