Print this article
Top Ten Internet Security Steps For Family Offices - White Paper
Eliane Chavagnon
1 August 2014
The issue of cyber security is one which, for obvious reasons, is very high on the wealth management industry’s agenda. According to the 2013 FOX Family Office Benchmarking: Technology in the Family Office study, security worries - which apply both to data itself and how it is communicated - are now mentioned just as often as the issue of technology integration . In turn, rising risk, complexity and Internet exposure are prompting wealthy families and family offices to pay more attention to their insurance coverage, industry executives have warned. However, a recent white paper by Archway Technology Partners and TrustedFamily said many family offices do not have the necessary IT security measures in place to protect sensitive information – the ramifications of which are clear. The firms highlight that, according to Symantec's Internet Security Threat 2014 report, 552,000,000 identities were exposed to data breaches last year. Below is a summary of ten steps Archway Technology Partners and TrustedAdvisor believe family offices should take to safeguard data and minimize Internet security threats. 1. Hire a trustworthy IT administrator; “Security is not just about technology,” the paper says. “It is about the relationship family offices nurture.” It added: “By encouraging employees to contribute ideas, share knowledge and highlight potential issues, family office management can set the precedent and execute a plan. Developing technical talent in-house and connecting with reliable outside technology partners helps the organization stay up-to-date. Internet crime continues to grow daily, but awareness is family office’s best defensive.”
2. Map out data traffic and identify elements to secure: the paper notes that IT administrators need to understand where data is stored; where data moves to and from; and where data moves across the network.
3. Set up a secure wireless network and limit access: family offices can take different approaches to secure Wi-Fi networks, such as blocking peer-to-peer networking;
4. Encrypt devices: two strategies include disk encryption and file encryption;
5. Secure data in transit with virtual private networks and secure sockets layer : the former requires a separate log-in but encrypt the online session, making it the best way of enabling remote access for employees; an SSL is a protocol for web browsing that secures online communication between two machines or from web browser to server ;
6. Make it easy for employees to participate: the white paper recommends offering company mobile devices, but to emphasized the important of storing data on the network, not the device itself;
7. Establish best practices, spanning, for example, data storage, turning devices off when not in use, and thoroughly managing email, passwords and social media;
8. Plan for accidents or breaches: the paper recommends involving the entire team in preventative discussions, assigning roles, for instance, so that each employee knows what to do in an emergency;
9. Create a clear process for granting and removing access to company information: designate a "gatekeeper" so that someone on the team is accountable for granting and removing access to information, and;
10. Develop an employee handbook.