Advisers: Be careful out there in cyberspace

The online security landscape is changing in fundamental ways
OCT 17, 2010
The online security landscape is changing in fundamental ways. Many financial advisers are unaware of these changes, and that makes it all that more critical to defend against them. That was the major theme of a presentation last week titled “Information Security: Protect Your Practice Today and Tomorrow.” I thought it was the most eye-opening session I attended at the Financial Planning Association conference in Denver. In the interest of full disclosure, I worked for years with the presenter, Matt Sarrel, who is now the founder and executive director of Sarrel Group, a private network and information security consulting firm. He is certified as an information systems security professional. When I worked with Mr. Sarrel, he was a technical director at PC Magazine Labs, where he helped pioneer a lot of the testing methodology for the first generation of Internet security appliances that came to market. The expanding need for those appliances and the demand for their increased sophistication reflect how scary today's small-business world has become, especially since virtually everyone uses a web browser. Because of that, more threats than ever lurk on the Internet, and advisers need to make sure that they are prepared.

COSTLY BREACHES

Here are a few statistics that Mr. Sarrel mentioned: • According to the Ponemon Institute LLC's “Annual Cost of a Data Breach” study from last year, on average, a breach cost $202 per record compromised or stolen. • Among the 43 data breach incidents studied, the minimum total cost to the organization was $613,000 and the maximum more than $32 million. The average cost of a security breach was $6.6 million, up from $4.5 million in 2005, when 13 breached organizations were studied. “The take-away here is that you need to have a layered approach to your computer and Internet security —one that uses active protection,” Mr. Sarrel said. This means running security software that goes beyond the traditional signature-based antivirus software and include heuristic (self-learning), host-based intrusion protection, which can often be purchased bundled in the form of a suite. Threats aren't limited to computer viruses. “A lot of traditional viruses you knew were viruses — it was often an ego thing [on the part of the hacker] and made obvious, but today's attacks on the other hand are often part of big criminal enterprises. They don't want you to know; they make money off of you not knowing,” Mr. Sarrel said. We all face what are known as blended threats — malicious software that takes advantage of vulnerabilities identified in a computer's operating system or applications, nowadays especially in web browsers. Such software or code is used not only to infect a lone computer but also to enlist that computer as a way to infect others — even millions — in what are referred to as denial of service attacks. According to a 2007 analysis by S21sec (an international digital security company headquartered in Spain) e-mail attachments were the source of infection for just 13% of computer infections, whereas browser exploits accounted for 65%, operating system exploits 11% and downloaded files 9%. With this in mind, here are some practical tips to keep your firm safer. If you use Microsoft's Internet Explorer, make sure to run the latest iteration, Version 8, if at all possible, and keep it updated on all the systems in your office. There are good, popular and free alternatives to Internet Explorer that run on Windows PCs, including Mozilla Corp.'s Firefox and Google's Chrome browser, among others. Since more than 90% of the nation's businesses continue to run on Microsoft Windows, such environments are the biggest target. As annoying as they can be, let your Windows updates run whenever prompted. The same goes for the operating systems on your hardware servers. Although a growing number of advisers are taking advantage of hosted applications in which they no longer have to maintain their own server hardware, many shops still have them, and many go unpatched and aren't updated regularly. Although it would be impractical for most businesses to switch operating systems, it is worth noting that comparatively little malware targets Apple Computer Inc.'s operating systems or Linux. When it comes to employee behavior (including your own), never download plug-ins from unknown sources, and be aware that the addresses of known sources can be faked or spoofed. It is also a good idea to limit your staff's ability to surf the Internet willy-nilly from their work machines. In addition to the software firewalls found in most antivirus security suites, it is a good idea to consider a network firewall.

'MORE USER-FRIENDLY'

These come in the form of both hardware systems and software that can run on a dedicated PC or server. Some of these also provide host-based intrusion prevention systems or HIPS, according Mr. Sarrel, and can be updated to counter new types of threats. “Five years ago when Symantec Endpoint Security came out, you almost needed to be a programmer to set it up and manage it, but things have grown far more user-friendly,” though it can still be a good idea to hire a consultant that specializes in these types of installations, he said. “If you hire a consultant, make sure they document everything; at a bare minimum, have them provide you all your user names and passwords, and at least a basic network diagram,” Mr. Sarrel said. E-mail Davis D. Janowski at djanowski@investmentnews.com Online resources referenced in this story: Fourth Annual US Cost of Data Breach Study Ponemon Institute Other references: S21sec Sarrel Group Top Tech Dog Selected news, reviews, and resources: Reporter's note: In terms of quality, thoroughness, consistency, testing methodology, quality of writing — you name it — the bottom has fallen out of technology product reviews for small businesses. Because of that I cannot, in good faith, simply point you to a site that I think does a good job on all fronts. That said, I've cherry picked a few reviews where I know the reviewer and trust them. I'm all ears for those that want to send along a site they like and trust. The Best Security Suites for 2011 [Advisers, at the very least, you need to have one of Neil's Editors Choice security suites running on all the PCs in your shop; he has been reviewing and testing these products literally for decades and is more familiar with how they work than any unbiased reviewer out there]. Firewall (computing) [Decent overview of firewall technology and evolution] One-Stop Security [Note: This is the last hurrah at PC Mag in terms of covering SMB-focused security appliances in a roundup fashion; no one paid more attention to detail than my long-time colleague Oliver Kaven when it came to testing these devices. Some of the products and companies reviewed no longer exist or have been acquired; given the time I plan to revisit the products and vendors to see who still exists] SMB Security: Eight Tips to Protect Your Business Network Small-Business Security [Note: Written in 2004 while I was with PC Magazine, I include this for the introductory material in the first three pages, which still holds true; some of the products and companies reviewed no longer exist or have been acquired; given the time I plan to revisit the products and vendors to see who still exists] Symantec Endpoint Protection 11 Symantec Announces New Business Security Suites Additional online reading: Computer security coverage of Neil Rubenking at PCMag.com [Long-time reviewer Neil Rubenking's knowledge and coverage of computer security products for the consumer is unmatched, and much of it can be applied to the small business environment.] Survey finds that SMBs often lack basic security Extra Online Protection: Free, Easy, Effective s21sec Security Blog W32.Stuxnet Dossier EU Agency analysis of ‘Stuxnet' malware: a paradigm shift in threats and Critical Information Infrastructure Protection

Latest News

The power of cultivating personal connections
The power of cultivating personal connections

Relationships are key to our business but advisors are often slow to engage in specific activities designed to foster them.

A variety of succession options
A variety of succession options

Whichever path you go down, act now while you're still in control.

'I’ll never recommend bitcoin,' advisor insists
'I’ll never recommend bitcoin,' advisor insists

Pro-bitcoin professionals, however, say the cryptocurrency has ushered in change.

LPL raises target for advisors’ bonuses for first time in a decade
LPL raises target for advisors’ bonuses for first time in a decade

“LPL has evolved significantly over the last decade and still wants to scale up,” says one industry executive.

What do older Americans have to say about long-term care?
What do older Americans have to say about long-term care?

Survey findings from the Nationwide Retirement Institute offers pearls of planning wisdom from 60- to 65-year-olds, as well as insights into concerns.

SPONSORED The future of prospecting: Say goodbye to cold calls and hello to smart connections

Streamline your outreach with Aidentified's AI-driven solutions

SPONSORED A bumpy start to autumn but more positives ahead

This season’s market volatility: Positioning for rate relief, income growth and the AI rebound