Back to Journal

Cybersecurity: Before & After the Breach

N
Written by
NIBA
Published
Reading time
2 min

Security breaches are quite prevalent in the media today. Many security experts feel it’s not a question of if your company will suffer a breach of your information, but when. A panel at the NIBA Annual Members Meeting recently explored this topic.

Preparation for a potential event is key to being able to address it. Information Technology (IT) enterprises of all sizes need to know exactly what data they have, where it is stored, and what the potential threats to the data are. Even small companies need to pay attention to the basics of securing their computing environment. These include:

• Timely patching of operating system and other software

• Using strong passwords for machine access

• Performing backups of critical data

• Protecting sensitive data through full disk or file encryption

• Using a host-based firewall and anti-virus software

• Learning to recognize phishing and other scams

Drafting an Incident Response plan in advance of having to address a breach is key. Companies should understand what mechanisms they will use to identify that a breach has occurred, who will be involved in the investigation and how the incident will be addressed. Developing relationships with external experts whom you may want to call on during an incident before it happens will smooth the path for addressing the breach.

Stay Informed

Subscribe to the NIBA Journal for the latest insights and industry updates

Related Articles

View All
Trading Technology

Utilities Look Beyond Fintech to Create Innovation in the Market

Fintech is more than just a buzzword. Fintech represents the innovation in services and technology that will disrupt business models, business processes and software applications in the coming years, in nearly every financial services business globally. Examples abound in digital strategy and transformation, blockchain and distributed ledgers, and more. But where do industry utilities fit into this exciting new world of innovation? Utilities are another form of innovation that take the operations and technology processing that is replicated over and over again in the industry and consolidate it into a single, standardized operating model. The goal of utilities is to shift the responsibility for maintaining and investing in non-differentiating processes and technology to vendors, so seeing the words “utility” and...

Trading Technology

Why Hackers Hack Websites: Securing Your Website for Compliance and to Protect Your Business

With the upcoming cybersecurity requirements by the NFA and nearly every regulatory body overseeing financial service industry participants, it’s important to not only comply with cybersecurity regulations but to use this as an opportunity protect your business’ website. Many businesses believe their website isn’t important enough to require website security for the following reasons: My company is too small My website doesn’t store sensitive client information My website is not that important to their business Hackers don’t discriminate by business size, may or may not target your client information directly, and will damage your brand reputation. Here are reasons why hackers hack websites: 1. Vandalism and activism By switching out your home page with messages supporting questionable organizations such as...

Trading Technology

Cyber Security

While attending the recent NIBA conference, we learned about new rules affecting our industry. Brokers will no longer be able to email client documents to their customers, clearing relationships, or service providers without being highly aware of their duty to protect client information from would-be hackers. This is big adjustment for the industry. Just as we adapt to the fluctuating Chicago seasons, in time, we will learn to adjust to these new rules as well. At Midland, we provide administrative and custodial services for futures accounts for individuals that are using IRA money to invest in these products. As the administrator, we require documents to setup and fund these investments: account statements, FCM paperwork, CTA disclosures, letter of direction, and...