- My company is too small
- My website doesn’t store sensitive client information
- My website is not that important to their business
Why Hackers Hack Websites: Securing Your Website for Compliance and to Protect Your Business
Stay Informed
Subscribe to the NIBA Journal for the latest insights and industry updates
Related Articles
View AllUtilities Look Beyond Fintech to Create Innovation in the Market
Fintech is more than just a buzzword. Fintech represents the innovation in services and technology that will disrupt business models, business processes and software applications in the coming years, in nearly every financial services business globally. Examples abound in digital strategy and transformation, blockchain and distributed ledgers, and more. But where do industry utilities fit into this exciting new world of innovation? Utilities are another form of innovation that take the operations and technology processing that is replicated over and over again in the industry and consolidate it into a single, standardized operating model. The goal of utilities is to shift the responsibility for maintaining and investing in non-differentiating processes and technology to vendors, so seeing the words “utility” and...
Cyber Security
While attending the recent NIBA conference, we learned about new rules affecting our industry. Brokers will no longer be able to email client documents to their customers, clearing relationships, or service providers without being highly aware of their duty to protect client information from would-be hackers. This is big adjustment for the industry. Just as we adapt to the fluctuating Chicago seasons, in time, we will learn to adjust to these new rules as well. At Midland, we provide administrative and custodial services for futures accounts for individuals that are using IRA money to invest in these products. As the administrator, we require documents to setup and fund these investments: account statements, FCM paperwork, CTA disclosures, letter of direction, and...
Cybersecurity: Before & After the Breach
Security breaches are quite prevalent in the media today. Many security experts feel it’s not a question of if your company will suffer a breach of your information, but when. A panel at the NIBA Annual Members Meeting recently explored this topic. Preparation for a potential event is key to being able to address it. Information Technology (IT) enterprises of all sizes need to know exactly what data they have, where it is stored, and what the potential threats to the data are. Even small companies need to pay attention to the basics of securing their computing environment. These include: • Timely patching of operating system and other software • Using strong passwords for machine access • Performing backups of...