RIA Compliance and Practice Management Blog

The RIAs Guide to Cybersecurity Incident Response Plans

Posted by RIA in a Box

Jul 20, 2022 5:31:20 PM

RIA Incident Response Plan

The Securities and Exchange Commission (SEC) recently proposed cybersecurity rules designed to improve registered investment advisers (RIA) firms' resilience against cyber attackers. Within this set of provisions, the SEC sets new requirements for the manner and timeliness in which firms must report cybersecurity incidents. In response to the proposed rules, RIA in a Box has prepared a six-step cybersecurity incident response plan for all employees of advisory firms.

Below, we discuss how advisory firms can act now to execute an effective cybersecurity incident response plan.

Learn More About Our Cybersecurity Platform

The wealth management industry currently faces staggering cybersecurity risk management challenges, such as safekeeping sensitive data and protecting both firms and their clients from cybercrime. The complexity of the cybersecurity landscape, coupled with teams who are underprepared for significant threats because they lack cyber crime knowledge to identify and address threats, leaves firms vulnerable to increasingly sophisticated attackers. 

As a compliance and cybersecurity solutions provider, we highly recommend firms regularly provide cybersecurity training to all of their employees. Below is a response plan, created by RIA in a Box's Chief Information Security Officer Julian Makas, for employees to follow if they suspect cyber attackers have targeted them: 

  1. Do not have employees turn their computers off, but rather disconnect from the network. This can be completed on a Windows computer by:
    • Clicking on the Start menu.
    • Clicking on “Settings.”
    • Selecting “Network Connections” in the Settings menu.
    • Right-clicking and selecting the “Disable“ option.

  2. Windows users should start a full system antivirus/anti-malware scan on the computer. Most antivirus programs will create an easy access icon in the Windows Desktop Tray (small icons by the clock on the taskbar), which can be used to quickly launch a scan. Your employees should be comfortable launching these types of scans, and if not, regular IT trainings should take place. Mac users should consult with  IT, as the proper steps depend on their specific operating system.

  3. Contact IT support immediately. It is important employees share detailed information about their suspicions as soon as possible. IT should secure the exact time of the event (as close as possible), what was experienced, and any information/data which might have been entered into screens or used during the incident. This will ensure that the IT support team can help prevent further compromise.

  4. Once the incident is in the hands of IT, have the employee review their notes and verify everything has been clearly and correctly notated. Employees can email the notes to themselves to keep a record of the incident, which should include:
    • The date and time of the incident.
    • What software was being used when the incident occurred.
    • If any files or email attachments were downloaded.
    • What information, if any, was entered into a web browser.
    • If a login occurred, what username and password were used. More importantly, is the same password used with any other accounts or logins.

  5. If the employee logged in, ensure they update all passwords that are the same or similar to the password shared with the attackers. The same/similar passwords should never be reused, and now would be the time to change all those passwords and ensure they are each different.

  6. Finally, ensure the incident is communicated with management as soon as possible. Proposed SEC regulations may create more stringent requirements for disclosure and record keeping regarding such attacks. The notes taken in steps three and four will be required for your organization to meet these requirements.

Additionally, RIAs can leverage technology to simplify the process for recording and reporting cyber attacks. A comprehensive solution will not only identify and protect your firm against cyber attacks, but also provide automated processes to streamline the required record keeping and reporting.

Download the Cybersecurity Incident Response Steps Infographic

 

Topics: RIA Operations, RIA Compliance, RIA Technology

RIA in a Box LLC is not a law firm, investment advisory firm, or CPA firm. RIA in a Box LLC does not provide legal advice or opinions to any party or client. You should always consult your relevant regulatory authorities or legal counsel if applicable.

RIA Compliance & Practice Management

Stay up to date on the latest RIA compliance, operations, and technology topics.

Hear from industry experts as they keep you up to date on the latest regulatory developments and practice management topics.

Subscribe to Email Updates

Recent Posts

POSTS BY TOPIC

cta-ria-compliance

cta-ria-operations

cta-ria-technology