Technology
GUEST ARTICLE: The Cyber Menace And How Wealth Managers Should Face It
Multrees Investor Services, a firm working with wealth managers and other financial groups, has this advice for businesses understandably alarmed by the latest computer virus outbreak.
The computer virus attacks that hit organisations and hundreds of thousands of computers around the world at the weekend continue to keep cybersecurity high up the wealth management agenda. Jaco Cebula, who is chief technology officer at UK-based Multrees Investor Services, examines how firms can improve their security. Multrees is an independent custody and consolidated reporting specialist for wealth managers and family offices, and has insights into the needs of such groups. This publication is keen to hear from wealth and family offices around the world - cybercrime knows no frontiers - about cybersecurity issues and how they intend to deal with the problems. Please email tom.burroughes@wealthbriefing.com
The views of guest authors aren’t necessarily shared by the editors of this news service and it welcomes responses and comments.
Cybersecurity threats have undoubtedly become more intense over the years and will naturally drive more and more of the attention and the budgets of businesses globally to focus on mitigating the issue. The most recent case of the WannaCrypt cyber-attack which affected over 150 countries is the best real-time example of the rapidity and the scale of the impact this can have.
The cyber challenge will remain complex and evolve rapidly, placing companies, particularly those dealing with vast volumes of financial data, under immense pressure. They must keep customer data safe and drive the need for constant innovation to maintain robust security frameworks and help minimise the risk of security breaches.
Worldwide annual expenditure on cybersecurity software, hardware and services is expected to reach $101.6 billion by 2020 compared with spending of $73.7 billion in 2016, according to research from the International Data Corporation.
While constant innovation is crucial in tackling the issue, the approach should also be a holistic one, involving people and an improved process of intelligence gathering, and sharing of that intelligence via more effective communication channels.
The need to rapidly generate new products to survive in a highly competitive market makes delivering robust security controls extremely challenging. However, as the level of threats grow, it is crucial that banks become more open when it comes to their cyber strategy and work together as an ecosystem to combat the issue.
The more traditional "technical" approach to cyber security, while necessary, is not sufficient in itself to ensure that firms can minimise the impact of any attack. The majority of regulated firms will have controls in place to ensure that their IT security team is taking the necessary measures, such as keeping virus definitions up to date, patching servers, locking down firewalls, setting minimum required permissions, providing intrusion detection systems, and testing perimeter defences etc.
However, while the WannaCrypt ransomware attack has shown spectacularly that there are no grounds for complacency in these areas, it important to realise that many of the most effective measures lie beyond the realm of IT Security, and relate more to a less predictable area of vulnerability – an organisation’s people.
As a result, it seems pertinent to examine a number of key non-technical measures that demonstrate a number of ways that Multrees has tried to take cyber-security ‘out of the IT Security department’:
Online training – this should be a mandatory part of the staff induction, and the CISI online training catalogue which includes an introduction to Cyber Security, is a good example.
“Lunch and Learn” approach – this covered the
main “social engineering” categories of Cyber Threats, and
included real life examples, as well as reviews of actual attacks
on Multrees and lessons learned.
Understanding of different data domains – it is vital that
individuals understand where and how corporate data is stored
e.g. local devices, corporate network, cloud etc., as well as the
risks inherent in each.
Downstream supplier impacts – it is no longer sufficient to understand the impact of direct threats to your own organisation. Effective supplier management of application providers (both on-premise and cloud based), infrastructure/network partners and B2B counterparties should include due diligence on security measures, as well as reporting and transparency around any attacks via service reviews.
IT “coding for security” – a myriad of online
courses and certifications are available to ensure that all
software developers have an awareness of how to build security
into their software ‘from the ground up’.
Simulations – this does not have to be time consuming or costly,
but it is vital that staff are aware of the procedures in the
event of a “real world” attack. A simple spear phishing
simulation which requires a little creativity and the creation of
a dummy website, could provide an opportunity to analyse the
responses, to target training and resources more effectively.
Ransomware is also very easy to simulate and track
with only a small amount of scripting.
Be aware of “patterns” in attacks - e.g. DDoS is often a cover for a more forensic data theft. It is important not to lose sight of the perimeter while dealing with the initial incident.
A key to getting buy-in to this activity is to understand that one will, inevitably, be the victim of some form of cyber-attack.
In 2016, Multrees itself was hit by a ransomware attack that was not identified by the mail scanner. The effect of this breach, however, was minimised swiftly via appropriate user permissions, allied to effective segregation of the network, meaning that core databases and application files were simply not accessible. However, it is important to note that these technical protections would not have been necessary, had the offending email been treated with appropriate levels of suspicion and tighter scrutiny at the point of entry by the recipient.
Being hit by a real-life attack, even one with minimal impact, can provide a timely wake-up call to ensure that cyber awareness is embedded in the organisation’s culture.
About the author: Jaco joined Multrees in 2013 as CTO; he has more than 20 years of specialised technology experience within the wealth management industry. This includes investment management software, systems integration and delivering operational improvements through automation. He leads the technology and change developments at Multrees.