Always Client Focused

FinTech Trends Newsletter Week 24th July – 28th July 2017

The Weakest Link: Are Your Employees Making You Vulnerable to Cyberattack?

Employees are the weakest link to their employer’s cyber security and the “human factor” is the bit we can’t account for. Your Firm may have the best of bread technology, yet a lack of employee education could instantly compromise all of that. Storm IT Financial advocate employee education and can help firms with

In the Financial worlds increasingly threatened landscape, cybersecurity is a top concern for alternative investment firms, hedge funds, wealth managers and private equity businesses of all sizes. Organisations routinely spend billions on software and Information Security in an effort to protect themselves against an onslaught of ransomware, phishing scams and social engineering attacks, as we’ve seen in the last few months.

Unfortunately, many businesses don’t realise that the biggest threat to their Information Security is the human element. Employees are a vital link to a firm’s success, but they represent a complicated piece of the cybersecurity puzzle that is often overlooked by standard security algorithms and processes.

What Information Security Weaknesses Make My Business Vulnerable?

Businesses should consider the following potential vulnerabilities when securing their IT perimeter against human error and cyberattack:

*Poor employee password habits, such as repetitive characters and easy-to-guess phrases *Lack of proper BYOD (Bring Your Own Device) company protocols *Transmission of sensitive company information via an employee’s personal mobile device on a company network *Clicking on an unsafe attachment in an email or download *Unsecured sharing of passwords with others *Leaving company computers and mobile devices unattended when off premises and out-of-network *Using personally owned mobile devices to connect to the organization’s network for personal business *Poor system patch management and lack of regular up- dates *System misconfiguration errors.

Hackers Use Social Engineering to Prey on Employees’ Trust and Vulnerability

Today’s savvy hackers use sophisticated social engineering techniques to manipulate company employees into clicking on and/or open- ing infected email attachments and downloads. These phishing emails are designed to pose as authentic communications from company executives—and they are so effective, many employees can’t tell the difference between the hacker’s email and one from their CEO. Once your employee clicks on an infected attachment, a ransomware or other Trojan is unleashed into your company system.

In order to mitigate the vulnerabilities associated with the human element, industry experts recommend the following best practices:

  1. Education and Training of Employees – Poor employee password habits are a leading cause of incidents and data breaches. In order to mitigate the potential damage that even just one careless employee can wreak a firms network, it is vital to conduct regular and con- tinuing education and training sessions to keep everyone up to speed on the latest threats and best practices.
  2. Use Encryption for Confidential and Sensitive Information – Keep your most sensitive information out of the hands of cybercriminals with encryption technology.
  3. Maintain Backups in the Cloud – It isn’t enough to simply backup your data at the office IT experts agree that the most secure businesses have their backup in a virtual location. That way, if there is a natural or other disaster and your physical location is compromised, you can rely on the backups you’ve maintained virtually.
  4. Having Backup Isn’t Enough – Disaster Recovery Planning is Key – Simply having backup isn’t going to help during a disaster if that backup isn’t functional. Implementing a disaster recovery and business continuity plan will help keep your business up-and-running in the event of a catastrophe.
  5. Standardise Company BYOD Protocols – These days, everyone has a mobile device in their pocket. In order to mitigate the threat of an errant employee’s smartphone wreaking havoc on the company network, set standard policies for those who wish to use their own devices on company time. That way, everyone is on the same page and rogue access to your company network is limited.

Storm IT Financial can help train and educate your employees on cybersecurity best practices so you can avoid unnecessary & costly downtime. If you’d like more information on how to mitigate your alternative investment, hedge fund, wealth manager and private equity firms’ vulnerability when it comes to the human, employee element, please contact Storm IT Financial for more information.

Storm IT Financial FinTech News & Trends picks: Week 24th July – 28th July 2017

Amping up your disaster recovery with Azure Site Recovery

Azure Site Disaster Recovery Service allows you to failover on-premises applications running in the event of an outage:

https://azure.microsoft.com/en-us/blog/amping-up-your-disaster-recovery-with-azure-site-recovery/

Employees are your biggest risk: Data hygiene needs to start at the top

Cyber security professionals have long acknowledged that employees are the weakest link in an organisation’s information security:

http://www.cityam.com/269043/employees-your-biggest-risk-data-hygiene-needs-start-top

Big xyt launches liquidity cockpit

Big xyt, the provider of smart data & analytics capabilities launches Li-quidity Cockpit giving investment firms visibility over dark liquidity…:

https://www.finextra.com/pressarticle/70194/big-xyt-launches-liquidity-cockpit

Countdown to MiFID II: Are You Ready?

The clock is ticking for firms still trying to finalise their plans for MiFID II
changes to capture, archive & retrieve electronic communications:

https://www.finextra.com/blogposting/14327/countdown-to-mifid-ii-are-you-ready

UniCredit confirms data breach

Italy’s UniCredit says personal financial data of some 400,000 customers have been hijacked by unauthorised third parties:

https://www.finextra.com/newsarticle/30884/unicredit-confirms-data-breach

Back office data harvesting raises client confidentiality fears

Consolidation in wealth management is not just confined to merger and acquisitions but client data too:

http://bit.ly/2vPwYIw

London startup Hedgd provides full trade lifecycle management with cloud-based OMS

London-based startup Hedgd has launched its Hedgd OMS (Order Manage- ment System) that enables investment managers to take control of data:

http://bit.ly/2vdYceN

Think you’re GDPR compliant? Veritas research says you probably aren’t

Veritas says only 2% of firms comply with the GDPR, showing misunderstanding over regulation readiness:

http://bit.ly/2v2o9xf

AWS, Azure, and the state of play right now

Shedding light on Microsoft Azure, Amazon Web Ser- vices (AWS) and the public cloud Today:

http://bit.ly/2tum613

Cloud will drive growth of IT operations services

Public cloud & managed services help the growth of IT
operations management (ITOM) business model:

http://bit.ly/2u4pyiv

£14.5 m cyber-security technology innovation centre plans announced

UK government to spend £14.5 million on an innovation centre to foster the next of generation of cyber- security technology:

http://bit.ly/2uTdB3K

Robo Advisor reports: How many can the market take?

Scalable Capital and Netwealth CEO’s in video inter- view to discuss the robo-advisor market:

http://bit.ly/2vPlwfU

Cybersecurity is a critical business issue for hedge funds and other investment management firms. The financial conse- quences of a cyber attack can be significant and could result in a serious impact to your firm’s reputation. That’s where Storm IT Financial can help by easing the burden of cost, expertise and knowledge to your alternative investment firm.