Uncategorised

Data protection and cyber-security: some tips for compliance officers

Sandra Lawrence Collas Crill Executive director Guernsey 25 January 2020

Data protection and cyber-security: some tips for compliance officers

Data is one of the most valuable assets that every financial firm has, not least because it ensures that its clients receive the high quality of service that they deserve and because it helps to protect it from abuse by financial criminals.

Most financial firms store copious amounts of data on a variety of vital information technology (IT) platforms and networks every day. The average firm has bolted many of these platforms together over time and designed many of them long before it truly realised the full gravity of growing threats to the security of its data and its cyber-systems - and, indeed, before data-protection legislation grew truly onerous.

Data is a valuable commodity for cyber-criminals and HNW clients are entitled to have their data protected in line with the principles of the European Union's General Data Protection Regulation and other laws. Firms ought to be storing this data securely, confidentially and with integrity.
 
When, not if

We all know that a cyber-attack is an inevitable consequence of the digital age and that every company experiences one. High-profile incidents such as Sony, the Panama Papers and the WannaCry attack have made people more aware than ever of the threat that cyber-criminals pose to the reputation of the financial sector. The European Union's General Data Protection Regulation (GDPR) has made people more accountable and helped to protect clients' data.

Due skill and care

Data protection and cyber-security are not simply IT issues; they are also regulatory issues and reside at the top of every board's agenda. However, even though directors have many responsibilities, how many of them can honestly profess to be IT experts with a full understanding of the controls that relate to data protection and cyber-security that their firms have in place, thereby fulfilling their duty to be skilful and careful?

Directors may not know the right questions to ask their IT staff and they may not understand the answers that they receive. A director might think: "did the IT man say this-or-that just to mollify me, or should I press him for more answers?"

Traditionally, IT practitioners are backroom boys who have little contact with others the business, using (literally, in respect of coding) a completely different language; I can draw many comparisons between them and compliance practitioners 20+ years ago. Now they find themselves at the top of every board's agenda and have to report to boards or committees regularly, while dealing all the time with constructive criticism. They often lack crucial report-writing and other communication skills and training. They are no experts on corporate governance or their firms' regulatory responsibilities and might not appreciate the reasons why their boards are taking such an interest in the first place.

Diversity is a good thing

When different professions come into contact, misunderstanding and conflict often result. However, the coming together of people of different professional backgrounds can create an invaluable diversity of expertise because they are well suited to challenging each other's ideas and debating weighty matters. Such cross-fertilisation should be welcomed as an antidote to stultifying 'groupthink.'
 
Let's work together

A crucial step for a financial firm that wants to improve its data-protection and cyber-security controls is that of ensuring that all major parties know what the firm expects of them and appreciate each others' motivations and obligations. By understanding each other's problems and by talking to each other effectively, they can deal with the dangers that might befall the data. Clients are likely to be unsympathetic to any company that does not keep its data secure and takes a lackadaisical approach to cyber-security.
 
Risk

Controls that protect data and make IT systems more secure have to follow the same broad principles as any other way of managing risks – the firm must identify and measure the dangers, implement mitigating policies, procedures and controls, test those controls periodically and re-evaluate and improve them regularly, where necessary.
 
Risk registers

A financial firm ought to gauge, record and measure its exposure to problems, review that exposure continually and decide on the technical controls (see below) by which it can diminish it.

It can also identify a confluence of risks by setting up a risk register. This is a document in which a risk manager (or, in this case, a compliance officer) writes down information about each of the relevant risks that he has spotted, including its nature, its reference number, the person to be punished if it becomes actual, and steps to be taken to offset it. He can display all this as a scatterplot or in a table.
 
Technical controls

The term 'technical control' refers to the use of IT as a protection against threats. Examples include many well-known methods such as firewalls, which detect and protect networks from unauthorised access, two-factor authentication as an added barrier to anyone who wants to enter a system, programmes that detect email phishing, regular updates of security patches, the regular backing-up of systems and, very importantly, checks to see that the back-ups have been successful and that data is retrievable. These controls are far from perfect and the world of cyber-security is constantly changing, so the compliance officer should conduct routine and continual reviews to spot emerging risks.  


External validation

The compliance officer might give his firm an additional layer of confidence use of 'ethical hackers' can offer the  by deliberately, and with permission, attempting to hack workplace systems and networks. In this way they can expose hitherto-unknown weaknesses and help the firm rectify things.

Accreditation firms can assess financial firms' controls and, if all goes well, award them 'kitemarks' (such as the Cyber Essentials Plus certificate) which the firms can then show to regulators and customers. The assessment process is a healthy one in and of itself because it checks the 'health' of a firm and identifies areas for improvement.
 
Policies and procedures
 
People are often complacent and easily distracted and therefore pose one of the largest problems for cyber-security. When a compliance officer develops policies, procedures and controls in this area he must take account of this.
 
Good culture, the so-called "tone at the top" and the continual training of staff are also important in helping a firm to overcome its weaknesses. What use is there, for example, in a firm insisting on its staff using complicated and secure passwords if the CEO has a piece of paper stuck to his keyboard with his password written on it?
 
If the firm's policies and procedures are not to be circumvented, it ought to be clear about its expectations of its people, their access to various systems, the difference between acceptable and unacceptable behaviour and ways in which to deal with bad incidents. It must write these things down, tell its employees about them and check to make sure that they have understood.

The firm might also want to institute a Bring-Your-Own-Device (BYOD) Policy to govern the way in which employees use their own personal devices to access the company's systems and data. Many benefits accrue to a company when its employees use their own devices - it is cheap and allows for flexible working arrangements and business continuity planning - but the practice also endangers cyber-security. What happens if someone loses his device or innocently downloads a spyware-laden game onto it? He ought to know what to do in either of these circumstances.
 
The training of staff

Policies and procedures, without adequate information and training being given to staff, are worthless. A company can do a lot to help its people realise how cyber-security problems might affect it (and them) by giving them meaningful examples, especially if they are drawn from its own experience.
 
A compliance officer can gauge the effectiveness of training by sending deceptive emails, similar to malicious emails, to staff to gauge their responses to phishing, thereby spotting gaps in their knowledge. He must, however, take care not to reprimand them too harshly for their mistakes, because a culture of blame discourages people from reporting incidents. Phishing attacks can be very sophisticated and difficult to spot.

Communication during a crisis

'Crisis communication' is a public-relations exercise by which a firm tries to limit the damage that a disaster does to its reputation and compliance officers might find themselves involved in it when there is a cyber-attack. As we have said, such an attack is highly likely and every firm must prepare for the inevitable before it happens.
 
The firm must have a list of clients, shareholders, regulators, data protection authorities, law enforcers and newspapers. It must plan, as far as it can, how to communicate with the media during that difficult time.

There are many poor examples of crisis communications, TalkTalk being a well-known case from 2015. The person who is destined to be the face of the firm during a crisis must be well-prepared and able to cope under intense pressure during interviews with the press.
 
If and when the compliance officer prepares an outline of things to say in a crisis, he must take the priorities of every interested party into consideration. He might even want to do this in a general way before the crisis occurs. He must also ask practical questions about who has the password for the company's LinkedIn or Twitter account and what happens if they are on holiday when an incident occurs.

Containment and recovery

Even though every firm that suffers a cyber-attack ought to want to contain the situation and recover from it, ideally recovering lost data, the police might want the attack to continue, at least to a certain extent, so that they can trace the guilty. This might play havoc with the compliance officer's priorities and responsibilities. How can a company allow a cyber-attack to continue? Conversely, how can it ignore the advice of the police without facing legal action itself? This is the compliance officer's dilemma.

* Sandra Lawrence can be reached on +44 1481 734808 or at sandra.lawrence@collascrill.com

Register for WealthBriefing today

Gain access to regular and exclusive research on the global wealth management sector along with the opportunity to attend industry events such as exclusive invites to Breakfast Briefings and Summits in the major wealth management centres and industry leading awards programmes