Top 10 Internal Controls to Mitigate Cybersecurity Risks in the Family Office

Current Cybersecurity Trends

“It is estimated that by 2027, global spending on cybersecurity will reach $10 billion. In this age of IoT, where there is no escaping the internet, it is very important to understand the importance of cyber security and more importantly, the types of cyber security threats around you!”

– Matt Powell, CPO Magazine

  • $400B is estimated annual business loss to cybercrime globally [1]
  • 94% of organizations experience phishing attacks [2]
  • 73% of organizations impacted by impersonation attacks have experienced a direct loss [3]

These are just a few statistics to provide some perspective on the risk many small businesses and family offices may face. Cybersecurity risks do not just affect corporations and government entities but can be a common and very present danger to family offices and small businesses alike.

HM&M can help you with your family office needs, click to learn more.

Why are family offices at risk?

In addition to the common risks an organization faces, family offices can also be targets for cyberattacks that may not be financially motivated. Compared to the risk most organizations face against cyberattacks, family offices are at increased risk for a cyberattack due to the potential for blackmail, extortion, and smear campaigns.

Employee risk comes from current or former employees who may elect to perpetrate or facilitate an attack, employees who have a sense of entitlement, and long-term, trusted employees who may have extensive access to systems and data. No matter how capable or trustworthy your employees are, human error is the biggest risk in cybersecurity. In fact, 90 percent of breaches are caused by human error rather than software flaws and vulnerabilities.

Family offices are at risk because…

  • Family offices manage and represent a tremendous amount of wealth.
  • Historically, cybersecurity has not been an area of focused investment for family offices, or these offices lack the levels of security found in larger enterprises.
  • Lack of procedures or preparations for internal cybersecurity risks.
  • Fewer employees to manage all operations could mean more risk of a cyberattack.

 

Best Practices for Mitigating Risk to the Family Office

Even the worst cyberattacks have very simple origins: attack vectors. Currently, 92 percent of malware is delivered via email; however, because the types of entry points continue to evolve, many will not be caught by a family office firewall. As a result, employee security awareness training, testing, and auditing is the first line of defense.
As with all organizations, family offices must be diligent in relation to the potential risks posed by current and former employees and relationships with third party vendors, especially those that have some level of access to family office data.

Top 10 Internal Controls Every Family Office Should Have:

  1. Having a well-crafted and comprehensive set of policies, procedures, and controls is foundational for any organization, and family offices are no exception. Policies around access management, clear delegation of authority, segregation of duties, and a host of other topics are a must. The policies, procedures, and controls must include family members as part of the overall governance process. Most importantly, just having the policies in place is not sufficient – periodic reviews and reassessments of the policies and controls is a necessary step to ensure adherence.
  2. Train your employees, then train them again. Family office employees are the first line of defense when it comes to cyberattacks. Every employee should have a solid awareness of the threats that exist and how to identify them and know what to do if they suspect something. Unfortunately, just having a robust training program in place is not enough. It is critical to test employees to ensure that the training they receive is integrated into day-to-day activities, and it is equally important to audit the results of the training and testing regimen.
  3. The use of personal email, social media, document sharing, and document storage devices should be limited, if not prohibited all together. In an effort to avoid an intentional or inadvertent data breach, preventing family office employees from using personal accounts to conduct office business is critical.
  4. Email encryption as standard practice. If a family office email system does not encrypt all communications as a matter of course, then a separate system or platform should be used to send communications that contain personal, financial or otherwise sensitive information.
  5. Desktops, laptops, and servers must be encrypted at rest. Historically, only devices that could be “mobile” were encrypted as such to prevent data loss in the event of theft of the device. Today, as the cost of technology continues to decrease, the internal hard drives within all devices, including servers, should be encrypted.
  6. Secure passwords and log-in information. Confidentiality is paramount. Password and log-in information should be maintained in a secure location such as a password manager app. Be careful what information you share.
  7. Maintain a secure and protected vendor list from which access is prohibited for employees in the A/P function. Changes to vendor information should be subject to additional verification and review.
  8. Proper vetting and auditing of third-party vendor access and activities is a must, and often a task that family offices overlook. Vendor risk comes from allowing an external third party to access systems and the underlying data on those systems.
  9. The family office should have a separate insurance policy covering cybersecurity. The family office insurance broker should have full knowledge of the family office structure and policies in place to protect the family office from the financial burden of cyberattacks.
  10. Understanding the organization’s social media “footprint” and restricting employee use of family office information on their personal social media is critical. Spear phishing campaigns are often based on gleaning critical information from social media. Family offices should instill best practices for maintaining confidentiality.

 

Be proactive!

  • Contact advisors for assessments of internal controls, risk assessment, and insurance review.
  • Be aware of who you are letting in.
  • Insure the family office and obtain cyber insurance.
  • Keep the family and the family business separate in areas such as emails, social media, etc.
  • Establish a cybersecurity policy and process, implement safety technology, and train your people.

 

If you need help with any of the above, please contact your HM&M advisor today.

Contact Us

 

[1] Brad Deflin, CEO of Total Digital Security

[2] Mimecast. The State of Email Security Report 2019

[3] Ibid.

Latest News

road with cars and sunset

IRS Increases Mileage Rate For Second Half of 2022

On June 9, the IRS released Announcement 2022-13, which modifies Notice 2022-3, by revising the optional standard mileage ...

Globe

New Schedules K-2 and K-3 for Passthrough Entity Tax Returns

At the tail end of 2021, the Internal Revenue Service (IRS) released new Schedules K-2 and K-3 effective ...

The Build Back Better Act – Update

This information is current as of Sunday, November 21, 2021. On Friday, November 19, 2021, after the Congressional ...

HM&M Updates

Pearl Balsara Breaks Attendance Record at Financial Planning Association of DFW Annual Conference

Last month, Senior Manager, Pearl Balsara was invited to speak at the 2023 FPA DFW Annual Conference in ...

HM&M Excellence Awards

We are pleased to announce the winners of the 2022 HM&M Excellence Awards. Ronna Beemer, Keith Phillips, and ...

HM&M Keep on Keepin’ on Awards

Huselton, Morgan and Maultsby is composed of a spectacular team of individuals. During our annual What’s Happening Meeting, ...

Payments Client Portal