AI and Big Data: Solidifying Client Trust in Game-Changing Technology
It’s been said that data is the new oil of the digital economy. It’s true that data flows through all… Read More
Insights and best practices for successful financial planning engagement
Learn more
• eMoney Communications Team • June 13, 2018
Your clients trust you with their private financial data, and you probably feel a responsibility to protect that data. But what you may not know is that securities regulators hold advisors accountable – not their technology vendors – when client data is compromised. That can amount to fines and settlements with the Securities Exchange Commission, regardless of any harm or loss of information.
Don’t let flimsy security policies cost you. Here are six important questions to ask your tech vendors to make sure the technology used by both you and your clients meets the highest standards.
Online threats are constantly evolving. Your tech vendor should fully understand the security landscape and take steps to continually evaluate and strengthen their infrastructure. Ask your tech vendor if they conduct annual audits, penetration tests and how often they monitor their production network for intrusion.
Encryption is a way to ensure only authorized parties can decode and read sensitive information online. Various levels of encryption exist, meaning some do a better job of safeguarding data than others. Your vendor should take a well-rounded approach and encrypt data both at rest and in transit. Make sure you also understand their key management policy (KMP), which is a set of rules a business has to protect information.
This question has less to do with which method is preferred, and more to do with accountability. If a tech vendor manages their own servers and storage infrastructure, you’re dealing directly with the people responsible for protecting your client data. But if the vendor outsources these components, your vetting process should extend to those third parties.
Data breach attempts happen more often than you think. Fortunately, organizations have gotten good at detecting and stopping the staggering amount of online threats that face the global market. The best tech vendors monitor their infrastructure for intrusions 24 hours a day, seven days per week.
SOC 2 is a type of compliance standard that measures how information is protected online. Businesses seek to become SOC 2 compliant after a thorough audit of security, availability, process integrity, privacy, and confidentiality by a certified third party. Before partnering with a tech vendor, be sure all aspects of their service are SOC 2 compliant.
Your tech vendor should prove, beyond a shadow of a doubt, that protecting your data is a top priority. That means their security policies should run deep within their culture. Find out whether they perform security training for all new employees, if employees need to take annual security assessments, whether background checks are necessary for employees, and if they have an incident response team.
For more information, please visit our website at www.emoneyadvisor.com or contact us at 1-888-362-4612.
You may also be interested in...
It’s been said that data is the new oil of the digital economy. It’s true that data flows through all… Read More
The pandemic has propelled us into a virtual-first world, accelerating the need for firms to move to fully digitized operations. Read More
If you’ve been living in the modern world for any amount of time, you’ve learned cybercriminals are waiting for us… Read More
Join us as we discuss how clients can maximize their use of savings and investment vehicles to meet their financial goals in the COVID-19 economy. Thursday, February 4th, 2021 from 2:00 p.m. ET
REGISTER NOWa new source of expert insights for
financial professionals.Get StartedTips specific to the eMoney platform can be found in
the eMoney application, under Help, eMoney Advisor Blog.