SCAM ALERT:

Please be aware of scammers falsely impersonating HUB24 representatives. HUB24 will never contact you regarding potential investment opportunities. Please click here for more information. 

Contact us via our form

Contact Us

Chat to your local BDM

Contact a BDM

Give us a call

Call: 1300 854 994
Login

Letter box versus inbox – security does differ

Reading time: 1 minute

A powerful analogy often used by The Cyber Collective Australia founder Fraser Jack to demonstrate how much data is sitting in our email is the comparison of a letter box and an inbox.1  

  1. The Cyber Collective – www.thecybercollective.com.au

Continue reading

Despite financial professional’s concern over cyberthreats, most have not acted fast enough and taken advantage of the appetite for change and the tail winds provided by government websites, cyber campaigns and media coverage.

Dive into the conversation

Cybercrime involves activities such as compromising emails and online banking fraud, which according to the Australian Government’s Australian Signals Directorate (ASD), currently make up the top three cybercrime types for business.

Although the Australian Investment and Securities Commission’s (ASICs) does not prescribe technical standards on cybersecurity, there is an expectation for licensees to address cyber risk as part of their AFS licence obligations, including risk management.

With cyber now listed as a major risk for the company, client portals have enabled Centrepoint Alliance’s adviser network to meet its mandated cyber standard and to facilitate client engagement and security.

Two decades ago, important documents were sent in the mail and stayed in our letter box until we collected it, but this has been replaced with email and cluttered inboxes, leaving it prone to cyber security threats.

Despite financial professional’s concern over cyberthreats, most have not acted fast enough and taken advantage of the appetite for change and the tail winds provided by government websites, cyber campaigns and media coverage.

Over the past decade, Government and regulators have built a framework of governance for businesses to provide them with a structured approach to cyber-incidents and accountability.

Developing a cyber risk management plan takes some time, but there are some strategies that financial professionals can put in place while it does this, including multi-factor authentication and protecting domain names.

Research in the US by Adviser 360 has found advice businesses that fail to invest in technology solutions to be more productive and better able to satisfy their clients, run the risk of being left behind. 

Consolidated logins where customers use one login to access a range of services is now the norm and they have become a common way for people to engage with their service providers, setting the standard on client experience.

With cyber now listed as a major risk for the company, client portals have enabled Centrepoint Alliance’s adviser network to meet its mandated cyber standard and to facilitate client engagement and security.

Client portals are fast emerging as a core capability in nurturing safe and secure collaboration between clients and their financial professionals.

An early adopter of client portals, Sherlock Wealth’s Owner and CEO, Andrew Sherlock, said it’s an integral piece of technology that his business uses with many of its clients.

Financial professionals, as trusted advisers, can take a leadership position in ensuring data security with their clients, leveraging client engagement to provide them with a reason to do it.