SCAM ALERT:

Please be aware of scammers falsely impersonating HUB24 representatives. HUB24 will never contact you regarding potential investment opportunities. Please click here for more information. 

Contact us via our form

Contact Us

Chat to your local BDM

Contact a BDM

Give us a call

Call: 1300 854 994
Login

Cyber security quick wins – Tips and techniques

Reading time: 2 minutes

Can mitigate exposure to cyber threats because they enable the secure sharing of documents and reports with your clients, and often have added security benefits such as two-factor authentication for added security.   

A straight-forward measure that can be enacted immediately. Best practice describes strong passwords as having more than eight characters, containing alphanumeric characters, no personal information, preferably incorrect spelling and should not have been used before.  

Sharepoint can be used to share files instead of sending over email, because they require permissions to be set for user access.   

An important way of ensuring you have the latest functionality updates with the best security as well.   

Does not require a blanket approach. A regular audit of permissions and controls across your business will ensure your team has access to what they need to perform their job, while also limiting exposure.   

Continue reading

Over the past decade, Government and regulators have built a framework of governance for businesses to provide them with a structured approach to cyber-incidents and accountability.

Dive into the conversation

Cybercrime involves activities such as compromising emails and online banking fraud, which according to the Australian Government’s Australian Signals Directorate (ASD), currently make up the top three cybercrime types for business.

Although the Australian Investment and Securities Commission’s (ASICs) does not prescribe technical standards on cybersecurity, there is an expectation for licensees to address cyber risk as part of their AFS licence obligations, including risk management.

With cyber now listed as a major risk for the company, client portals have enabled Centrepoint Alliance’s adviser network to meet its mandated cyber standard and to facilitate client engagement and security.

Two decades ago, important documents were sent in the mail and stayed in our letter box until we collected it, but this has been replaced with email and cluttered inboxes, leaving it prone to cyber security threats.

Despite financial professional’s concern over cyberthreats, most have not acted fast enough and taken advantage of the appetite for change and the tail winds provided by government websites, cyber campaigns and media coverage.

Over the past decade, Government and regulators have built a framework of governance for businesses to provide them with a structured approach to cyber-incidents and accountability.

Developing a cyber risk management plan takes some time, but there are some strategies that financial professionals can put in place while it does this, including multi-factor authentication and protecting domain names.

Research in the US by Adviser 360 has found advice businesses that fail to invest in technology solutions to be more productive and better able to satisfy their clients, run the risk of being left behind. 

Consolidated logins where customers use one login to access a range of services is now the norm and they have become a common way for people to engage with their service providers, setting the standard on client experience.

With cyber now listed as a major risk for the company, client portals have enabled Centrepoint Alliance’s adviser network to meet its mandated cyber standard and to facilitate client engagement and security.

Client portals are fast emerging as a core capability in nurturing safe and secure collaboration between clients and their financial professionals.

An early adopter of client portals, Sherlock Wealth’s Owner and CEO, Andrew Sherlock, said it’s an integral piece of technology that his business uses with many of its clients.

Financial professionals, as trusted advisers, can take a leadership position in ensuring data security with their clients, leveraging client engagement to provide them with a reason to do it.