Advisor Armor Advisor Armor

RIA Experiences the Horror of Failure to Supervise Remote IARs

Registered investment advisers that rely on independent investment adviser representatives (IARs), operating their own offices, face unique supervision challenges. The SEC’s administrative action against Horter Investment Management, LLC (“Horter”) and its principal illustrates the worst-case scenario. The firm, based in Cincinnati, primarily hired IARs with remote offices.

Read More
Advisor Armor Advisor Armor

Cybersecurity Awareness Month: Tips On Practicing Basic Cyber Hygiene

In our first article to kick off Cybersecurity Awareness Month, we will discuss some steps businesses can take to improve their cyber hygiene. Over the past few years, some of the largest and well-known companies have been affected by data breaches resulting in millions of dollars in losses. Smaller businesses are not immune from data breaches, and even a small data breach impacting only a few thousand records can expose a business to significant losses and reputational damage that may have a devastating impact on its ability to function. Various attack methods can be used against businesses to obtain sensitive data or access funds through fraud. Some common attack methods are compromised credentials, social engineering attacks such as phishing, vishing, and smishing, business email compromise scams, ransomware, and vulnerabilities in third-party software. While no business can expect to be 100% safe, here are some basic practices businesses can implement to improve their cyber hygiene.

Read More
Advisor Armor Advisor Armor

Incentivizing Cybersecurity Practices - State Safe Harbors or Affirmative Defenses that Shield Companies from Liability

Overall, it is likely that states will continue to emphasize the importance of cybersecurity programs. Some laws could encourage stronger cybersecurity by providing an affirmative defense. Others could mandate certain cybersecurity practices without affording an explicit affirmative defense. No matter the specifics of a statute or even in the absence of a statute, companies will be well-served to implement an industry-recognized cybersecurity framework. Not only will the frameworks likely reduce the frequency or severity of data breaches, but they may also improve a company’s defense against alleged liability in the event a data breach does occur.

Read More
Advisor Armor Advisor Armor

Hold the punitive damages: Connecticut is latest to incentivize implementing cybersecurity frameworks

Connecticut’s new cybersecurity standards law, which goes into effect on October 1, 2021, protects companies from punitive damages in certain data breach actions where an organization has a cybersecurity program that conforms with an enumerated “industry-recognized cybersecurity framework.” It is the latest in a series of U.S. state efforts to incentivize companies to demonstrate that their cybersecurity programs are aligned with recognized frameworks and thus meet a reasonable standard of care.

Read More
Advisor Armor Advisor Armor

So You've Vetted Your Tech Vendor. Do it Again. And Again

It’s not enough to vet third-party technology providers when bringing them onboard because the due diligence evaluation should be ongoing, according to Ben Mathis, chief information officer at Carson Group.

ADVISOR ARMOR COVERAGE INCLUDES UNLIMITED THIRD PARTY CYBERSECURITY VETTING & MONITORING

Read More
Advisor Armor Advisor Armor

Financial Industry Regulators Continue Crack Down on Cybersecurity

On multiple fronts, the U.S. Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) continue to increase their focus on cybersecurity. This is understandable as headlines of recent data breaches and ransomware attacks are in the news almost daily. This alert will highlight several of the actions taken by these regulators and proactive measures that financial services companies can implement to avoid the regulatory scrutiny that may follow from a cyber incident.

Read More
Advisor Armor Advisor Armor

As Cyberthreats Mount, Advisors Have a Target on Their Backs

Attorney Brenda Sharton is an old hand at helping companies navigate data breaches. In a typical week, she would work on recovery efforts from two or three cyberattacks—a steady but manageable pace.

Then came the novel coronavirus pandemic, and the volume of attacks skyrocketed.

“Over the course of a long weekend we had nine of them,” she says of one period late last winter.

Hackers thrive on crisis and disruption, says Sharton, litigation partner and global co-chair of the privacy and cybersecurity practice at the law firm Dechert. As businesses follow tentative return-to-office plans even as the Delta variant surges, she worries about another burst of cyberattacks, which this time could include even more financial advisory practices.

Hackers eye all sorts of businesses, but wealth management companies make particularly alluring targets, thanks to their proximity to vast sums of money and the detailed Information they hold on wealthy clients.

“The two holy grails for these people are money movement and data access,” Wealthcare President Matt Regan says of today’s breed of cybercriminals. “Bank robbers rob banks because that’s where the money is, and this is where the money is.”

Read More
Advisor Armor Advisor Armor

Multiple States Toughen Data Breach and Cybersecurity Requirements

It has been a busy summer for data breach and cybersecurity laws. Several states have shortened their data breach notification timelines, expanded their definitions of personal data breaches triggering notification requirements, or added provisions related to companies' cybersecurity programs.

We summarize the notable changes below. Clients are advised to carefully review these changes and assess whether their existing information security policies and procedures should be updated.

Read More