fbpx
Insurica
Pay Now
Client Login

FINANCIAL INSTITUTION DATA SECURITY PROTECTION

Financial institutions are top targets for security breaches. While the media often reminds us of high-profile network leaks, financial institutions of all sizes are at risk. Because the unintentional release of sensitive customer information is a larger risk than ever, it is essential that you be prepared to react efficiently and effectively in the event of a breach.

In order to prepare for breaches in security, financial institutions must tighten their data security controls and plan for a potentially significant financial blow should these controls be insufficient. With continual threats of viruses, hackers and unauthorized use of sensitive information, your institution must respond by preventing, detecting and responding to cyber attacks through a well-orchestrated cyber security program.

The Safeguards Rule

The Federal Trade Commission (FTC) issued the Gramm-Leach-Bliley (GLB) Act, which requires financial institutions to ensure the security and confidentiality of sensitive personal information. The Safeguards Rule, which requires all financial institutions under FTC jurisdiction to take steps to keep customer information secure, was issued with the GLB Act. The measures enacted depend on the size and complexity of the company, the nature and scope of its activities and the sensitivity of the customer information it possesses. The FTC requires each plan to include the following components:

  • A designated coordinator of the information security program
  • An assessment of risks to customer information in each relevant area of the company’s operation and an evaluation of the current safeguards for controlling these risks
  • A program in place to prevent security breaches
  • Service providers that, by contract, maintain appropriate safeguards
  • Regular adjustments to the information security program in light of relevant circumstances, changes in the company’s operations or results of security monitoring

Create a formal, documented risk management plan that addresses the scope, roles, responsibilities, compliance criteria and methodology for performing cyber risk assessments. This plan should include a characterization of all systems used at the organization based on their function, the data stored and processed and importance to the facility.

Employee Training

Employees using data are the first line of defense against security breaches. Thorough training is a keystone of any information security program. Follow these guidelines to promote employee cooperation:

  • Conduct background checks before hire.
  • Ask employees to review and sign your company’s confidentiality and security policy.
  • Limit access to information to those employees that require it for job duties.
  • Require employees to use strong passwords, incorporating both upper and lower case letters, symbols and numbers.
  • Train employees to store materials such as laptops or mobile devices in secure places.
  • Train employees to encrypt information, lock rooms and file cabinets, and report all attempts to obtain customer information.
  • Remind employees of the legal requirement to keep information secure and confidential, and impose disciplinary policies for violators.
  • Immediately deactivate passwords for employees who are terminated.

Network and Information Systems

Design your information systems so that they are as protected as possible from security breaches:

  • Take precautionary measures when selecting an internet service provider (ISP). Verify the provider’s commitment to security.
  • Use appropriate audit procedures to detect improper disclosure or theft of customer information immediately.
  • Dispose of customer information in a secure way, shredding papers and erasing data on electronic hardware such as computers or hard drives.
  • Maintain inventory of your company’s computers and other mobile devices.

In the Event of a Breach

A swift, appropriate response is important if your company experiences a security breach. Follow these steps to minimize damage:

  • Preserve and review files or programs that might reveal the extent of the breach.
  • Secure any information that may have been compromised.
  • Notify consumers, law enforcement and businesses if the breach poses the risk of identity theft, criminal activity or other related harm. State laws regarding notification vary.

Transferring the Risk

Cyber security is a serious concern for all financial institutions. The cost of a security breach can be considerable, and may include the following:

  • Credit monitoring services for affected customers
  • Creation of new account numbers and re-establishing secure account numbers
  • Issuing new credit or debit cards
  • Hiring a crisis management or public relations firm
  • Class-action lawsuits
  • Irreversible damage to the corporate brand

Be sure you are taking steps to prevent security breaches and creating a plan in case one does occur. Contact INSURICA to learn about our risk management resources and insurance solutions, such as Internet and media liability, security and privacy liability, and identity theft insurance.

About the Author

INSURICA
INSURICA

Share This Story

Stay Updated

Subscribe to the INSURICA blog and receive the latest news direct to your inbox.

Subscribe to the blog

Related Blogs

OSHA’s Safe and Sound Week Scheduled for Aug. 12-18

July 25th, 2024|Blog, Risk Management, Safety Tips|

Each year, more than 5,000 workers are killed on the job. Additionally, more than 3.6 million employees are seriously injured each year while at work. Because of this, the Occupational Safety and Health Administration (OSHA) holds a nationwide event each August called Safe and Sound Week, which promotes the importance of companies incorporating safety and health programs into their workplace. This year, the event runs Aug. 12-18, 2024.

2024 Midyear Market Outlook: Workers’ Compensation

July 24th, 2024|Blog, Risk Management, Trending|

Profitable underwriting results have generated favorable conditions across the workers’ compensation insurance market for nearly a decade. According to the National Council on Compensation Insurance (NCCI), the segment produced combined ratios of 84.5 and 84.9 in 2022 and 2023, respectively, demonstrating continued profitability.

CrowdStrike, the Most Important Cyber Accumulation Loss Event Since NotPetya, Highlights Single Points of Failure

July 23rd, 2024|Blog, Risk Management, Safety Tips, Trending|

In what is being called “the most important cyber accumulation loss event since NotPetya,” the July 19, 2024, global technology outage (CrowdStrike) will produce scores of insurance claims across a range of policies, test cyber policy wordings,and sharpen the industry’s focus on single points of failure.

Go to Top