Sponsored

SEC Cybersecurity Guidance for Investment Managers

Alex ChamandyThe following post is written and sponsored by Alexander G. Chamandy of Envescent, LLC, the IT services provider to ARLnow.com.

In April 2015, the SEC issued a Cybersecurity Guidance update for registered investment companies and investment advisers.

The guidelines provided best practices for mitigating information leakage risks and improving data security. Too often many smaller investment houses may not have knowledgeable staff to implement and manage cybersecurity policies.

The cornerstones of cybersecurity 

The best practices are shaped around four key principles: compartmentalization; encryption; restricting remote access; and, controlling the usage of devices that may compromise internal security. The most critical considerations set forth are:

  • Data encryption: Backups, portable computers, data that flows outside of the company;
  • Network and system firewalls: Both hardware and software firewalls for network endpoints and individual systems;
  • Restricting the use of removable storage media (e.g., flash drives);
  • Deploying software that monitors technology systems for unauthorized intrusions;
  • Network segregation to restrict access; and
  • “System hardening” with the purpose of ensuring individual systems are locked down against attack.

Create a plan and follow through with it

To accomplish these essentials, you need to put in place both a policy and budget for active cybersecurity, consistent with the size and technological complexity of the operation. The basic important thought is that every system, network appliance, server, Internet connection, remote office (and its equipment) as well as portable devices, backups and other areas where data is transmitted or stored will need individual attention by a knowledgeable cybersecurity expert.

Investment managers without the needed internal cybersecurity expertise typically seek help of an outside consultant to deal effectively with this critical issue, and minimize potential exposure. An outside opinion most likely will shed light on overlooked but critical areas – such as the firmware version of a vulnerable network appliance, or remote ports that are exposed which don’t need to be open. These types of “invisible” or ignored issues may lead to large-scale breaches and other maladies.

Staying secure pays off in the long run

The primary goal of the SEC’s cybersecurity guidance is to help set forth a common framework for institutional best practices, casting light on commonly overlooked security flaws and spelling-out common sense steps to address them.

More importantly, however, it is a critical change in the landscape of the our regulatory and legal environment. With all of the recent (and ongoing) breaches — and given what is at stake for investment managers if their systems are hacked — it makes sense to shape and adopt a cybersecurity plan. It makes even more sense to put the plan into action before cybersecurity becomes a problem for your operation.

View the SEC Cybersecurity Guideline Update here: http://www.sec.gov/investment/im-guidance-2015-02.pdf

About the author

Alexander G. Chamandy is a seasoned IT professional with 20 years of industry experience and a lifelong Arlington resident. He has deep expertise helping small businesses with a number of IT issues, including cybersecurity, data recovery, networking, deploying and maintaining servers as well as open source software.

If your small business needs IT supportconsulting or website design contact Envescent, LLC. Our company has helped over 15,000 clients in the Washington, DC area and beyond since 1999.

The views and opinions expressed in the column are those of the author and do not necessarily reflect the views of ARLnow.com.