Addressing the critical need for robust cybersecurity measures among investors, this blog outlines strategies to protect digital assets and sensitive information. It recommends comprehensive security practices, including the use of advanced authentication methods, regular security audits, and staying informed about potential cyber threats. The blog stresses that proactive cybersecurity is essential in safeguarding investments in the increasingly digital financial landscape.
Now that the Cyberworld is upon us, most of us do most, if not all, of our financial transactions online. Long gone is the day when most of us paid our bills by check or delivered a check to our brokers to invest for us. Now we pay our bills online, either on the biller’s Website, or on our bank’s Website. We don’t write checks – we transfer funds. We rely on the security of the Web site with which we are dealing to protect the security of the transaction. Most of us make sure that the “HTTPS” designation is at the beginning of the address for every Website on which we conduct transactions or share sensitive information. We maintain security and privacy settings on Facebook, LinkedIn, Twitter, and other social Websites where we publish. We have firewalls for our computer systems, our personal computers, and our home networks. We have anti-virus software and run it rigorously. We have our Outlook set for appropriate levels of security and use spam settings to segregate anything that looks like spam, knowing that in the spam box we can see the REAL addresses behind the links in emails. We know enough not to click on any link in any email, instead copying and pasting the address into our browsers. We have our browsers set for appropriate levels of security and privacy, and use a secure browser like Firefox or Tor. We have our networks set for security against invaders. We understand that the weakest link is usually the employee sitting at his keyboard, and have established suitable policies, procedures and penalties regarding cybersecurity for our employees. We use, and require our employees to use, “strong passwords” and change them often.
Really? Surveys by security analysts show that most people, even tech-savvy people, use passwords they can remember easily, and seldom, if ever, change them. We are our own weakest link. We rely too heavily on all of these measures, but are lazy in our own computer habits. We open Firefox, but forget to go to “New Private Window” for each jump. We click on links in emails that come from friends and trusted associates. Our own lapses can only be remedied by imposing discipline on ourselves. A new report on ways the government can mitigate persistent cybersecurity challenges contains a crowdsourced list of best practices. According to the report, “Much of what is required, expected, or even possible in cybersecurity management is known to cybersecurity professionals, but not fully or properly implemented across the government.” The same is true of industry, even the financial industry.
Communist countries are famous for establishing “five year plans.” China has a five-year plan for cybersecurity targets. Security vendor CrowdStrike has produced a report on China’s next fire-year plan. “They’re focusing on getting Western technology out – they don’t trust it,” said Adam Meyers, vice president of intelligence at CrowdStrike. “They want to use their own technology.” Chinese hackers appear to be looking for information to use in restructuring China’s healthcare sector. This may have contributed to the spike in healthcare breaches in 2015. “Targeting the western healthcare sector may be as much about logistics and know-how for running national level health insurance schemes as it is about siphoning data,” said the CrowdStrike report. The data they took, however, could also be used to build profiles of federal employees for intelligence purposes and spear-phishing campaigns. China seems focused on collecting intelligence that supports its economic system, and not just on military and defense targets. Therefore, financial firms of all types and sizes are potential targets, as well as high-profile individual investors. Hacking investors’ personal computers could provide access to the financial systems in which they work and invest.
There are other measures that savvy investors can take to protect their financial lives and those of their firms. The purpose of this article is to look at them. After you read this, you might say, “I have heard all of that, already.” Perhaps you have, but have you implemented it all? If not, read it again and again until it becomes second nature.
Security begins at home. Financial Executives’ home networks are often insecure and are logical targets for hackers seeking entry into financial system networks. Many executives access their office networks from home. There is nothing wrong with that, per se, but if their home network is not secure, their connection to the office is not secure. So, let’s start with the home network and home computer. Make sure that when you are not at home, no one else can gain access to your home and access your computer.
Security at the Office: Ten Commandments
Now, go practice safe surfing, but warily and carefully at all times. “Come into my parlor, said the spider to the fly.” Her parlor is the Web. You are the fly. Whether you are online or offline, if your computer does something unexpected and irritating, power it down immediately using the power switch. Start it up using a start-up CD/DVD with an anti-virus program on it, and use it to scan the computer.
An attack will generally come when you are relaxed or sleeping. Many will come online when your computer freezes on a website for no apparent reason. Often, that is because the website has been contaminated. Vigilance is the key to security. BE YOUR OWN BEST WATCHDOG! (Sorry, I didn’t mean to shout).
References:
Sophos is one of the best providers of computer security software for computers and networks. Their blog is worth reading.
Sophos whitepaper
Naked security You can read their newsfeed online, or subscribe to their newsletter.
“Industry Ideas for Boosting Government Cybersecurity: Go Back to the Basics”, www.NextGov.com (01/20/16) Moore, Jack.
“China’s Next Five-Year Plan Offers Preview of Cybersecurity Targets”, CIO, (02/03/16) Korolov, Maria.
NextGov Link
Disclaimer: This article discusses certain companies and their products or services as potential solutions. These mentions are for illustrative purposes only and should not be interpreted as endorsements or investment recommendations. All investment strategies carry inherent risks, and it is imperative that readers conduct their own independent research and seek advice from qualified investment professionals tailored to their specific financial circumstances before making any investment decisions.
The content provided here does not constitute personalized investment advice. Decisions to invest or engage with any securities or financial products mentioned in this article should only be made after consulting with a qualified financial advisor, considering your investment objectives and risk tolerance. The author assumes no responsibility for any financial losses or other consequences resulting directly or indirectly from the use of the content of this article.
As with any financial decision, thorough investigation and caution are advised before making investment decisions.
All Blog Posts
Dissolving the Federal Reserve: Reclaiming Sovereignty with the American Monetary Trust System A Visionary Proposal for Monetary Sovereignty and Economic Justice
Introduction What if we could dissolve the very institution that has controlled America’s money for over a century and replace it with a system that...
The Crypto Bull Run: Unveiling the Next Financial Revolution
Recent Performance Overview Bitcoin (BTC) Performance: Bitcoin has continued its upward trajectory, with a quarterly increase of approximately 44%, reaching a new all-time high of...
Historiography of the Right: Reclaiming Leadership, Values, and the Future
Acknowledgment: This paper benefited greatly from the vision and leadership of Ziad Abdelnour, President of the Financial Policy Council, whose pioneering work in promoting economic...
Post Categories