Why Phishing Scams Are Increasingly Targeting Financial Advisors
Cyber breaches on financial firms are getting more frequent and more complex.
November 15, 2018 at 06:28 PM
5 minute read
Behavioral FinanceThe original version of this story was published on Law.com
Financial advisors are more likely to be victims of cyberattacks than those in other industries, largely because financial data is extremely valuable to cybercriminals and small businesses tend to have less sophisticated cybersecurity systems in place.
In 2016, 20% of financial firms were affected by data breaches. This increased to 25% in 2017. With the average data breach costing $7 million, protecting personal and financial data must be prioritized in the industry.
While cyberattacks are becoming more frequent and sophisticated, many cybercriminals use simple phishing tactics to take advantage of human errors rather than planning complex attacks. As an advisor, you need to be aware of the most common phishing tactics used, understand how these scams are becoming more complex, and know how to protect your clients' data.
What Do Common Phishing Scams Look Like?
Cybercriminals know how to disguise phishing attacks as messages that appear to be normal and legitimate. Emails are often used, but some phishing scams involve the use of text messages, IMs and even phone calls. Messages are carefully crafted to look like they come from a legitimate source, and some cybercriminals know how to spoof a phone number or hack an email address to send a message from a known or familiar source.
The purpose of a phishing scam is to trick you into sharing personal or financial information. You might, for instance, be redirected to a page with a form that collects data that could be used to steal a client's identity or be prompted to use login credentials for a client's account.
Here are a few examples of phishing emails you might receive:
- Emails that ask you to follow a link to a page where you are prompted to enter login credentials.
- Emails that ask you to fill out an online form.
- Emails that redirect you to a page that mimics the login page of a legitimate financial institution, such as Fidelity, Schwab, TD Bank, JPMorgan Chase or Bank of America.
- Emails that alert you of a fax you have just received to trick you into opening a malicious attachment.
These unpleasant emails are sometimes easy to identify. Pay attention to the spelling and grammar and to the sender's email address, including the domain name. If an email creates a sense of urgency to download an attached file or visit a link, you should immediately be suspicious. Financial institutions will never send emails that ask you to log in to your account right away or to verify information immediately. A legitimate financial institution will call you to obtain this information.
If an email asks you to follow a link, check the URL and compare it with the official URL of the financial institution mentioned in the email.
Advanced Phishing Methods
Some cybercriminals have developed more sophisticated techniques to steal valuable data. There are keystroke viruses that can infect a computer and record everything you type, including login credentials for online banking and other financial websites.
Once a machine is infected, it can send this sensitive information to a cybercriminal who will then be able to use these credentials to access online accounts. You can avoid being affected by one of these viruses by being wary of the links and attached files you receive via email. Make sure the devices you use to manage clients' accounts have antivirus software.
Cybercriminals can also impersonate a client by hacking their email address or stealing their phone. They might claim that they need access to their funds right away because of an emergency. This type of scam can be difficult to recognize since the message will come from a trusted source and might look legitimate.
The best way to protect yourself from these scams is to establish best practices for certain actions such as releasing funds and meeting face-to-face with a client before performing these actions. Always verify written requests for distributions by calling the client. You should also communicate with clients regularly via phone calls and establish ID verification questions in advance; confirm the client's identity at the beginning of the call using the established ID verifications.
Your Role as a Financial Advisor
You need to be aware of the most common phishing tactics and other ill-intentioned techniques used by cybercriminals. Provide training to every firm employee to ensure everyone who has access to sensitive information is aware of these techniques. An employee accidentally opening a malicious file can infect an entire network. Also, encourage employees to take their time conducting thorough and careful email reviews to prevent inadvertent, careless mistakes that can easily be avoided.
You should also look into creating an educational program to help your clients recognize these scams. Your clients might not be aware of how complex these hazardous attempts are, how prevalent they are becoming, or how to identify an investment scam. Use your humanity and the personal relationships you have cultivated to your advantage; communicate this as an added value to your clients.
Lastly, you should develop procedures that you can follow to verify a client's identity before performing actions like withdrawing funds for a client. Communicating via regular phone calls and face-to-face meetings instead of entirely relying on emails will help you build stronger relationships with clients and make it difficult for cybercriminals to successfully impersonate them.
Andrea McGrew is chief compliance/chief legal officer at USA Financial, a comprehensive financial services institution, focused on providing advisors with the tools required to make solid recommendations and to empower clients to make educated and informed financial decisions. For more information, go to www.usafinancial.com.
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1Call for Nominations: Elite Trial Lawyers 2025
- 2Senate Judiciary Dems Release Report on Supreme Court Ethics
- 3Senate Confirms Last 2 of Biden's California Judicial Nominees
- 4Morrison & Foerster Doles Out Year-End and Special Bonuses, Raises Base Compensation for Associates
- 5Tom Girardi to Surrender to Federal Authorities on Jan. 7
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250